Enterprise Mobility Report 06/2015. Creation date: Vlastimil Turzík
|
|
|
- Jeremy Lambert
- 10 years ago
- Views:
Transcription
1 06/2015 Creation date: Author: Vlastimil Turzík
2 Content Content... 2 Introduction... 4 ios... 4 Vulnerability... 4 ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords... 4 Versions: Android... 5 Vulnerability... 5 Samsung vulnerability affects up to 600 million Android devices... 5 CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE Versions Blackberry Vulnerability Versions Vulnerability Versions MobileIron
3 Vulnerability Interesting Articles MobileIron and Google to Bring MobileIron AppConnect to Android for Work Preview of MobileIron for Windows 10 Launches Today ios 9: Making a Great Enterprise User Experience Even Better Gartner Positions MobileIron as a Leader and Furthest on Completeness of Vision Axis in 2015 Magic Quadrant for Enterprise Mobility Management Suites
4 Introduction This is the public version of System4u's Enterprise Mobility report. You can find here news about security of ios, Android, Blackberry and Windows Phone operating systems from last week. We cover also EMM solution MobileIron in this report, others EMM solutions will come in the future. Full version of report is issued for our customers and subcsribers. You can find there not only the news about security, but also interesting articles, links from the enterprise mobility world and recommendations to mitigate the vulnerabilities. ios Vulnerability No vulnerabilities in this month. ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords Security researcher, Jansoucek, recently published the attack code on Github which reportedly exploits vulnerability on Apple s Mail app to steal user information. The attack can be used to steal important details such as the icloud password, the location as well as identity details of the user. He had already notified of this issue to Apple back in January, but the company is yet to fix it with a patch. Even the latest version of ios Mail App v8.3 has this vulnerability. So, he has finally published the attack code with full details on GitHub. According to ARSTechnica, attackers can use the fact that the ios Mail app does not remove HTML codes from incoming messages, which makes it easy for them to collect user information. For example, in a proof of concept attack, the existing HTML codes can be used to download a form which looks a lot like the icloud login prompt from the remote server. This can be then displayed when the user opens up the mail. 4
5 Since the mail app is known to ask for login details in between, this attack may turn out to be successful. Any user who does not pay close attention to the dialog may end up sending his or her password to the attacker. Versions: 8.4 Android Vulnerability Samsung vulnerability affects up to 600 million Android devices Hundreds of millions of Android mobile devices may be at risk because of a flaw in the default keyboard used by Samsung, and because of the level of access Samsung affords the keyboard software. Mobile security vendor NowSecure found that the version of the SwiftKey keyboard built-in to many popular Samsung Galaxy devices, from the Galaxy S3 to the S6 on multiple carriers, downloads language packs via HTTP and does not use a secure transfer protocol. This leaves devices vulnerable to a man-in-the-middle attack wherein a malicious actor capable of controlling a user's network traffic can intercept a request to download a language pack upgrade or new language pack and deliver back an infected file. CVE Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allow remote attackers to bypass a CVE protection mechanism via unspecified vectors. 5
6 CVSS Score 6.8 CVE Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE and CVE CVSS Score 5.0 CVE Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE and CVE CVSS Score 5.0 6
7 CVE Stack-based buffer overflow in Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allows attackers to execute arbitrary code via unspecified vectors. CVSS Score 10.0 CVE The Flash broker in Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X, when Internet Explorer is used, allows attackers to perform a transition from Low Integrity to Medium Integrity via unspecified vectors. CVSS Score 4.3 7
8 CVE Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE and CVE CVSS Score 5.0 CVE Use-after-free vulnerability in Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE and CVE CVSS Score 10.0 CVE Integer overflow in Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe 8
9 AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allows attackers to execute arbitrary code via unspecified vectors. CVSS Score 10.0 CVE Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. CVSS Score 10.0 CVE Use-after-free vulnerability in Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE and CVE CVSS Score
10 CVE Use-after-free vulnerability in Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE and CVE CVSS Score 10.0 CVE Adobe Flash Player before and 14.x through 18.x before on Windows and OS X and before on Linux, Adobe AIR before on Windows and before on OS X and Android, Adobe AIR SDK before on Windows and before on OS X, and Adobe AIR SDK & Compiler before on Windows and before on OS X do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors. CVSS Score 5.0 Versions Android Lollipop Android KitKat Supported mobiles all supported mobiles 10
11 Blackberry Vulnerability No vulnerabilities in this month Versions Tmobile Czech Windows Phone 1) OS BlackBerry Bold 9900, ) OS Blackberry 9800, 9780, ) OS Blackberry ) OS Blackberry Curve ) OS Blackberry Curve 9320, 9360, ) OS Blackberry Curve ) OS Blackberry Bold ) OS BlackBerry PlayBook 9) OS Z30, Z10, Q10, Q5, Blackberry Passport, Porsche Design P 9983 Vulnerability No vulnerabilities in this month. Versions Windows Phone
