Mobile Device Management Glossary.
|
|
|
- Virginia Mason
- 10 years ago
- Views:
Transcription
1 Mobile Device Management Glossary
2 Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink, an IBM company. No part of this document may be used, disclosed, distributed, transmitted, stored in any retrieval system, copied or reproduced in any way or form, including but not limited to photocopy, photographic, magnetic, electronic or other record, without the prior written permission of Fiberlink. This document is provided for informational purposes only and the information herein is subject to change without notice. Please report any errors to Fiberlink. Fiberlink will not provide any warranties covering this information and specifically disclaims any liability in connection with this document. Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are trademarks or service marks of Fiberlink and may be registered in certain jurisdictions. All other names, marks, brands, logos, and symbols may be trademarks or registered trademarks or service marks of their respective owners. Use of any or all of the above is subject to the specific terms and conditions of the Agreement. Copyright 2014 Fiberlink, 1787 Sentry Parkway West, Building Eighteen, Suite 200, Blue Bell, PA All rights reserved. 2
3 ActiveSync Android APNS (Apple Push Notification Service) Apple Root Certificate Authority BES (BlackBerry Enterprise Server) Certificate Authority Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes and use , calendar, contacts and tasks applications on their mobile devices. Administrators can control which devices have access to the Exchange Server. EAS works with a wide variety of mobile operating systems, including Windows Mobile, Windows Phone, ios, Android, Symbian and Palm WebOS. Android is a mobile operating system developed by Google and managed by the Open Handset Alliance (OHA) and the Android Open Source Project (AOSP). It runs on smartphones from many manufacturers, including Acer, HTC, Huawei, LG, Motorola, Samsung Electronics, and Sony Ericsson. As of September 2010 Android was estimated to be #1 in US market share for mobile operating systems (44%) and #2 in global market share (25%). Over 100,000 apps are available for Android through Google s Android Market (estimates from Canalys). system); pr/2010/r html The Apple Push Notification Service (APNS) is a mobile service created by Apple that pushes notifications and alerts from applications on servers to iphones, ipads and ipods. The Apple Root Certificate Authority (CA) manages the generation, distribution and administration of encryption keys for the Apple Public Key Infrastructure (PKI). It facilitates encrypted secure communications between web servers and mobile devices. See Certificate Authority. The BlackBerry Enterprise Server (BES) is a middleware software package from Research In Motion that synchronizes s, calendaring information and contacts between BlackBerry devices and messaging servers such as Microsoft Exchange and IBM Lotus Notes. It also connects BlackBerry devices with enterprise applications. BES includes a range of management and security features to help administrators. A certificate authority (CA) is a trusted organization that issues digital certificates. Digital certificates are used with Public Key Infrastructure (PKI) technology to facilitate encrypted secure communications between web servers and endpoints such as mobile devices, laptops and PCs. When an endpoint contacts the server it requests a digital certificate with information about the owner of the web site and a public key. The endpoint sends the certificate to the Certificate Authority, who validates that it comes from the purported source (e.g. the user s employer or the user s bank). The endpoint uses the public key to establish an encrypted connection with the server. Third party certificate authorities include VeriSign, Entrust and GoDaddy. Enterprises and government agencies can set up their own CAs. index.html; 3
4 Cloud Extender Configuration Profile Device Encryption Enterprise App Store idep (ios Developer Enterprise Program) ios Line of Business A cloud extender is a cloud-based service, for example a database or a backup service, which can interact with and extend the functionality of other cloud-based services and applications. A configuration profile is a set of parameters used to configure a mobile device for a user or group of users. The parameters might include minimum requirements for the passcode, information on how to connect to the corporate server, virtual private network (VPN) settings, and authorized Wi-Fi networks. Device encryption is the ability to encrypt selected files or all of the files on a device to protect them from unauthorized access if the device is lost or stolen. Typically the user must enter a PIN before the device will decrypt and display encrypted files. An App Store is an online service that allows users to browse a web site and download applications to their smartphones. The most widely-known app stores are from vendors such as Apple (itunes Store), Google (Android Market) and Microsoft (Windows Marketplace for Mobile). An Enterprise App Store is an app store created by a single enterprise or government agency to distribute apps developed in-house or authorized and supported by the IT group. The ios Developer Enterprise Program (idep) is an Apple program to encourage corporate and government software