Enterprise Mobility Management - Market Quadrant 2014
|
|
|
- Aileen Atkinson
- 10 years ago
- Views:
Transcription
1 . The Radicati Group, Inc. Palo Alto, CA Phone: (650) Fax: (650) THE RADICATI GROUP, INC.. Enterprise Mobility Management - Market Quadrant An Analysis of the Market for Enterprise Mobility Management Revealing Top Players, Mature Players, Specialists and Trail Blazers. July 2014 Radicati Market Quadrant SM is copyrighted July 2014, by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market Quadrants SM should not be considered an endorsement, but rather a measure of The Radicati Group s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market Quadrants SM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof.
2 TABLE OF CONTENTS RADICATI MARKET QUADRANTS EXPLAINED... 3 MARKET SEGMENTATION... 5 EVALUATION CRITERIA... 7 MARKET QUADRANT ENTERPRISE MOBILITY MANAGEMENT VENDORS... 9 KEY MARKET QUADRANT TRENDS ENTERPRISE MOBILITY MANAGEMENT - VENDOR ANALYSIS TOP PLAYERS TRAIL BLAZERS SPECIALISTS =============================================================== Please note that this report comes with a 1-5 user license. If you wish to distribute the report to more than 5 individuals, you will need to purchase an internal site license for an additional fee. Please contact us at [email protected] if you wish to purchase a site license. Companies are never permitted to post reports on their external web sites or distribute by other means outside of their organization without explicit written prior consent from The Radicati Group, Inc. If you post this report on your external website or release it to anyone outside of your company without permission, you and your company will be liable for damages. Please contact us with any questions about our policies. =============================================================== Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 2
3 RADICATI MARKET QUADRANTS EXPLAINED Radicati Market Quadrants are designed to illustrate how individual vendors fit within specific technology markets at any given point in time. All Radicati Market Quadrants are composed of four sections, as shown in the example quadrant (Figure 1). 1. Specialists This group is made up of two types of companies: a. Emerging players that are still very new to the industry and have not yet built up much of an installed base. These companies are still developing their strategy and technology. b. Established vendors that offer a niche product. 2. Trail Blazers These vendors offer cutting edge technology, but have not yet built up a large customer base. With effective marketing and better awareness, these companies hold the power to dethrone the current market leaders. Trail blazers often shape the future of technology with their innovations and new product designs. 3. Top Players These are the current leaders of the market, with products that have built up large customer bases. Vendors do not become top players overnight. Most of the companies in this quadrant were first specialists or trail blazers (some were both). As companies reach this stage, they must fight complacency and continue product innovation, or else they will be replaced by the next generation of trail blazers. 4. Mature Player These vendors have large, mature installed bases of customers, but no longer set the pace for the rest of the industry. These vendors are no longer considered movers and shakers as they once were. a. In some cases, this is by design. If a vendor has made a strategic decision to move in a new direction, it may slow development on one product line and start another. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 3
4 b. In other cases, a vendor may simply become complacent as a top vendor and be out-developed by hungrier trail blazers and other top players. c. Companies in this stage either, find new life and revive their R&D, moving back into the top players segment, or else they slowly fade away as legacy technology. Figure 1, below, shows a sample Radicati Market Quadrant. As a vendor continues to develop its product, it will move horizontally along the x axis. As market share changes, vendors move vertically along the y axis. It is common for vendors to move between quadrants over the life of a product, as their products improve and market requirements evolve. High Mature Players Radicati Market Quadrant Company Z Top Players Company L Market Share Company Y Company J Company H Low Company D Company B Company C Company A Specialists Low Functionality Company F Company G Company E Trail Blazers Figure 1: Sample Radicati Market Quadrant High Functionality is rated from 1 to 10, with 10 being the highest, and 1 the lowest. Market Share is assigned according to the company s ranking in our latest annual reports, based on its user Installed Base (e.g. the company with the largest installed base market share is number 1, the one with the second largest installed base market share is number 2, etc.). Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 4
5 MARKET SEGMENTATION This study looks at the Enterprise Mobility Management market as comprising one segment: Enterprise Mobility Management solutions provide businesses with the ability to secure and manage the mobile devices used by their employees. EMM solutions are aimed at smartphone and tablet devices and should support multiple mobile operating systems. The core components of EMM include: Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Security, and Mobile Content Management. EMM solutions are available as onpremises software, cloud-based services, or hybrid solutions. Leading vendors in this market include: AirWatch, BlackBerry, Citrix, IBM, Good Technology, Kaspersky Lab, McAfee, MobileIron, SAP, Sophos, SOTI, Symantec, Tangoe, Trend Micro, and others. Enterprise Mobility Management comprises four main areas of functionality, as follows: o Mobile Device Management (MDM) Features these include device level management features such as: remote configuration; remote wipe; selective wipe; remote locking; password enforcement/reset, disabling WiFi, cameras, Bluetooth, microphone functionality; as well as device level analytics. o Mobile Security Features such as encryption of the device storage, SD cards, s and folders; two-factor authentication; single sign-on; geofencing; data loss prevention; anti-malware detection; jailbreak/rooting detection; application whitelisting/blacklisting, and more. o Mobile Application Management (MAM) Features such as containerization; app wrapping; enterprise app store management; blocking of copy/paste between apps or to/from s; remote app updating, and app usage analytics. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 5
