Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Size: px
Start display at page:

Download "Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition"

Transcription

1 Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1

2 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the organization s office, behind an enterprise firewall and/or was primarily non-proprietary or confidential in nature, such as regulatory compliance. The increasing popularity of mobile learning is rapidly changing how and where we learn, which, in turn, changes the content both in instructional design and around sensitivity and confidentiality. Business need Expectations from an increasingly mobile workforce are forcing organizations to empower their employees through Bring Your Own Device (BYOD) programs that aim to facilitate personal devices for work purposes. Employees are content they don t have to carry around multiple mobile devices and feel connected to the office. Companies are satisfied as this practice reduces cost and increases productivity levels of the workforce. However, this growing trend introduces less secure mobile devices with access to sensitive corporate information, and enterprise IT. As organizations apply policies less rigorously on isolation, their Information Security departments are starting to enforce strict Acceptable Use and Security policies on what content personal mobile devices have access to in an effort to protect against device data theft. Intuition s technology solutions, including the Rubicon Mobile Learning Platform strive to maintain customer proprietary information and content secure in our cloud-based servers, on the employee device, and as data travels over the air to and from the mobile devices. Intuition administration tools provide a Central Control enabling organizations to keep their content, data, and information secure at all potential points of vulnerability. Central Control s in-on-over approach to keeping critical information and data secure and protected is described in the following sections of this document. Intuition statement of security Intuition only employs the best industry practices for both security and performance. Network performance, network security and customer support are three vital areas of our business and, as such, Intuition has implemented a rigorous system of checklists and developed a comprehensive set of criteria for ensuring that the four primary objectives of any high performance Data Centre (security, availability, scalability and manageability) are achieved. All of these practices are covered by the company s ISO 9001 accreditation. Intuition implements various security techniques to provide multiple layers of protection against intrusion incidents and events. We use industry standard security controls such as physical, electronic and procedural safeguards, including data encryption and Secure Sockets Layer (SSL) technology. We also update and test our technology infrastructure regularly to maintain and improve the protection of our customers' information and data. Our Data Center is governed by SSAE-16 and ISO Information Security Management (pending) standards, which provides data retention and restricted access rights to sensitive customer data. Definitions HTTPS: HyperText Transfer Protocol Secure sockets provide encrypted communication between the MLP servers and apps that run on all activated mobile devices. LMS: Learning Management System a platform which manages learning, including hosting e-learning courses and enables users to login, launch and track elearning content. MDM: Mobile Device Management a system which manages policies, apps and security settings on mobile devices. Some MDM platforms manage a specific mobile device 2

3 Mobile Security platform, while others can handle multiple platforms. For example, BlackBerry Enterprise Server (BES) typically only manages BlackBerry devices although this is set to change late 2012 as BlackBerry FUSION will allow a BES server to manage both iphone and Android devices. Other multi-platform device MDM platforms include Good Technology, MaaS360, MobileIron and AirWatch. MPL: Mobile Learning Platform an end-to-end (e2e) system that provides tools for creating, distributing, consuming, tracking and reporting on mobile learning content. The platform comprises an app installed on the mobile device, mobile-ready content, and server software to which the app connects to authenticate the user, retrieve content and report tracking data. SAAS: Software as a Service is a model for the delivery of a software platform where a software provider hosts and maintains a product and all data associated with it. Typically the provider is the software vendor themselves. SAML: Security Assertion Markup Language is an XML-based open standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SSL: Secure Sockets Layer is an encryption protocol which secures communication between a client and the server they connect to over the Internet. The Intuition MLP uses an SSLv3 certificate which has an RSA 2048-bit public key. Intuition Mobile Learning Intuition s award-winning mobile learning platform for BlackBerry, iphone/ipad, Google Android and Windows phone enables organizations to deliver learning, knowledge and information to their mobile workforce. The Mobile Learning Platform (MLP) comprises two key components: The mobile app: Intuition s mobile apps allow a mobile device user to browse and download available content, launch and consume content (including times when the device is out of mobile coverage), complete exams and surveys, and upload tracking and progress data to the server. Mobile LMS: Intuition s Mobile LMS is used for administering users and groups, assigning content and reporting on usage. It is also used as the administration interface for the MLP. Intuition Mobile Learning platform - security features The MLP manages content distribution and tracking through a six step process: 1. Saas infrastructure 3

