Smart Containerization
|
|
- Candice Owen
- 8 years ago
- Views:
Transcription
1 WHITE PAPER Smart Containerization A unique technology that manages security, performance, compliance and support characteristics of any device, application, content or while preserving the quality of the mobile user experience Nagi Prabhu James Rendell
2 2 CONTAINERIZATION Introduction what is Containerization? con tain er i za tion [kuh n-tey-ner-uh-zey-shuh n] noun Transportation. a method of shipping freight in relatively uniform, sealed, movable containers whose contents do not have to be unloaded at each point of transfer. Containerization as a technique was invented in the 20th century in ocean shipping to make transporting of freight simple, fast, secure and efficient. In this technique freight is segregated by its type, placed in uniform size containers and transported using various transportation methods. Though they are of uniform size, each container is treated differently based on what content it holds. For example, some containers may be refrigerated while others may require humidity control, etc. A container may leave a factory by truck and be transferred to a railroad car, then to a ship, and, finally, to a barge. Transfers of an un containerized cargo will result in theft, loss of efficiency and substantially add to the cost of transportation. These principles have been adopted in enterprise mobility to keep enterprise data segregated on a mobile device. The principle is that all enterprise data can be placed inside a container, keeping it separate from the users own data. By doing so, enterprises can allow the employees to use their device, applications and data in a manner they please, but applying security policies on the container so that the data inside it can remain protected. Various mobility vendors have attempted to implement this seemingly simple technique differently and with varying degrees of success but in the end, none has been completely accepted. Some of these different technologies are outlined below. A. Using a Single On-Device Application In this implementation, a single, proprietary, specialized application is required to access all the enterprise applications, with fundamental common mobile PIM (Personal Information Management) applications such as , calendar, contacts, etc. being duplicated in proprietary form within the container app. These parallel apps require the end user to learn new, non native user interfaces for the basic mobile functions of messaging, and web browsing, with the result that this form of containerized solution is widely disliked by end users. All applications, regardless of the type or sensitivity of the data that they access, are placed inside the container application. The mobile device s built-in applications or other third-party applications cannot access the container or the contents inside the container. Such a specialized container approach is marketed as a security solution, on the premise that enterprise data is separated out from personal data on board the device, enabling the enterprise to remove the container, and therefore all the data inside it, as required. Comparing this to the shipping analogy, this approach is like creating a single gigantic container and placing all cargo types inside it regardless of whether the freight requires any special handling, is perishable, requires refrigeration and so on. A single container approach quickly becomes unmanageable due to its size, is extremely inconvenient to load and unload, and is unable to support the different types of handling required by different freight types. As a result in the real world we do not see freight shipped this way and similarly in the enterprise mobility space, the approach does not enable enterprise data and apps to be managed in a flexible and granular way.
3 3 CONTAINERIZATION B. Using Remote Access Several software vendors have specialized in remote desktop access technology to provide a solution where the data and applications are run on a desktop or server computer in the data center and access is provided to the computer over the network by streaming the native PC user interface to the mobile screen. By simply drawing the desktop or server user interface on the mobile device, all of the advantages and power of the mobile device s native user interface are lost and the quality of the experience of the end user becomes entirely dependent on a very high quality network connection remaining available while the remote application is in use. From a security standpoint, the premise is that by keeping the data and applications running only inside the data center and by not transferring the data on the mobile device, there is no chance of data loss or theft. To extend our shipping container analogy, this solution would be akin to putting the cargo in containers and providing a webcam feed to view the contents of the container and a remote control robot arm to access the cargo. This solution provides no value as no cargo is physically being moved to the destination where it needs to be consumed. C. Using Dual Personas Certain device manufactures attempted to implement containerization through a technology known as dual persona. In this method apps, and content are secured by creating a container in the form of a duplicate environment on the phone. Users are forced to keep all their personal apps, s and data in one environment while enterprises use the second environment to keep their apps and data. No interaction is allowed between the two environments. Enterprises can destroy the second environment thereby destroying all the data and apps they would have placed on the device. With regard to our shipping analogy, this solution is equivalent to dividing the ship into two halves with a thick, impenetrable partition. The cargo is divided across the two sides with the partition preventing any movement of cargo between the two halves. While the separation seems beneficial, if the job at hand requires cargo from both sides, then one will have to shuttle back and forth between the two halves to complete the job. D. Using Virtualization Virtualization vendors create a container in the form of a phone within a phone. Inside the operating system that is present in the mobile device another virtual device is created to host the enterprise application and data. By removing the virtual device, one can easily remove the enterprise app and data. The assumption was that virtualization could be applied to all devices and operating systems, however it turns out that this technique is incompatible with the majority of devices, such as most Android implementations and Apple s ios, where the low level hacks needed to implement virtualization are prevented by the device manufacturer. The virtualization approach can be compared to placing one ship inside a larger ship. Besides the inconvenience of moving between the two ships to perform any job, this would be extremely space inefficient. The ship hosted inside would consume the precious cargo space of the main ship. Hardly any ships are built to host another ship inside themselves and most ships would not have enough surplus engine power to drive the mass of an additional ship. This analogy is true for mobile devices: almost none are adapted for virtualization and the resource consumption impact of having a phone within a phone is too great for most devices.