6 o Mobile Content Management Features such as secure , calendar, and contacts; Microsoft SharePoint integration; document management software integration, and more. Many vendors offer solution components aimed at addressing some aspect of the enterprise mobile management market, and there are many pure-play mobility vendors that specialize in providing a single component of EMM. For the purpose of this report, vendors offering solutions that focus on a single component of EMM are not included. o Also, for the purposes of this report, rugged devices, such as those used by fleet operations, are not included in this segmentation. This report is meant to only offer a view of the Enterprise Mobility Management market in the context of BYOD office employee use. Worldwide revenues for the EMM market will total $1,366 million by year-end This figure is expected to grow to over $5.7 billion by year-end This represents an average annual growth rate of 43% over the next four years. Figure 1, shows the worldwide revenue for the Enterprise Mobility Management market from 2014 to Worldwide EMM Revenues, $7,000 $6,000 $5,750 $5,000 $4,000 $3,000 $2,000 $1,366 $1,912 $2,735 $3,965 $1,000 $ Figure 2: Worldwide Enterprise Mobility Management Revenue, Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 6
7 EVALUATION CRITERIA Enterprise Mobility Management vendors are positioned in the quadrant, according to two criteria: Market Share and Functionality. Market Share is based on the installed base published in our Enterprise Mobility Management Market, report. Installed base is defined as number of devices under management. The Enterprise Mobility Management vendor with the largest installed base has a market share of 1, the one with the second largest installed base has a market share of 2, etc. Vendors with higher market shares are positioned in the Top Player or Mature quadrants. Enterprise Mobility Management vendors with smaller installed bases are positioned either in the Trail Blazer, or Specialist quadrants. Functionality we assess each Enterprise Mobility Management vendor s solution based on a number of key differentiators in capabilities. To be considered a complete EMM platform, vendors should provide comprehensive feature sets in the areas of MDM, MAM, Mobile Security, and Mobile Content Management. The following list summarizes the functionality and features that vendors should provide to be considered a complete EMM platform. Mobile OS Support support for a variety of mobile OS s, including: Apple ios, Google Android, Windows Phone/Mobile, Symbian, and BlackBerry. Deployment Scenarios - flexible deployment options, including: on-premises, cloudbased, and hybrid models. Remote Device Configuration the ability to configure devices remotely, as well as perform remote device wipe, selective wipe, remote lock, password resets, and more. Remote Device Management the ability to remotely disable the device s Wi-Fi, camera, Bluetooth connection, and more. Device Level Analytics the richness of usage statistics about device use. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 7
8 Encryption encryption-level protection of device storage, SD card, s, folders, and more. App Containerization the availability of app SDK, app wrapping, block copy/paste between apps or s, remote app updating. Mobile App Analytics the richness of data about app behavior, download stats, and more. Authentication including single sign-on, two-factor app/data authentication. Data Loss Prevention support for outbound data loss prevention (DLP). Jailbreak/Rooting Detection the ability to identify, report, and block device jailbreak or rooting. Licensing costs- available licensing models, e.g. perpetual, recurring, etc. Ease of understanding and estimating costs. Partner Ecosystem the overall partner ecosystem including carriers, app stores, global partner reach, etc. Global Support - 24x7 help desk support. Also, vendors should provide helpdesk automation, which includes a self-service portal that users can access to perform basic MDM functions, such as device wiping, password resetting, and more. Note: On occasion, we may put a player on the right side of the quadrant by giving them a higher than typical Functionality Score, even if they are missing one or two of the features mentioned above, if we feel that the other aspects of their solution are particularly unique and innovative. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 8
9 Low Market Share High Enterprise Mobility Management - Market Quadrant 2014 MARKET QUADRANT ENTERPRISE MOBILITY MANAGEMENT VENDORS Enterprise Mobility Management Market Quadrant, 2014 Mature Players SAP BlackBerry Top Players MobileIron Citrix Good AirWatch McAfee Specialists TrendMicro SOTI Kaspersky Lab Sophos Symantec IBM Tangoe Trail Blazers Low Functionality High Figure 3: Enterprise Mobility Management Market Quadrant, 2014 Note: Market share is based on installed base, defined as number of devices under management. Radicati Market Quadrant SM is copyrighted July 2014 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market Quadrants SM should not be considered an endorsement, but rather a measure of The Radicati Group s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market Quadrants SM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 9