4 Mobile Security Server Architecture: The Intuition mobile learning solution runs on a multi-tenant SaaS platform where data is stored in a single, securely segregated database. The company is in the process of implementing an ISO Information Security Management System and our Data Centre is SSAE-16 compliant. Network and infrastructure: If required, Intuition utilizes the Akamai global acceleration network for handling high latency communications on a global basis and for providing content caching services via secure networks globally. Rigorous testing: Ongoing development and releases of the MLP are subject to ISO 9001 compliant development and testing procedures. The platform is penetration-tested on a regular basis by independent external organizations and the overall platform is maintained with security patches and updates to ensure that it complies with the latest security fixes. 2. Provision or install the app To enable secure content distribution and tracking, the Intuition mobile app must be installed on the user s mobile device. Depending on enterprise or organizational policy and available resources, app installation is possible by a user-initiated pull or download or by an automated administrator-initiated push. A user-initiated download of the app to their mobile device through a mobile-enabled web page or a company App Store Pull Option 1: Downloading through a mobile-enabled webpage is the least secure of the app provisioning options and may cause additional complexities to app maintenance and updates. We recommend that pull provisioning is only implemented if push options are not technically possible. Pull Option 2: Downloading from a consumer App Store, such as the Apple AppStore, Android Market, or BlackBerry AppWorld, is more secure than Pull Option 1. However, the app is visible to anyone with access to the consumer App Store and this option may incur additional or escalating costs. Pull Option 3: Downloading from a company App Store is the most secure of the Pull options. This method enables improved app maintenance and app updates through on-device notifications and communications. Push or over-the-air (OTA) recommended An automated administrator-initiated download of the app to one or more mobile devices. Push provisioning requires an MDM platform where an administrator assigns and deploys the app to mobile devices with no user actions required. MDM facilitates additional security management and policy enforcement controls such as disabling device features (camera, SD card, Wi-Fi, and more), password enforcement, remote locking, device wiping/reset, and application management. Push provisioning through an MDM is the most secure option and it enables automated app maintenance and app updates similar to the initial app push provisioning. This method is also referred to as Over-the-Air or OTA deployment as no end user actions are required, such as plugging their device into a computer to access updates. Intuition recommends that organizations have a fully functional MDM platform which manages all mobile devices with access to enterprise data or information. This approach provides the greatest flexibility, control and security. It also allows utilization of existing business processes, without creating an additional workload for support services. 4

5 3. Activate and register the app Mobile Security When the app is installed, it must be launched and activated within the app welcome screen. Activation registers the user s mobile device with the MLP, which authenticates the user s credentials and permissions to access content and MLP features. When authenticated, the user data, such as their name, is sent to the device over HTTPS and encrypted before being stored on the device. A unique activation code or integrated Single Sign-On (SSO) may be used to register users. Both processes require the device to be online as the MLP may be contacted for validation. Each unique organizational build of the app is tied to that specific enterprise, preventing an app from one organization activating against another organization in the SaaS infrastructure. Activation code This process involves a user entering a unique code into the app which is sent to the MLP SaaS server for validation. The server stores a valid activation code against each user. When the user activates, the server marks the user as activated, and records the specific mobile device information for reporting and support. Activation codes can be randomly generated or they can use a unique user identifier, such as Employee ID or address. The use of commonly known identifiers, such as Employee ID, may streamline communications, but are less secure than randomly assigned codes. Single sign-on or simplified sign-on (SSO) and SAML Integrating the MLP with an enterprise SSO or SAML system allows the activation process to use standard enterprise credentials, such as those used to log into a computer or enterprise intranet. These SSO login screens are formatted to correctly display on the smaller screens available on mobile devices. SSO or SAML integration enables several benefits for both the user and the administrator including streamlining communications, improving support resolution, and simplifying re-authentication or reactivation on a new or upgraded device. SSO and SAML integration significantly improves MLP access security and administration control through employment validation. 4. Encryption enforcement The MLP incorporates a setting which determines the minimum version of the app that can activate. This feature ensures that only apps which support the latest encryption can be activated. Downloading content and uploading progress When the mobile device and app are authenticated and registered with the MLP, the user can download and launch the content and upload their learning progress to the MLP. Uploading content to the MLP Content is uploaded to the MLP via an SSL-encrypted web page. An administrator can log in to this web page, specify a file to upload from their local computer, enter the item details or use in the MLP, upload the content and create the learning object in the MLP. 5