developers to create inhouse mobile applications for the ios operating system. These applications are for internal use and do not get published on the public App Store. ios, formerly known as iphone OS, is a mobile operating system developed by Apple for the iphone, ipad, ipod Touch and Apple TV. It runs exclusively on devices manufactured by Apple. As of September 2010 ios was estimated to be #2 in US market share for mobile operating systems (26%), with 17% market share worldwide (estimates from Canalys). Over 300,000 apps are available in Apple s App Store pr/2010/r html In general usage line of business (or LOB ) refers to products, services or marketing campaigns targeted at one or more specific vertical industries. In the context of mobility, mobile line of business applications are solutions designed for industry-specific needs that run on mobile devices. Examples include inventory management in retail, mobile route accounting in shipping and logistics, patient data acquisition in healthcare, and sales force automation in many industries. 4
5 Lock/Unlock Lotus Notes Traveler MeeGo MDM (Mobile Device Management) Lock is an MDM (Mobile Device Management) feature that allows administrators or users to prevent anyone from using a mobile device or seeing data stored on it. Remote Lock is usually accomplished by sending an SMS message from a server to the device. Locking can also be enforced locally, for example if the wrong passcode is entered too many times. An Unlock command removes the lock. All MDM systems provide an over-the-air Lock feature for administrators, and some also provide self-service locking and unlocking for users through a web portal. IBM Lotus Notes Traveler is a push product for IBM that provides access from mobile devices to and Personal Information Management (PIM) applications for Lotus Notes users. It allows mobile users to access IBM Lotus Domino servers and use , calendar, contacts, journal and to-do applications on their mobile devices. Lotus Notes Traveler supports Apple ios, Android, Windows Mobile, and Symbian devices. Lotus Notes Traveler also provides some MDM features for Lotus Notes users, such as remote wipe, passcode policy management, and event monitoring. MeeGo is a mobile operating system designed for smartphones, tablets, netbooks, and consumer information appliances such as web-connected televisions and invehicle infotainment devices. It is a Linux-based open source project managed by the Linux Foundation and driven by Intel and Nokia. MeeGo is intended to span a wide range of mobile and non-mobile computing devices, including tablet computers, but in 2010 had not yet been released on a smartphone Mobile Device Management (MDM) systems are used to provision, monitor, manage, secure, support and secure mobile devices. Most MDM systems include a serverbased management component and an agent or app that runs on each device. Some systems are vendor-specific (e.g., work only with ios or RIM BlackBerry devices), while others span multiple operating systems and manufacturers (e.g. ios, Android, Windows Mobile and Symbian). Most MDM solutions are premises-based, although cloud-based alternatives are emerging. Typical features of MDM systems include: Tracking of devices by serial number, user name, manufacturer and operating system. Inventory of software and hardware on devices. Management of passcode policies. The ability to distribute and manage Wi-Fi and VPN policies. Remote over-the-air configuration and provisioning. Remote wipe, lock and unlock. The ability to block or disable cameras, browsers and access to app stores. Reporting on the status and configuration of devices. html?articleid=
6 MSM (Mobile Service Management) OTA Configuration Passcode Provisioning Profile QNX SCEP Mobile Service Management (MSM) products gather network, server and application health and performance data in order to provide end-to-end monitoring of mobile applications. This allows an administrator to track when users are having trouble connecting, or are getting slow performance on and mobile applications. Some MSM vendors are branching out by adding MDM features to their solutions. Over-the-air (OTA) configuration, also known as over-the-air programming and overthe-air provisioning (OTAP), is the ability to configure and assign policies to remote mobile devices solely through a wireless connection. OTA configuration eliminates the need for IT administrators or support personnel to physical touch devices in order to prepare them for and corporate applications. This is particularly important when there are many distributed users, and when users purchase their own devices. OTA configuration can also refer to distributing software and application updates to mobile devices. A passcode is a string of characters or numbers used to authenticate a user to a device. Most mobile devices can be configured with passcode policies, for example a requirement that passcodes have a minimum number of characters, or include at least one alphabetic and one numeric character, or be changed within a certain time period. A provisioning profile is a file installed on mobile devices, especially iphones, that allows specific in-house applications to be installed and executed. Administrators can use provisioning profiles to restrict applications to specific devices. QNX is a Unix-like real-time operating system used primarily for embedded systems. It is a good fit for embedded systems with limited space because it is small and, as a microkernel-based OS, functionality not required for a specific system can be turned off. It was acquired by Research in Motion and is the basis of the new BlackBerry Tablet OS. RIM has indicated that it a version of QNX will ultimately replace the BlackBerry OS. blackberry-os-qnxhandheld-confirmed-rim/ The Simple Certificate Enrollment Protocol (SCEP) is an industry standard protocol designed to simplify the issuing and revocation of digital certificates. It allows administrators to securely issue certificates to large numbers of network devices using an automatic enrollment technique. See Certificate Authority