12 MobileIron Vulnerability No vulnerabilities in this month. Interesting Articles MobileIron and Google to Bring MobileIron AppConnect to Android for Work MOUNTAIN VIEW, Calif. June 10, 2015 MobileIron (NASDAQ: MOBL), the leader in mobile enterprise security, announced that it is working with Google to bring the MobileIron AppConnect framework to the Android for Work platform. Google s release of Android for Work earlier this year delivered a unified way to secure enterprise apps, and to separate work and personal data on Android V5.0 using an EMM platform like MobileIron. On Android V5.0, the combination of MobileIron and Android for Work allowed Android apps to be installed and run in a secure workspace on the device without any modification to those apps. Because the security controls are at the OS-level, they can be applied to any app running on that OS. However, many organizations have devices running prior versions of Android, specifically V4.0 to V4.4. These devices do not have Android for Work security controls at the OS-level, so Google recently released the Android for Work App. This standalone app provides a secure workspace into which other enterprise apps can be installed and therefore protected from unauthorized access. However, this cannot be done without modification to the app itself. MobileIron AppConnect containerizes apps to protect corporate data-at-rest without touching personal data. The result is that each app becomes a secure container whose data is encrypted, protected from unauthorized access, and removable. By extending MobileIron AppConnect to the Android for Work app, developers will be able to deploy any AppConnect-enabled app in the secure workspace of the Android for Work App. Because AppConnect already has an extensive ecosystem of third-party and in-house apps using the framework, this expansion can dramatically increase the number of apps that can be secured through Android for Work on existing Android devices. 12
13 Google and MobileIron will make Android for Work the security baseline for not only devices running Android V5.0, but also the millions running older versions. said Bob Tinker, CEO, MobileIron. This announcement charts the path to an integrated, consistent app security strategy across Android using MobileIron. Preview of MobileIron for Windows 10 Launches Today SAN FRANCISCO June 10, 2015 During today s keynote with Microsoft at the Mobile First Conference, MobileIron (NASDAQ: MOBL) announced the launch of the Preview of MobileIron for Windows 10. Gartner has published* the following Strategic Planning Assumption: By 2020, smartphone security and management architectures will dominate the endpoint computing environment, while traditional PC image management will decline except on dedicated appliance-style devices. Traditionally, corporations have used group policy objects (GPO) to manage their Windows devices. The model is only effective when all devices are connected to a high-bandwidth network, but it does not work with mobile devices that are only intermittently connected to the corporate network. As a result, enterprise mobility management (EMM) platforms like MobileIron are becoming a leading security and management model because they enable business users to securely access enterprise data from any device, on any network, without compromising data security. Windows 10 is the first modern operating system to unify all form factors and MobileIron will play a central role for security and management, said Bob Tinker, CEO, MobileIron. We are very pleased to be working with Microsoft to launch our MobileIron Preview for Windows 10. MobileIron plans to be the policy engine for the new security and apps model of Windows 10: Data separation and protection: Windows 10 Enterprise Data Protection (EDP) provides personal and corporate data separation and containment to prevent unauthorized access and leakage of corporate data. This gives IT the ability to ensure that corporate data is only accessible by trusted apps and that corporate content cannot leak to unauthorized apps or services (e.g., web sites). An EMM platform can set and enforce EDP policies. 13
14 Unified application security and management: In Windows 10, programmers can develop universal apps that are written once with a single set of business logic and with a user experience that can run on any Windows 10 device. This gives employees a consistent experience across all Windows 10 devices. Through an EMM platform, IT can create and enforce shared policies that apply across smartphones, tablets, laptops, and PCs. The Windows Store for Business ( provides a single destination for IT administrators to get the apps they need. An EMM platform can also give IT the controls and configurations to effectively secure and distribute both modern Windows apps and older Win32 apps. ios 9: Making a Great Enterprise User Experience Even Better Apple's annual Worldwide Developer Conference (WWDC) brings together app developers from around the world to learn what new things Apple will be adding to ios and OS X. With the addition of watchos, app developers can now plan and develop their apps with three platforms. The combining of Apple's developer programs into a single developer program underscores Apple's desire to have single place to develop, manage, and distribute apps. By promising "a better experience with every touch," the release of ios 9 is clearly designed to enhance the platform s most commonly used features. For instance, Siri is being bolstered with proactive suggestions, and new ipad multitasking features will help users be even more productive on their devices. With additional upgrades that improve system performance, extend battery life, introduce "thinner" apps and strengthen mobile security, Apple has done an excellent job of refining an already advanced mobile operating system. Here s a sneak preview of some of the new device enrollment, application management, and per-app VPN capabilities that Apple is planning to include with ios 9: Removing the Apple ID requirement: With ios 9, Apple announced that EMM providers can now distribute a Volume Purchase Program (VPP) app to individual devices instead of assigning the app to an Apple ID. Eliminating the Apple ID requirement on every device greatly simplifies fleet- deployments where often there isn t an individual Apple ID assigned to a device. This is also great news for application developers because each device will require a separate app license. 14