6 Data in transit downloading and uploading Content is downloaded over a secure HTTPS channel. As the content downloads, it is rapidly encrypted before being stored. In the event of a download interruption, the files are discarded so that either the content is downloaded and encrypted or it is not downloaded. Each time content is accessed, it is decrypted as it is read. Uploaded information is continuously scanned for malicious viruses to prevent crosscontamination of the entire MLP. LMS Integration Intuition s MLP can be deployed as a standalone solution and fully or partially integrated with existing customers LMS and HR systems. Intuition has successfully implemented numerous LMS integrations for customers, including Cornerstone, Plateau, and Saba. Intuition s bidirectional SFTP server or Web Services provide a secure transport mechanism for the exchange of encrypted files between an existing customer s LMS and the MLP. 5. Running / viewing content Although wireless communication speeds and networks are increasing rapidly, Intuition believes that access to content on a mobile device that has no wireless signal or a low quality signal is critical for user performance and experience through the MLP. As such, content is available for consumption through the app even when the mobile device is offline. Data at rest double encryption The app itself is a closed environment and does not allow any data or content to be extracted to the device or data to be introduced from the device into the app. As a result, it is a highly secure environment supported by the fact that the app content can be remotely wiped by the server. Data is further encrypted on the device itself using built-in encryption libraries, such as AES-256-bit and DES-192-bit. By default, content is stored on the internal memory of the device, but where the device supports external memory cards and the server has enabled external storage of content, external card storage is possible. Each device platform provides different levels of support for encryption and memory cards. 6. User and app management The MLP provides administrators with a high level of control and management of users and content access. Many features are designed to increase security and control for mobile devices not governed by an MDM. Deactivation of users An app can be deactivated in two ways: 1. By the device user choosing to reset the app on the device. This resets all settings and removes all user data setting the app to the pre-activation state. 2. At the server by the administrator. At the next synchronization event, the server will instruct the app to reset itself. A. For automated deactivation of users, this can be managed manually (through admin screens) or automatically through the feed. 6

7 b. For manual retirement of users, administrators can deactivate a user, which maintains their records in the system. However, this action prevents the assignment of content or does not permit the user to access the system. c. For automatic retirement, user records can be deactivated via the process that manages the periodic feed from the client s Enterprise Directory. App upgrade MDM providers allow full control over which version of an app is installed on a device. App installation files can be updated via the MDM Management system and pushed out to users. The MDM provider can automatically push app upgrades to mobile devices. App updates can be sent from an MDM to the mobile device in the background and OTA. Users are not generally required to perform any actions in order to update the app via an MDM using the MDM Deployment App. APP Removal When the app is removed from the user s mobile device, the user s name and all secure encrypted learning items are removed from the device. The user can manually remove the app from the mobile device, or the administrator can remove it through an MDM. Logging and reporting The ability to generate and log instant security reports of user behavior on-device can immediately help identify any security issues. Intuition supports the recording of security events in one or more specific security event logs to ensure that information relevant to a security breach is readily available. Access to security event logs is limited to authorized IT security staff. All instances of cleared system events or any modified system security policy are recorded. Any changes made to the system log settings are recorded (for example, logs for certain events are turned off). The system includes the Logical Account identity, event type and timestamp in each entry in the security event logs. Roaming controls The Intuition apps and MLP can enforce control of downloads while the mobile device is roaming on another carrier s network. Using server settings, the device can be prevented from downloading content while roaming, except when a Wi-Fi network connection is available, resulting in the avoidance of unnecessary and expensive roaming charges. Remote access Administrators can manage devices and users from the server in order to deactivate a particular user or to assign/unassign (and consequently add or remove) content on a user s device. The changes are implemented at the next synchronization event for the device. Screen lock and timeout The Screen Lock feature protects data downloaded to the app from being accessed by unauthorized users. It provides an authentication step before content can be accessed. This feature protects content and data if a device is lost or stolen, or otherwise accessed by an unauthorized user. The Screen Lock does not require the device to be online, so data is secure even if the device is unable to connect to the MLP and during the period before it is deactivated or remotely wiped. 7