10 KEY MARKET QUADRANT TRENDS AirWatch, BlackBerry, MobileIron, Citrix, Good Technology and SAP rank as Top Players in the Enterprise Mobility Management market. o AirWatch offers one of the strongest solutions in EMM market today. Its solution supports a wide range of devices. The AirWatch solution is competitively priced and available in all form factors, cloud, on-premises and hybrid. AirWatch continues to be a leading player and innovator in EMM and mobile market as a whole going forward. o BlackBerry has a long history of providing robust, leading edge security features with its mobile devices and BES management solution. BlackBerry has re-designed its BES management and security capabilities with a greater understanding of BYOD trends, without sacrificing the high degree of security functionality it is well known for providing on its own BlackBerry devices. BlackBerry BES continues to provide strong innovation, and is expected to remain a leader in all security and EMM aspects of mobile computing. o MobileIron is one of the leading vendors and innovators in the EMM market today. MobileIron s solutions provide solid support for device management, app and content management, as well as device security. We expect MobileIron to remain a popular choice for businesses of all sizes in a variety of different vertical markets. o Citrix offers a comprehensive solution for the management of mobile devices, apps, and data. The solution is offered in three versions, providing varying levels of mobile management features. Citrix continues to be one of the more innovative companies in the EMM space, and we expect them to continue to offer leading mobile solutions that build on their leadership in virtual computing. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 10
11 o Good Technology possesses a rich portfolio of mobile security solutions. The company was a pioneer in the development of app containerization and app wrapping technology and has a deep understanding of all aspects of Enterprise Mobility Management. Good Technology has also invested wisely by acquiring a number of companies with complementary technologies to its in-house developments. o SAP views mobility and mobility management as a key element of its enterprise product portfolio, and the company has worked diligently to develop a feature-rich suite of mobility solutions that include EMM. SAP s EMM solutions are designed to integrate effectively with a broad range of SAP and non-sap enterprise software. IBM, Sophos, Tangoe, and Symantec rank as Trail Blazers. o IBM offers one of the more complete EMM solutions on the market today. The solution is well thought out to cover all key aspects of EMM through a cohesive set of features and capabilities. The solution provides a comprehensive, highly competitive EMM platform that offers strong integration with many of IBM s enterprise solutions. o Sophos EMM solution offers mobile security across a broad range of mobile operating systems, and is offered as an on-premises product, a cloud-based service, or a hybrid solution. Sophos has a strong understanding of customer needs and we expect it to continue to evolve its solution to become increasingly competitive in the mobile security space going forward. o Tangoe s market position as a connection lifecycle management software and services provider, gives it a slightly different take on the EMM market than other vendors. Tangoe s EMM platform includes solutions for device management, application management, device containerization, and content management. Tangoe has a clear roadmap for their EMM solution and how it fits within their customer s communication mobility management needs. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 11
12 o Symantec s EMM platform offers strong support for the management of mobile apps, through simplified app wrapping that does not require code changes. The vendor lacks a bit, however, in the range of mobile platforms it supports as well as in some of the device management and reporting analytics it provides. McAfee, Trend Micro, Kaspersky Lab and SOTI are in the Specialist quadrant. o McAfee is a clear leader in the enterprise endpoint security market, however, the vendor still views mobile security as merely an add-on to its endpoint protection. McAfee s EMM solution targets only the most basic mobile security and device management needs of its customers. o Trend Micro Mobile Security covers a wide range of mobile platforms, and integrates fully with Trend Micro s management console for easy management, provisioning and policy enforcement across all devices in an organization. The solution, however, falls behind in terms of delivering containerization and app wrapping as well as lacks some of the detailed mobile-oriented reporting and analytics found in pure-play EMM solutions. o Kaspersky has a deep understanding of security technology and the security needs of enterprise customers. However, it needs to invest further to enhance its containerization and app wrapping capabilities. In addition, it must provide more uniform support across all leading mobile platforms. Kaspersky understands these requirements and is working to expand the features and capabilities of its mobile solution at a rapid pace to keep up with evolving market needs. o SOTI offers a comprehensive EMM platform that includes modules for MDM, MAM, mobile security management, mobile content management, and mobile management. SOTI is a leading vendor in the rugged device market. This provides SOTI with some unique cross-sell opportunities and also positions the vendor to take advantage of some of its rugged device customers moving to standard mobile platforms. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 12
13 There are currently no Mature Players in this market. ENTERPRISE MOBILITY MANAGEMENT - VENDOR ANALYSIS TOP PLAYERS AIRWATCH 1155 Perimeter Center West, Suite 100 Atlanta, GA AirWatch, was acquired by VMware in February of AirWatch continues to focus on mobile security solutions, but it has expanded support to include laptops, peripherals and wearables. AirWatch solutions are deployed by customers of all sizes; ranging from SMBs to large enterprises. SOLUTIONS AirWatch s MDM solution, Enterprise Mobility Management, includes mobile application, device, browser, and management along with workspace management, multi-user management and BYOD support. The AirWatch solution provides security for most mobile operating systems, including Apple ios, Android, BlackBerry, Windows Phone, Windows Mobile, Symbian, Apple TV, Mac OS X and Windows 8/RT/32. The MDM solution can enforce encryption, passwords, Web usage, remote view, remote control, automated helpdesk, and more. Organizations can choose to deploy the MDM solution as a multi-tenant SaaS or on-premises with perpetual and subscription licenses available. Optionally, organizations can subscribe to AirWatch s Mobile Content Management solution that securely delivers corporate content to mobile devices. MCM provides mobile users with access to enterprise and personal content repositories. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 13