15 Distribute apps without the App Store: For corporate-deployed ios 9 devices, enterprises will have the ability to disable the App Store yet still be able to deploy apps through the App Store. This feature will allow mobile administrators to better maintain a standard deployment blueprint and not worry about end users installing personal apps on corporate devices. Convert unmanaged apps to managed apps: With ios 9, an EMM vendor like Mobileiron can now transition a user-installed app to a corporate-liable app. Prior to ios 9, this process required an end user to manually delete the app and then reinstall the same app via an EMM's enterprise app store. Hold in ios Setup Assistant: For institutions that use Apple's Device Enrollment Program (DEP) to mass configure and deploy ios devices, ios 9 includes a feature that allows an EMM vendor to hold the ios device inside the ios Setup Assistant until all configurations and policies have been deployed. This ensures that the ios device is completely configured and ready for the end user. Trust UI: New for ios 9 is the inclusion of an interface that allows end users to trust the certificate used to digitally sign in-house developed apps. This change allows end users to definitively identify the source of any in-house app prior to installation. EMM vendors will also have the ability to prohibit end users from trusting any external sources while still retaining the ability to distribute their own in-house apps. Per-app VPN changes: Apple announced three changes for per-app VPN. First, UDP traffic will now be supported with the current per-app VPN implementation. This is a big win for apps that require UDP in order to stream audio or video. Second, a per-app VPN connection can be established at layer 3. This is key for managing the actual data traffic that enterprises want their per app VPN connection to traverse. Third, the builtin IPSec clients (IKEv1 and IKEv2) can be used to manage per-app VPN connections. By introducing these and other exciting new features for both the enterprise and end users, Apple is once again taking the mobile user experience and enterprise security to a whole new level. With the release of ios 9, Apple is clearly committed to reinforcing its position as the leading mobile operating system in the enterprise. Gartner Positions MobileIron as a Leader and Furthest on Completeness of Vision Axis in 2015 Magic Quadrant for Enterprise Mobility Management Suites 15
16 MobileIron named a Leader for the fifth consecutive year MOUNTAIN VIEW, Calif., June 11, 2015 /PRNewswire/ -- MobileIron (NASDAQ: MOBL), the leader in mobile enterprise security, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the "Magic Quadrant for Enterprise Mobility Management Suites."* This is the fifth consecutive year that MobileIron has been positioned in the Leaders Quadrant and the second consecutive year that MobileIron has been positioned furthest on the Completeness of Vision axis. Download the full report here: report-magic-quadrant-enterprise-mobility-management-suites "Companies around the world are using mobile technology to transform their businesses and we believe our ongoing recognition as a Leader in the Magic Quadrant is the result of our focus on this new Mobile First world," said Bob Tinker, CEO, MobileIron. "The move to mobile is the most disruptive shift faced by enterprise IT in the last 20 years. Modern end-user computing is moving to the mobile model for security and management and our global customers trust MobileIron to deliver on the vision for mobile computing by delivering innovation and security at scale." MobileIron secures enterprise information wherever it lives, in the app, in the network, and in the cloud. 16
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview What is AppConnect? AppConnect is a MobileIron product that secures and protects enterprise mobile apps. It manages the complete lifecycle
Mobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Five Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Device Independence - BYOD -
Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.
PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Published Date July 2015 Contents Executive Summary 3 Introduction
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise
MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
What ios 9 Means for the Enterprise
What ios 9 Means for the Enterprise v 1.1 MKT-9152 2015 MobileIron, Inc. 1 What ios 9 Means for the Enterprise Executive Summary ios 9: Greater than the Sum of its Parts Enhanced Enterprise Security: Simpler
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
The Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Novell Filr. Mobile Client
Novell Filr Mobile Client 0 Table of Contents Quick Start 3 Supported Mobile Devices 3 Supported Languages 4 File Viewing Support 4 FILES THAT CANNOT BE VIEWED IN THE FILR APP 4 FILES THAT GIVE A WARNING
Optimizing the Mobile Cloud Era Through Agility and Automation
Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
============================================================= =============================================================
Stephan Lantos Subject: FW: @RISK: The Consensus Security Vulnerability Alert: Vol. 13, Num. 23 In partnership with SANS and Sourcefire, Qualys is pleased to provide you with the @RISK Newsletter. This
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Key Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
Windows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Mobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
Security Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
EndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
MobileConnect. Getting Started Guide
MobileConnect Getting Started Guide 1 Table of Contents Compatible Device List! 3 Operating Systems, Applications, & Personal Computer Devices:! 3 Mobile Devices & Mobile Operating Systems:! 3 Setting
Enterprise mobility trends 2015 and beyond
Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources
PrinterOn Mobile Applications for ios and Android
PrinterOn Mobile Applications for ios and Android Table of Contents 1. Key Features & Functionality... 4 1.1. Printer Discovery... 4 1.1.1. Location-Based Search... 4 1.1.2. Keyword Search... 5 1.1.3.
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
In-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
Fear and Loathing in BYOD
A SANS Analyst Survey Written by Joshua Wright Advisor: Chris Crowley December 2013 Sponsored by Trusted Computing Group 2013 SANS Institute Introduction It s not shocking to see media reports depicting
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
Special Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Mobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
JUNOS PULSE APPCONNECT
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Why Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