4 4 CONTAINERIZATION Although each of the techniques of containerization seems like a straightforward proposition on the surface, none of the techniques above provide a holistic mobility management solution for the enterprise. In addition to the points above, the existing containerization techniques suffer from a variety of other inherent drawbacks: It s all about the user: Existing containerization solutions are built only to address security challenges, completely missing the opportunity to solve other problems such as performance management, application support and user experience management. A strategic, future-proof approach to mobility management ensures that the users not only access apps and data securely, but also enjoy a great experience while doing so. Market research indicates an increasing trend of individual users owning 2 or 3 devices simultaneously. Thus scaling user experience becomes even more critical when mobile applications are rolled out to millions of devices across multiple platforms. Not granular: Placing all of the data in a single container leads to all data being treated the same way. Thus, there is only one security policy: the policy applied to, and enforced by, the container. Because the enterprise deals with many different types of data, each with distinct management and security requirements, the one size fits all policy approach is too inflexible for enterprise-wide use. Not multi channel: Current containerization solutions that operate only on mobile devices such as ios and Android are typically not multi channel in nature. In a Never, Never Land enterprise where only mobile devices were allowed, this may not have been an issue. But increasingly, mobile devices are just one of multiple device types that are used to access enterprise applications and data. Because they operate in a mobile silo, these solutions require the enterprise to find additional, separate security solutions for the other device types like laptops, desktop PCs, smart meters, IP cameras, etc. in use in the enterprise. Not borderless: In today s always on, always connected world characterized by pervasive mobile device use, the ability to control the usage of data outside and inside the enterprise is of prime importance because outside the enterprise is precisely where confidential data is exposed to the greatest risk. In short, security solutions have to be borderless. Thus, despite the fact that these first generation containerization solutions are marketed as security tools, their effectiveness for enterprise mobility management is severely lacking. CA Smart Containerization CA Management Cloud for Mobility is powered by Smart Containerization technology from CA Technologies. Smart Containerization associates a policy describing security, performance and support requirements with individual content, s, apps or devices. Thus, a single file, mail, app, or a device, is protected within a Smart Container, which enforces policies appropriate to the type of content being managed. For example: A mobile app may have a policy controlling where (i.e. a geographic location or Wi-Fi network) it can execute. A single may have an encryption policy applied to it based on its content, or the may have a policy that prevents it being forwarded outside the enterprise. A document may have a policy preventing it from being stored locally on the device. An application may have a policy that collects and reports the performance characteristics of the device or itself.
5 5 CONTAINERIZATION Smart Containerization solves the critical issues in first generation containerization solutions outlined below: Smart Containerization delivers high end-user acceptance by preserving a native device user experience. Applying a single treatment to all the data and/or apps makes the container very intrusive when it comes to the user experience on the device. The Smart Container is transparent and leaves the user experience of the device in its native form. Smart Containerization technology is multi channel in nature, covering PCs and laptops as well as mobile devices. Smart Containerization is inherently borderless because policies can flow with data, content, apps and devices as they move. This chart shows how the containerization techniques described above stack up against these criteria. Smart Containerization Granularity Dual Persona Secure Container Virtualization Remote Access Manageability Size of the bubble indicates diversity of the things the container can manage Smart Containerization provides the granular control that enterprises require because content, s, apps or devices can be self defending and describe their own security and support requirements to the container. A Smart Container enables all IT management domains an enterprise would like to perform on the mobile device, data and applications be it performance, security, support, user experience management, etc. To relate Smart Containerization back to our shipping container analogy, Smart Containerization is equivalent to creating multiple containers each optimized for different cargos, which enables one to match cargo transportation requirements to the specific containers with appropriate attributes, e.g. ice cream and meat can be put in the same container since they both require freezing, whereas vegetables may require a temperature controlled container but not one that freezes cargo since that might destroy the vegetables, and so on.