14 In September 2013, AirWatch announced its release of the AirWatch Workspace. Enterprise data such as , content, browsing and applications are containerized from personal data. Organizations are able to provide a consistent user experience with branding, single sign-on and customizable settings across corporate resources. FUNCTIONALITY: 9 MARKET SHARE: 1 KEY STRENGTHS: AirWatch offers comprehensive support for a wide variety of mobile device operating systems, including ios, Android, BlackBerry, Windows Mobile, Windows Phone, Symbian, Apple TV, Mac OS X and Windows 8/RT/32. A variety of deployment models enable businesses to choose the most appropriate whether it be SaaS, appliance, or on-premises. Additionally, businesses choose a subscription-based or perpetual license pricing structure. Non-compliant devices managed with AirWatch are not dependent on a network connection to perform a remote wipe. AirWatch offers strong integration with enterprise systems and resources, such as an Active Directory synchronization tool and an SDK for integrating AirWatch security and management features into custom enterprise apps. AirWatch provides robust support for access and management, such as Microsoft Office 365 integration, Microsoft Exchange Server integration, and more. AirWatch offers a secure content viewing and collaboration application that integrates with Microsoft SharePoint, network file shares, WebDav, Office 365, OneDrive, Google Drive and Amazon S3. Secure Web browsing is available with the AirWatch Browser application that can authenticate users, apply blacklists/whitelists, and more. The browser is Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 14
15 available for Apple ios, Google Android and Windows Phone 8. WEAKNESSES: As one of the most affordable EMM platforms available today, AirWatch may experience increased pricing pressures as the price point for MDM and MAM solutions continues to fall. AirWatch does not support the S/MIME authentication protocol for Google Android devices. BLACKBERRY LIMITED 295 Phillip Street Waterloo, Ontario Canada N2L 3W8 BlackBerry Limited, formerly known as Research in Motion (RIM), is a mobile communications vendor. BlackBerry offers a variety of mobile products and solutions aimed at organizations of all sizes, ranging from SMBs to very large enterprises. Founded in 1984, BlackBerry is headquarted in Waterloo, Ontario, Canada and operates offices in North America, Europe, Asia Pacific, and Latin America. SOLUTIONS BlackBerry delivers EMM functionality via BlackBerry Enterprise Service 10 (BES10). Launched in January 2013, BES10 merges together several BlackBerry products, including: BlackBerry Enterprise Server 5.x, BlackBerry Device Service, and Universal Device Service, into a single-server solution. BES10 provides secure connectivity, application, content and device management for personal and corporateowned BlackBerry, ios, and Android devices. BES10 EMM comprises the following 6 key components: Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 15
16 Device Management BES10 provides comprehensive management and security controls for corporate-issued and BYOD BlackBerry, ios and Android devices. Support for MS Windows devices is on the roadmap for later BES10 provides multi-platform device management capabilities through a simple administration console. BlackBerry s MDM offering supports self-service capabilities for basic management functions that serve to reduce helpdesk workload. Corporate-owned or personal devices can be managed on a per user basis, or by groups. Mobile Security BlackBerry is one of the few enterprise mobility vendors to offer a layered security model, providing protection for the hardware, software and device OS in an end-to-end solution. It provides protection for corporate content on devices and in transit across the network. BES10 provides additional security settings and controls over and above what is provided in Microsoft ActiveSync. BES10 enables the separation of work and personal content to satisfy both user and corporate needs. BES10 also provides end-to-end secure connectivity through the BlackBerry Secure Infrastructure without the need of a VPN for BlackBerry, ios and Android devices. Enterprise Application Management Mobile application management (MAM) is embedded into the BES10 EMM solution, enabling IT departments to manage all aspects of the app lifecycle, including updating and retirement. BES10 can provision apps remotely over the air. BES10 enables IT administrators to manage mandatory or optional mobile apps from the Apple App Store, Google Play and BlackBerry World storefronts. BES10 provides a simplified process for businesses to port, develop, integrate, deploy, secure, and manage enterprise apps for their employees. BlackBerry provides containerization solutions that guard against data leakage and malicious attacks, while supplying end users with a nearnative user experience. BlackBerry Balance enables BlackBerry 10 devices to be segregated into Work and Personal Spaces. BlackBerry extends BES10 security and MAM capabilities to ios and Android devices through BlackBerry Secure Work Space (SWS). Mobile Content Management - BlackBerry s EMM solution offers extensive data and security management functions for BlackBerry, ios and Android environments, including file sync & share, end-user or automated network drive Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 16