7 Secure Messaging Selective Wipe Smartphones Symbian OS Tablet Computer Secure messaging technology provides for secure communications between users regardless of whether they are using clients or browser-based systems. Typically messages and attachments are stored entirely on servers, so they are not vulnerable to attacks on endpoint systems. Messages sent over the network are encrypted using SSL, S/MIME, TLS (Transport Layer Security) or other encryption technologies. Servers are provided with spam blocking, malware detection and data leak prevention (DLP) capabilities. com/mediaproducts/pdf/microsoft/issue1_secure_web_final.pdf Selective wipe is the ability to delete corporate , data, policies and apps from mobile devices without affecting personal and files. Selective wipe is especially important in organizations where employees provide their own smartphones and devices, because these users would not accept having their personal data removed when they leave the organization. See Wipe. Smartphones are handheld devices that include a computing operating system as well as wireless communications capabilities. They allow users to exchange as well as run mobile applications or apps. The leading manufacturers, in order of worldwide shipments (3Q 2010) are: Nokia, Samsung, LG, Apple, Research In Motion, Sony Ericsson, Motorola, HTC, ZTE, Huawei Technologies. The leading mobile operating systems, in order of worldwide shipments (3Q 2010) are: Symbian, Android, ios, Research In Motion, Microsoft Windows Mobile, and Linux (estimates from Gartner). operating_system; Symbian OS is a mobile operating system developed by Symbian Ltd. (acquired by Nokia) and managed by the Symbian Foundation, a non-profit open source organization. It runs on smartphones from many manufacturers, including Fujitsu, Mitsubishi, Motorola, Nokia, Samsung, Sharp, Siemens and Sony Ericsson. As of September 2010 Symbian was estimated to be #1 in worldwide share for mobile operating systems (37%), although only #3 in the United States, after Android and Apple ios (estimates from Gartner) A tablet computer or tablet is a book-sized computer with a flat touch screen that uses a stylus, digital pen, or fingertip as the primary input device. Most tablets run modified versions of traditional desktop operating systems on Intel chips, but newer entries like the Apple ipad use mobile operating systems and chips based on the simplified ARM architecture. Apple dominated the category in 2010, but other vendors in or expected to enter the market include Hewlett Packard, RIM, Dell, Acer, Samsung and Lenovo. architecture; Apple-Set-to-Dominate-Tablet-Market-Through.aspx; html/en/news/news_inner_33947.html 7
8 TEM (Telecom Expense Management) Windows Mobile Windows Phone 7 Wipe Telecom Expense Management (TEM) products track all types of telecom spending and allow enterprises to reduce operating costs and negotiate better agreements with their vendors and service providers. TEM systems typically track services and equipment inventory, usage and charges, match them against contracts and invoices, and highlight excessive charges from service providers and out-of-control cost categories. Some TEM vendors are branching out by adding MDM features to their solutions, and some MDM vendors are adding TEM features to their products. Management Windows Mobile is a mobile operating system developed by Microsoft and used in smartphones and mobile devices. It is a successor to Windows CE, but will be replaced in the future by Windows Phone 7. It runs on smartphones from manufacturers including HTC, LG and Samsung Electronics. As of September 2010 Windows Mobile was estimated to be only #5 in worldwide mobile operating systems, with a 3% market share (estimate from Canalys and Gartner). See Windows Phone com/windowsphone/enus/default.aspx; jsp?id= ; Windows Phone 7 is a mobile operating system developed by Microsoft and used in smartphones and mobile devices. It is a successor to Windows Mobile. It was released in selected countries in October and November It has been announced for smartphones from manufacturers including, Dell, Hewlett Packard, HTC, LG, Samsung Electronics and Sony Ericsson. Microsoft has indicated that Windows Phone 7 is designed primarily for the consumer market rather than for enterprise applications. Wipe is an MDM (Mobile Device Management) feature that allows administrators or users to delete all of the data on a mobile device. If a device is lost or stolen, wipe prevents sensitive data from being misappropriated. Wipe is usually accomplished by sending an SMS message from a server to the device. All MDM systems provide an over-the-air wipe feature for administrators, and some also provide self-service wipe for device owners through a web portal. Not all mobile devices support wipe. See also Selective Wipe. All brands and their products, featured or referred to within this document, are trademarks or registered trademarks of their respective holders and should be noted as such. For More Information To learn more about our technology and services visit Sentry Parkway West, Building 18, Suite 200 Blue Bell, PA Phone Fax [email protected] WP_201203_0034 8