6 6 CONTAINERIZATION Smart Containers would offer many benefits over and above simple protection of the contents: They would provide adaptive environmental controls such as humidity, light intensity and temperature based on the containers contents. Smart Containers can optimize their energy consumption based on circumstances such as the ambient temperature or the time of day. Smart Containers are aware of who is allowed to access the content inside, making it easy for authorized people to enter the containers while blocking others from entering the container. Adaptive, Smart Containers make it easy for the transporter to simply place the content in the container and let the container take care of the contents from that point forward. The following sections describe how the products within the CA Management Cloud for Mobility implement and enforce their particular policy responsibilities powered by Smart Containerization. Devices: CA Mobile Device Management (CA MDM) CA MDM manages the inventory and configuration of a variety of mobile devices, as well as Windows PCs, and provides for remote management of these devices in a secure, scalable manner. Smart Containerization for CA MDM begins with the device hardware and software stack and works through to centralized granular policy control and configuration of a multitude of device features camera, network access, GPS control, etc. Mobile device platform features: An interesting development in the mobile space is that the mobile device manufacturers are increasingly taking responsibility for the security, integrity and robustness of the platform they provide. In just the same way as we expect automobiles to provide built-in safety and security features, so the mobile device manufacturers are responding to consumer expectations that mobile devices will also provide appropriate security features. Notable amongst these are Apple s security features in ios 7, and the Samsung For Enterprise (SAFE) and KNOX security capabilities for Samsung Android devices. CA MDM s support for Apple s ios 7 security features and Samsung s Android security extensions enable Smart Containerization protection to be applied to these devices providing a firm foundation on which to deploy additional security capabilities to control the use of apps, content and . Typical features provided by these platforms, which can be centrally controlled via CA MDM include: Managed Open-In: On ios 7, CA MDM can centrally control the list of apps allowed to open content of a given type, regardless of whether additional apps are available to the user. For example, if an enterprise has a specific PDF reader that is an enterprise standard, that PDF reader can be defined as the only reader app that can open PDFs attached to s, downloaded via Safari, etc. This enables the ios 7 device to Smart Containerize selected data to specific apps on the device.
7 7 CONTAINERIZATION Per App VPN functionality enables an app to be Smart Containerized to a given network on both ios 7 and Samsung Android. For example a corporate application can be configured to automatically start and only function if a specified VPN connection is available, thereby preventing a sensitive enterprise app from making unfettered use of the internet. Advanced app controls on Samsung Android allow CA MDM to centrally control app installation and removal, as well as to blacklist and whitelist apps and centrally wipe an app s data. provisioning controls allow for centralized account configuration and removal. Device feature controls allow central administration of individual hardware components such as Bluetooth, WiFi and camera as well as storage encryption. Enterprise Single Sign On enables the mobile device to integrate with a Microsoft ActiveDirectory or other Kerbero based authentication environment. Secure web browsing capabilities allow for URL blacklisting and whitelisting as well as centralized control of browser privacy options and enforcement of an HTTP proxy for secure internet browsing from the mobile device. CA MDM can control the distribution of apps to mobile devices via an Enterprise App Store. When used in conjunction with CA Mobile Application Management, CA MDM can distribute Smart Containerized enterprise apps to mobile devices. CA MDM also supports many other device platforms including Windows Phone 8, BlackBerry and all other generic Android-based devices (Android 2.2 and above). Smart Containerization via CA MDM allows an enterprise to apply robust, granular, security policies regardless of the type of device in use. Apps: CA Mobile Application Management (CA MAM) CA MAM enables advanced, granular control over the use of apps on the mobile device and the availability of specific device features to each mobile app. In essence, each app is wrapped with a Smart Container that applies granular policy control to the app. The diagram to the right illustrates how Smart Containerization is applied selectively to two apps on a mobile device: The CA Corporate Escalation app has a policy attached to it that specifies it can only be executed when the device is located at CA Islandia Headquarters or CA Ditton Park EMEA Headquarters and that camera access is allowed, however Copy/Paste from the app will be prevented. The CA Business Intelligence app, which is an analytics and reporting app, has a policy attached to it that specifies that it can only be executed on a weekday, is allowed to access the internet and to have data Copy/Pasted.