17 & Microsoft SharePoint mapping, offline file access, integration with cloud content providers and secure collaboration via Work Drives, Messenger and the Cloud File System on BlackBerry devices. Mobile Application Development - BlackBerry s partnerships and support for open-standards and open-source app development frameworks enables enterprises to efficiently mobilize and deploy business apps. A broad developer community and established development platform provide the support, tools and APIs to help enterprises build apps tightly integrated into the core features and management capabilities of the BES10 platform. BlackBerry s mobile application development platform also assists businesses in maintaining the native experience users demand when deployed to ios and Android devices via BlackBerry Secure Work Space. Global Technical Support Multi-tiered BlackBerry Technical Support Services (BTSS) is included as standard with BES10, providing access to BlackBerry experts as well as to training, productivity and diagnostic tools. FUNCTIONALITY: 7 MARKET SHARE: 2 KEY STRENGTHS: Enterprises deploying BlackBerry smartphones, will find that BES10 provides a feature-rich one-stop vendor approach to EMM that can also be expanded to include support for other mobile devices, including the latest smartphones and tables using the ios and Android operating systems. BES10 offers hardware management and security functionality for Apple ios and Google Android devices, which include the full spectrum of device management policies from corporate lockdown to BYOD from a single console. In addition, BlackBerry is adding support for the Windows mobile platform by year-end BlackBerry provides containerization of BlackBerry 10 devices via BlackBerry Balance which ensures personal data/apps are kept separate from work related apps/data while minimizing the impact on the end user experience. BlackBerry Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 17
18 extended its containerization technology to ios and Android devices with the introduction of Secure Work Space (SWS. BlackBerry provides a comprehensive security solution, which includes management servers, the BlackBerry infrastructure, a mobile OS and smartphones. Tightly integrated, these end-to-end security components provide an ironclad layer of protection that has been utilized by the most security-sensitive organizations in the world. BlackBerry s EMM solutions can utilize Microsoft Active Directory to retrieve user profiles for more streamlined policy creation. WEAKNESSES: While BES10 offers excellent EMM and security features across a broad range of devices, the solution makes sense primarily for organizations that are highly invested in the deployment of BlackBerry smartphones but also want to allow BYOD and provide effective management across other popular mobile platforms. BES10 is available primarily as an on-premise deployment, with dedicated cloud options also available. A multi-tenant cloud offering is on the roadmap for BlackBerry BES 10 is primarily focused on providing security and EMM functionality for smartphone devices, while some of its competitors in the EMM space are also extending their coverage to laptop devices. BlackBerry is working on its future release, BES12, which is being designed to support all connected end-points (including laptops, cars and other connected machines. As security concerns have evolved from device management to application security, BlackBerry has not always communicated its vision for application-level security clearly to customers. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 18
19 MOBILEIRON 415 East Middlefield Rd Mountain View, CA MobileIron was founded in The company has over 600 employees, and has received funding from Sequoia Capital and other investment firms. MobileIron focuses exclusively on securing and managing mobile apps, content, and devices. SOLUTIONS MobileIron offers two key EMM solutions: MobileIron Core for on-premises deployments and MobileIron Cloud for cloud-based deployments. MobileIron Cloud offers support for Apple ios and Google Android. MobileIron Core offers support for the same platforms, but it adds support for Wondows 8.1, Windows Phone, and Mac OS X, plus legacy support for BlackBerry, Symbian, and Windows Mobile. MobileIron s solutions are managed from a customizable console called MobileIron Atlas. For larger deployments, administration can be delegated based on region, device type, or other factors. FUNCTIONALITY: 8 MARKET SHARE: 3 KEY STRENGTHS: MobileIron offers flexible deployment options, including: cloud-based, onpremises, and virtual solutions. MobileIron focuses on preserving the native user experience on mobile devices. MobileIron s EMM solution offers protection for Apple Mac OS X devices, making deployment simpler for enterprises that also need to lockdown these workstations. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 19
20 MobileIron contains DLP features for mobile devices, such as preventing distribution of certain documents, copy and pasting controls, and more. MobileIron seamlessly integrates with multiple platforms, such as Microsoft Exchange, Microsoft Office 365, and others. WEAKNESSES: MobileIron does not offer anti-malware software natively within their EMM platform. Malware detection functionality is only available through third-party integrations. Mobile app analytics is somewhat limited to download stats and basic usage. More detailed app behavior analytics are on the future roadmap. Support for Windows Mobile, BlackBerry 7, and Symbian devices, which MobileIron views as legacy platforms, is only available to current customers. Support for these devices is not available for new customers. CITRIX SYSTEMS, INC Great America Parkway Santa Clara, CA Citrix is a provider of cloud-based solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration, and data sharing. Citrix offers products for small businesses ranging up to large sized enterprises. Founded in 1989, Citrix is headquartered in Santa Clara, California. In January 2013, Citrix closed its acquisition of MDM vendor Zenprise. Citrix has since integrated the Zenprise technology with their XenMobile mobility solution which launched in June Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 20
21 SOLUTIONS Citrix s XenMobile solutions include: XenMobile MDM Edition and XenMobile App Edition. Citrix also offers XenMobile Enterprise Edition which combines XenMobile MDM Edition and XenMobile App Edition. In May 2014, Citrix announced its Mobile Workspace Suite, which incorporates mobility, virtualization, networking and cloud services technologies to empower new ways for people to work better. It also announced XenMobile 9.0 and new mobile productivity apps, such as WorxNotes (secure note taking application with and calendar integration for streamlined mobile workflows), WorxEdit (offline editing capabilities on mobile devices), and WorxDesktop (secure remote access). Full versions are available as on-premises and as a SaaS offering. XenMobile Enterprise Edition includes ShareFile for enterprise file sync and share. ShareFile Enterprise allows mobile users to edit and annotate documents directly on the mobile device and provides complete audit trails for