8 The Screen Lock prompts the user to enter their PIN when the following configurable events occur: App launch each time the app is launched on the device. Timeout where the user has been inactive on the app for more than 20 minutes. Restored from background each time the app is reactivated having been in background mode. Pin code rules To prevent weak PIN codes from being used, the app enforces the following rules whenever a user sets or resets their PIN code. The PIN code must: Be four digits in length, and Contain no more than two sequential numbers, for example, 1249 and 1967 are valid, 1239 is not, and Contain no more than two identical numbers, for example, 1149 and 1491 are valid, 1141 is not. Setting the screen lock pin The following steps describe how the screen lock PIN is set: 1. The first time that the user launches the app, the SSO activation process is initiated. 2. If successful, the user s device is registered to their specific user account on the MLP. 3. The app prompts the user to create a four-digit PIN code to allow access to the app. 4. The user is prompted to re-enter their new PIN code (for confirmation). 5. The user can now use the app Changing the screen lock pin The following steps describe how a user can change the PIN code they previously set up for a device: 1. The user launches the app and enters the PIN code. 2. The user navigates to the app settings menu (within the app) and opts to change their PIN code. 3. The user enters their old PIN code and enters a new PIN code twice (for confirmation). 4. The new PIN code is stored within the app Resetting a forgotten screen lock pin Using SSO or an Authenticate Code, a user can be authenticated and assigned permission to reset their PIN code if forgotten. To do this, the device must be online. 1. The user clicks on the Forgotten PIN code link on the app s PIN code entry screen. 2. The SSO Authentication process is initiated. 3. When the user is authenticated and confirmed as a registered user, they will be allowed to set a new PIN code by entering it twice (for confirmation). Limitation of attempts If a user incorrectly enters the PIN code twice, they will be warned that any further attempts may risk losing data. They are also offered the opportunity to reset their PIN code using the previously described method. If a user enters an incorrect PIN code for a third time, the app is fully reset resulting in the removal of all data held on the device including content and tracking data. 8

9 Time out conditions The user is prompted to enter their PIN code if they have been inactive on the app for more than 2ominutes. This timeout condition applies in certain scenarios, including: Launching the app but not being active on it for more than 20 minutes. Switching the app to background mode. Launching media from the app which plays in an external player. 9

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Salesforce1 Mobile Security Guide

Salesforce1 Mobile Security Guide Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

SharePlus Enterprise: Security White Paper

SharePlus Enterprise: Security White Paper INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with

More information

Connectivity to Polycom RealPresence Platform Source Data

Connectivity to Polycom RealPresence Platform Source Data Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Spring Hill State Bank Mobile Banking FAQs

Spring Hill State Bank Mobile Banking FAQs Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an

More information

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...

More information

Egnyte App for Android Quick Start Guide

Egnyte App for Android Quick Start Guide Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Security for Mobile Administrator's Guide Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

More information

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

White Paper. Data Security. journeyapps.com

White Paper. Data Security. journeyapps.com White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management

More information

Resco Mobile CRM Security

Resco Mobile CRM Security Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

Enterprise Security with mobilecho

Enterprise Security with mobilecho Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

A Technical White Paper

A Technical White Paper A Technical White Paper An Introduction for Technical Audiences Abstract This white paper provides an overview of Microsoft System Center Mobile Device Manager 2008, an end-to-end solution for provisioning,

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

Proposal Document TitleDocument Version 1.0 TitleDocument

Proposal Document TitleDocument Version 1.0 TitleDocument G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Licensing Guide BES12. Version 12.1

Licensing Guide BES12. Version 12.1 Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

NetSuite OpenAir Mobile for Android User Guide Version 1.3

NetSuite OpenAir Mobile for Android User Guide Version 1.3 NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

The Essential Security Checklist. for Enterprise Endpoint Backup

The Essential Security Checklist. for Enterprise Endpoint Backup The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

WALKME WHITEPAPER. WalkMe Architecture

WALKME WHITEPAPER. WalkMe Architecture WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises

More information