8 8 CONTAINERIZATION CA MAM s Smart Containerization policies allow apps to be controlled in many granular ways: Identity: The specific users or groups that are allowed to execute an app or are prohibited from executing it. Apps: The specific app or apps the policy relates to. Geofencing: An app can be configured to only execute when the device is in a certain location or can be prevented from executing when the device is in a certain location. Time Fencing: The time windows when an app may, or may not, be executed.
9 9 CONTAINERIZATION Network: An app can be explicitly locked to a specific WiFi network segment, e.g. an app can only be used when on a corporate WiFi network. Selective wipe: Where access to an app is forbidden, there are additional options to lock access to the app and to permanently, but selectively, wipe any data stored on the device by the app. Features: An app can be enabled or disabled for access to many device features, e.g. Copy/Paste, GPS, Camera, Contacts, etc. Smart Containerization via app wrapping through CA MAM is an ideal complement to device security features. Where the device in use does not provide specific platform security features then CA MAM adds a much-needed layer of control. Where the device does provide built-in security features, CA MAM adds security controls to the app that are not provided through the devices own, built in security functions.
10 10 CONTAINERIZATION Content: CA Mobile Content Management (CA MCM) CA MCM provides a platform to enable secure collaboration where content is shared between users with mobile, as well as non-mobile, devices. CA MCM applies Smart Containerization protection to data on the mobile device to ensure that only authorized users can view content and to prevent abuse of sensitive content by preventing local copying and copy/pasting of content.
11 11 CONTAINERIZATION The content owner can control who should have access to content. Authorized content users have the ability to comment on content in real-time. Content updates are instantaneously available to authorized users as content is updated. CA MCM manages the back-end connections to multiple data stores and repositories, such as cloud-based file sharing services, enterprise content management systems such as SharePoint and commonly-used SaaS applications such as Salesforce.com. Smart Containerization solves a traditional problem where different back-end repositories , file share, web download, etc. each have to be individually secured. In that legacy environment, the security attributes were defined according to the channel ( , file share permissions, web application permissions, etc.) and these may not be consistent between channels or appropriate for the content. Smart Containerization through CA Mobile Content Management makes the back-end repositories abstract to the user and applies security policy directly to the specific item of content, rather than inferring the policy based on the repository it was stored in. Although CA MCM provides an easier way for users to securely share and collaborate on sensitive content than simply ing it around, it is of course still the case that has a vital role to play in the enterprise, hence the secure management of content via the CA MCM platform is complemented by CA Mobile Management, a platform to enable sensitive s to be protected. CA Mobile Management (CA MEM) As noted in the introduction, Smart Containerization can apply to a single , as well as a single app or single document. CA MEM applies policy-based public key encryption to s that have been identified as containing sensitive data. Many of the s that users exchange are not actually sensitive. Often an simply contains non-sensitive, trivial or publicly available information and applying protection to such s is a waste of resources and inconvenient for the user. For example, in the simplistic containerization model a user has to open up a special client to access their corporate only to find a new message discussing a team social event! In contrast CA MEM encrypts only the sensitive s. The encryption is based on the recipients public key and the recipient must authenticate using the corresponding private key in order to decrypt their .