information access. XenMobile Enterprise is also a key component of the Citrix Workspace Suite, which provides instant, secure access to all apps, desktops, data and services from any device over any network. FUNCTIONALITY: 8 MARKET SHARE: 4 KEY STRENGTHS: Citrix offers a comprehensive EMM platform that includes MDM, MAM, and mobile data and content management capabilities. The different XenMobile editions Citrix offers also provide businesses with great deployment flexibility. Citrix solutions for mobility go beyond XenMobile, integrating with other Citrix products such as XenDesktop and XenApp for virtualized delivery of Windows desktops and apps to mobile devices, and Citrix portfolio of mobile collaboration apps like GoToMeeting, GoToAssist, ShareFile, Podio, and Talkboard. XenMobile also integrates with other collaboration tools outside of the Citrix portfolio to best work within a customer s existing environment. A strong product portfolio of supplementary mobile productivity applications which include solutions for secure (WorxMail), mobile web browser (WorxWeb), secure document sharing (ShareFile), secure note taking Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 21
22 (WorxNotes), mobile and offline editing (WorxEdit), and secure remote access (WorxDesktop). One-click live IT support and chat sessions can be initiated directly from a user s device. Granular app policies can be applied across HTML5 and native mobile apps. ios and Android apps can be wrapped prior to being imported into XenMobile without additional development. Citrix s unified corporate app store provides a single point of access for the delivery of mobile apps, Windows apps, and web/saas apps to any device, including: smartphones, tablets, PC, or Mac. WEAKNESSES: Mobile App analytics are adequate, but could use expanded reporting capabilities. Citrix s EMM solution does not currently support DLP based on specific content type. Citrix s EMM solutions lack anti-malware functionality. GOOD TECHNOLOGY 430 N. Mary Ave, Suite 200 Sunnyvale, CA Good Technology provides secure mobility solutions that include a collaboration suite, an ecosystem of partners and applications and a secure mobility platform, enabling companies of all sizes to cover every aspect of secure mobility. In 2014, Good Technology acquired BoxTone, a provider of mobile service management. Good Technology was founded in 1996 and is headquartered in Sunnyvale, California. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 22
23 SOLUTIONS Good offers the Good Secure Mobility Solution, a comprehensive solution for enterprise mobility management (EMM), which includes the following: The Good Collaboration Suite, a suite of containerized collaboration apps that includes Good for Enterprise, Good Share, Good Connect and Good Access. o Good for Enterprise securely manages data and devices and provides secure enterprise , calendar, contacts, tasks, files, and intranet browsing on Apple ios, Google Android, and Windows Phone 8 devices. The next generation Good Secure Mobile Collaboration App, available later in 2014, will provide new contextual collaboration capabilities and an updated user experience. o Good Share a mobile content management (MCM) client for direct access to corporate SharePoint environments and other network file servers. o Good Connect an instant messaging (IM) client for Microsoft Lync and IBM Sametime environments that encrypts and protects IM content and communications. o Good Access a secure browser client, allowing users to securely browse behind the firewall resources from their mobile devices with full support for enterprise authentication (e.g., single sign-on via Kerberos), internal web proxies, and transparent access without a VPN. The Good Dynamics Secure Mobility Platform allows companies to support complete mobile app lifecycle management, from building and deploying containerized apps to the ongoing management and support of those apps, devices and the associated infrastructure. The Good Dynamics Platform provides: app containerization (via an SDK and wrapping), a shared services framework, an enterprise app store, MAM, MDM and mobile service management and support. Trusted Security Architecture - Good-secured apps (i.e., apps in the Good Collaboration Suite, the Good ISV App Ecosystem and customer-built Good-secured Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 23
24 apps) automatically take advantage of Good s trusted security architecture. Good ISV App Ecosystem - Good Technology has an extensive customer and ISV ecosystem, which securely interact with each other through the Good Dynamics Shared Services Framework. FUNCTIONALITY: 8 MARKET SHARE: 5 KEY STRENGTHS: Good Technology provides support for all leading mobile platforms and in all form factors including on-premises, cloud and hybrid. Good Technology s customizable enterprise app store allows for the distribution of apps to any mobile device, regardless of whether it s MDM-managed or not. This allows enterprises to extend mobile apps to external business partners, contractors and customers. All Good-secured apps (e.g., Good for Enterprise, Good Share, ISV apps, customer built apps) have powerful DLP features, including granular control over open-in, data sharing and cut/copy/paste between apps or to the cloud. Good-secured apps can transparently access behind-the-firewall resources without a VPN, provides a significant benefit to enterprise organizations. The Good Dynamics shared services framework shortens mobile app development time, allowing companies to get full-featured and secure apps into production more quickly. Good s Mobile Service Management (MSM) provides end-to-end visibility across mobile environments. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 24