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com
Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
M a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Learn More Cloud Extender Requirements Cheat Sheet
Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
MaaS360.com > White Paper. Mobile Data Security. Finding the Balance
Mobile Data Security Finding the Balance 1 Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink, an IBM
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
Cell Phone Operating Systems
Cell Phone Operating Systems The first smartphone was the IBM Simon and was designed in 1992. The phone themselves have changed. The most important changes are in the Operating System (OS) Operating Systems
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
How To Manage Mobile Device Management In Healthcare
HIPAA! HITECH! HELP! Mobile Device Management (MDM) in Healthcare www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
Exchange 2010 ActiveSync: Connection
Westlands School Exchange 2010 ActiveSync: Connection Staff mobile phone email access Exchange 2010 ActiveSync provides Westlands School Staff with external access to their school email account from a
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)
Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360.
MaaS360.com > White Paper Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility www.maas360.com 1 Copyright 2014 Fiberlink Communications Corporation.
MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh
Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in
MDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are marks, brands, logos, and symbols may be trademarks or
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
McAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Mobile Device Management (MDM) Policies
Mobile Device Management (MDM) Policies Best Practices Guide Copyright 2012 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice.
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Enterprise solution comparison chart
Enterprise solution comparison chart This quick reference compares supported devices and features across,, and Server. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
MaaS360 Cloud Extender
MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
MaaS360 On-Premises Cloud Extender
MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Windows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
Special Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
Document Sharing on Mobile Devices. Securing Productivity on the Go! www.maas360.com
Document Sharing on Mobile Devices Securing Productivity on the Go! www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
Using the Apple Configurator and MaaS3360
Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Compliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
Social Media & Mobile Handheld Devices: The Platforms, Operating Systems, devices& Applications. The wireless last mile & User Interface choices
The wireless last mile & User Interface choices Manoj Pant CEO, Shankh Inc, Mumbai ( Social transformation via technology innovation ) [email protected] Mob : +91 9820018300 Social Media & Mobile
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
IBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
DEVICE MANAGEMENT EXTENSIONS
for System Center Manager DEVICE MANAGEMENT EXTENSIONS 2011 www.odysseysoftware.com Athena for System Center Manager Document Information Date: 4/13/2011 2011, All Rights reserved. Athena is a trademark
Bell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
The Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
Oracle Mobile Security
Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
MaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
... Lecture 11. Market Overview of Mobile Operating Systems and Security Aspects. Mobile Business I (WS 2014/15) Prof. Dr.
Lecture 11 Market Overview of Mobile Operating Systems and Security Aspects Mobile Business I (WS 2014/15) Prof. Dr. Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security Johann
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Mobile Device Management
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
Mobile Banking FAQ Page 1 of 9
Page 1 of 9 allows anyone with existing online banking access to see their account information from a mobile phone. can be Text Banking, Mobile Browser Banking or Smartphone App Banking. General Questions
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Managing BlackBerry Enterprise Service 10 version 10.2
Managing BlackBerry Enterprise Service 10 version 10.2 Course details Course code 726-08882-123 Approximate duration Labs 3 days Labs are included in this course Course overview This course explains how
Sophos Mobile Control Installation prerequisites form
Sophos Mobile Control Installation prerequisites form Product version: 3 Document date: January 2013 Contents 1 About this document... 3 2 System environment... 4 3 Communication between devices and push