12 12 CONTAINERIZATION Smart Containerization through CA MEM solves the critical issues with simplistic containerization in various ways: Native client experience: As noted in the introduction, end users are highly resistant to security solutions that require them to use a separate, proprietary client that duplicates basic mobile device functions. CA Mobile Management integrates with the mobile device s native client, which provides a far more satisfactory user experience. Cross platform: CA MEM integrates with webmail and Outlook clients, providing Smart Containerization functionality on any device available to the user for access. If the device is internet enabled, CA MEM can support it. Borderless: CA MEM can encrypt s for users who are not yet enrolled, generating a public/private key pair and retaining the keys in escrow, along with the encrypted until the user enrolls. Additionally the solution works seamlessly inside and outside the enterprise. External users are equally able to enroll on the system to manage sensitive content as are enterprise users. The ability to provide protection policies that apply to the , without dependencies on the user being an internal enterprise user in order to security policy to be applied is a key benefit of Smart Containerization. Multi-Factor Authentication: As illustrated above, the mobile device therefore becomes an authentication factor in its own right. This ensures robust proof of identity when accessing sensitive content. AT&T
13 13 CONTAINERIZATION Summary Containerization emerged as a simple approach to securing corporate data on the mobile device, however, its simplicity also came with a number of critical weaknesses in terms of not being granular enough for today s enterprise requirements, nor robust enough to resist emerging advanced threats. In addition, being limited in scope to managing data only on mobile devices within the enterprise meant the solution was too restrictive for today s enterprises strategic requirements. Couple these enterprise issues with the fact that end users hate the way these containerization technologies force the user to abandon the mobile devices native user experience and it s easy to see why enterprises are anxious for a replacement technology to emerge. Smart Containerization by CA Technologies is unique in delivering the best user interface experience that end users insist on and provides advanced security features such as support for the latest platform security features, complete management benefits beyond security and robust multi-factor authentication, as well as being truly borderless and multi-channel supporting mobile, as well as non-mobile, devices. For further information about Smart Containerization by CA Technologies, please contact your CA account team and visit /mobility. Connect with CA Technologies at CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate across mobile, private and public cloud, distributed and mainframe environments. Learn more at. Copyright 2014 CA. All rights reserved. This document is for your informational purposes only, and does not form any type of warranty about the products or offerings described herein. CS _0914
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationEnterprise Mobility: winning strategies to get your organization ready for the future
Enterprise Mobility: winning strategies to get your organization ready for the future Luca Rossetti Sr Business Technology Architect February, 26th 2014 2014 CA. All rights reserved. Power Of Mobility
More informationCA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationMobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise
MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationAttaining Enterprise Mobility Nirvana through Smart Containerization
Attaining Enterprise Mobility Nirvana through Smart Containerization 451 Research Enterprise Mobility Executive Summit September 16, 2014 Nagi Prabhu VP, Product Management CA Management Cloud for Mobility
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationEnabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility
Enabling a Mobile Enterprise Mark Holobach Senior Systems Engineer Citrix Mobility Enabling a Mobile Enterprise Your Technical Blueprint To Getting Started Mark Holobach Citrix Systems How Mobile Feels
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationSOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term?
SOLUTION BRIEF June 2014 How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF While bring your own device (BYOD) and physician texting are hot
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationWhich is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO
Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people
More informationBENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationPULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
More informationMDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
More informationEnterprise Mobility Management
Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to
More informationI D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment
I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationTotal Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com
Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationMobile Security Without Barriers
SAP Mobile Secure Mobile Security Without Barriers Securing your enterprise for all the new and expanding mobile use cases is similar to protecting your home. Merely locking your doors won t suffice. You
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationWHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013
WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationIMPLEMENTING YOUR BYOD MOBILITY STRATEGY
IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationSA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationComprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationVodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationThe Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationVodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationperspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationSecure BYOD with Enterprise Mobile Management
Plan & Deliver Secure BYOD with Enterprise Mobile Management Suril Desai VP, Engineering 75% of Enterprises support BYOD 2 Copyright 2013 CA. All rights reserved. Worldwide Smartphone Growth continues
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationSecuring Mobile App Data - Comparing Containers and App Wrappers
WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationMaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
More informationSamsung KNOX: An Overview for Business Customers
CENTRIFY WHITE PAPER. SEPTEMBER 2013 Samsung KNOX: An Overview for Business Customers Abstract Samsung, the mobile device market leader, has introduced Samsung KNOX for its Android-based mobile platforms
More informationWindows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
More informationMobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
More informationTRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationPOINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION
POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION Executive Summary Enterprise mobility has transformed the way businesses engage with customers, partners and staff while exchanging
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationSecure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationIBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
More informationHIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
More informationUnified Windows Device Management in the Enterprise
Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be
More informationWHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationMAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationA guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationWorking Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444
Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationEFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake
EFFECTIVE BYOD A presentation by: Tzachy Givaty, CommuniTake MOBILITY TRENDS 2 MOBILITY TRENDS The Mobile-First organisation Apps drive the business BYOD On device data security - anti Cyber Crime 3 MOBILITY
More informationKaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
More informationTuesday, June 5, 12. Mobile Device Usage
Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.
More informationDesigning Enterprise Mobility
Designing Enterprise Mobility Cortado Corporate Server One Solution for All Enterprise Mobility Challenges Advanced Mobile Device Management Intelligent Mobile Application Management Professional File
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationSOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business
SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.
More information