25 WEAKNESSES: Good Technology provides highly sophisticated solutions covering the entire mobility lifecycle management, which may be somewhat complex for organizations that are just beginning to deploy mobile security solutions. Good Collaboration Suite tends to drive user workflow towards a pre-defined style of use which may be different than what users are familiar with from their native devices. Good Technology will need to continue to expand its partner ecosystem as it competes with other EMM players, such as VMware, Citrix and other large enterprise vendors. SAP Dietmar-Hopp-Allee Walldorf Germany SAP AG is a German global software developer of enterprise software. SAP is best known for its enterprise resource planning (ERP) solutions, but has expanded in many other software areas, such as data warehousing, business object software, mobile products and in-memory computing. SAP is one of the largest software companies in the world and is traded on the Frankfurt Stock Exchange. SOLUTIONS SAP Mobile Secure provides end-to-end management and security of mobile devices, applications, and content. Mobile Device and App Management SAP Mobile Secure offers mobile device and app management support for the latest versions of Apple ios, Google Android, and Windows devices. IT personnel can separate personal and corporate Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 25
26 data on devices, provision devices and deliver apps OTA, extend corporate security policies, remote lock and/or wipe devices, and more. MDM is available as an on-premises solution or as a cloud-based service. A new component provided at no additional cost in SAP Mobile Secure, cloud edition, Mobile Place, is a brand-able, localizable landing page where customers end users (their employees, partners and customers) can enroll in device management, provision mobile apps and set up related services, such as network access, and identity, and more. App Wrapping SAP Mobile Secure offers mobile application level security enabling administrators the ability to wrap granular security and data leakage policies around mobile web apps and native apps. SAP offers 14 application protection policies for the ios and Android platforms. In the most recent release, SAP includes a secure browser for web applications. Access to existing Microsoft SharePoint, corporate intranet sites, web apps, and portals can also be extended. Mobile app protection can be deployed either on-premises or as a cloud service. Mobile Content Management SAP Mobile Secure provides mobile content management and secure access to business documents. Users can access personal documents or corporate content from their Apple ios, Google Android, Microsoft Windows and Apple Macintosh desktop and laptop clients, and HTML5 user interfaces. SAP Mobile Documents is available as an on-premises solution or as a cloud service. FUNCTIONALITY: 6 MARKET SHARE: 5 KEY STRENGTHS: SAP offers a robust set of mobile device, application, and content management solutions. Available individually or bundled as a platform, SAP also delivers solutions as on-premises software or as cloud services. A convenient feature for users is the mobile-optimized secure Web browser, useful for secure access to mobile web-based apps. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 26
27 SAP s MDM offering provides detailed business intelligence information through their Business Objects software. Businesses can report and track activity usage among employees mobile devices. SAP offers strong integration with enterprise directory services which eases provisioning, administration and policy management. WEAKNESSES: SAP does not support management of BlackBerry devices. SAP does not currently provide anti-malware protection. SAP mobile app analytics is somewhat basic at this time. SAP relies on a partner-based solution extension for its app wrapping technology. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 27
28 TRAIL BLAZERS FIBERLINK, AN IBM COMPANY 1787 Sentry Parkway West Building Eighteen, Suite 200 Blue Bell, PA Fiberlink was founded in 1991, and first introduced its MDM solution in Fiberlink focuses on its Enterprise Mobility Management (EMM) solution that also offers an option to protect Microsoft Windows and Apple Mac OS X systems along with smartphones and tablets in a single console. IBM acquired Fiberlink in December Fiberlink s MaaS360 platform is now a critical component of the IBM MobileFirst portfolio. MobileFirst includes products such as the Worklight app development platform and Trusteer, a technology to secure transactions. SOLUTIONS IBM MaaS360 (Mobility-as-a-Service) solution is best known for being cloud-based. In 1Q of 2014, an on-premises version was also launched. MaaS360 is made up of several different technologies with the core MDM piece providing protection for Apple ios, Google Android, RIM BlackBerry, Microsoft Windows Phone, and Nokia Symbian devices. Mobile application management (MAM), Mobile Content Management, and mobile expense management functionality can all be added to a Maas360 deployment as needed on a subscription basis. MaaS360 also has complete container solution for secure mail, applications, content, and browsing. FUNCTIONALITY: 9 MARKET SHARE: 6 Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 28
29 KEY STRENGTHS: Delivered as a cloud service, MaaS360 provides a streamlined provisioning and configuration process allowing customers to get a complete system set up in minutes. Updates to new features and functionality are provided automatically so customers are always on the latest version. MaaS360 provides multiple ways to separate corporate and personal data on mobile devices. This includes a containerization solution called MaaS360 Secure Productivity Suite which includes granular level policy management and data protection controls. The MaaS360 Cloud Extender integrates with Microsoft Exchange ActiveSync and does not sit in-line with infrastructure. This means that MaaS360 can never cause a mail outage or delay. MaaS360 can also integrate with Microsoft Office 365 and IBM Notes. MaaS360 provides a secure web browser web gateway in order to provide customers access to internal Intranet sites and web application servers without the need for the user to initiate a VPN connection. MaaS360 offers an App Security SDK that can integrate the security features in MaaS360, such as authentication and copy/paste restrictions into custom-built enterprise apps on mobile devices. MaaS360 also partners with public apps vendors as part of their MaaS360 Workplace Partner Program. MaaS360 has a secure document sharing application to provide mobile users access to enterprise content. Document access and distribution include the integration of SharePoint, NFS, Box, Google Drive, and other third party solutions. Customers also have the option to leverage Fiberlink s cloud content delivery system, MaaS360 Doc Cloud, to securely host and distribute files. MaaS360 can also protect Microsoft Windows and Apple Mac OS X systems, which simplifies deployments for IT administrators that need to protect mobile devices and workstations. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 29
30 WEAKNESSES: An on-premises solution was recently launched in 1Q Although it is the same code base as their cloud-based version, it will need to prove it can execute effectively. MaaS360 s subscription based pricing structure will be more costly in the long run when compared to perpetual license based solutions. SOPHOS 3 Van de Graaff Drive Burlington, MA Sophos is a privately held company dual-headquartered in Boston/US and Oxford/UK. The company has additional offices in Canada, Australia, Singapore, Germany, India and elsewhere around the globe. The vendor offers a range of data loss prevention (DLP), anti-virus, UTM, encryption, and other security solutions for desktops, servers, mobile devices, and more. Sophos solutions are used by enterprises of all sizes in all verticals. In 2012, Sophos acquired DIALOGS, an MDM vendor, for its mobile security technology. SOLUTIONS Sophos protects mobile devices with three solutions: Sophos Mobile Control (SMC) is Sophos primary MDM offering that provides security for Apple ios, Google Android, Windows Phone 8, Windows Mobile and BlackBerry devices. Sophos Mobile Control includes encryption enforcement, password enforcement, device wiping (corporate and full), and other MDM capabilities. It is available on-premises or as a cloud-based service. In addition, Sophos partners can host Sophos Mobile control as an MSP offering. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 30
31 Sophos Mobile Encryption provides secure, device-based encrypted access to cloud content on Apple ios or Google Android devices. Sophos Mobile Security (SMS) is a solution that is offered as a free app download for Google Android devices. SMS runs anti-virus scans, protects from malicious web pages, filters inappropriate content and offers other core MDM features, such as device location services. The solution is partly designed to give potential users a preview of Sophos more sophisticated offerings. FUNCTIONALITY: 6 MARKET SHARE: 6 KEY STRENGTHS: Sophos offers an easy to understand one user/one license pricing structure. With this type of pricing, businesses are charged one fee regardless of how many devices an employee uses. This can translate into significant cost savings for some businesses. Sophos offers strong malware and web protection functionality within their EMM solution. Few vendors are able to match Sophos ability to remotely trigger malware scans, block malicious apps, and scan apps on install. The Sophos Mobile Security solution gives users a free tool for MDM features on their Google Android device. This raises mind share and gives potential users an easy route to test the user interface and some of the MDM features available in Sophos other offerings. The Sophos Mobile Encryption solution gives users a tool for securely adding, viewing and editing encrypted documents stored in the cloud. Sophos Mobile Encryption currently supports Dropbox, Microsoft OneDrive, Google Drive, Egnyte, Mediacenter and WebDAV (e.g. OwnCloud, Windows Server). Sophos Mobile Control can control corporate network access for mobile devices through integration with Sophos UTM. For example, jail-broken devices can be quarantined from full network access Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 31
32 WEAKNESSES: Sophos Mobile Encryption is only available for Apple ios and Google Android devices. Sophos does not offer complete feature parity between their on-premises and cloud versions of Sophos Mobile Control. For instance, Sophos does not offer support for BlackBerry devices with their cloud-based EMM service. Sophos has limited app data protection capabilities since it does not support the containerization or wrapping of apps. Sophos has limited MDM support for Google Android devices from certain manufacturers, such as Motorola and HTC. Integration with Microsoft Office 365 is not currently offered. TANGOE INC. 35 Executive Blvd Orange, CT Tangoe is a provider of Connection Lifecycle Management (CLM) software and services. Tangoe s Matrix is an integrated solution suite comprised of software and services to address the entire lifecycle of an enterprise s mobile, fixed, machine, cloud, IT and social communications. Founded in 2000, Tangoe is a public company headquartered in Orange, Connecticut. SOLUTIONS Tangoe s managed mobility suite, MatrixMobile, addresses the key aspects of managing the entire communications lifecycle, including: advisory services, device activation, device management and monitoring, device expense analysis, product support and global Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 32
33 managed services. Matrix Mobile is available as an on-premises solution, as well as through a cloud-based model. Tangoe s EMM/MDM offering is a key component of the MatrixMobile suite, and delivers the following key features and functionality: Device Management enables IT personnel to deploy and manage mobile devices from a single web-based console. Provides device management features, such as security policies, tracking of lost devices, and remote lock or wipe for Apple ios, Google Android, BlackBerry, Windows Phone, and Windows Mobile devices. Application Management provides automatic OTA deployment of applications via SSL based on user and device profile, verifies application deployment, and ensures that the application has the necessary battery and memory to meet app system requirements. Real-time Telecom Expense Management (rtem) delivers telecom cost information, visibility to network usage (data, voice, SMS, roaming), international roaming plan support, GEO-Fence boundary crossing alert, and more. Device Containerization provides IT the ability to secure and cloud-manage the separation of corporate applications and data from personal applications and data on employees devices. Content Management creates secure containerized access, sync, and share of file server and Microsoft SharePoint documents natively and securely with end-to-end mobile data governance. Additional capabilities integrated into the Tangoe EMM IP stack, include: Certificatebased Authentication across all device types, NAC solutions (i.e. Cisco ISE certified), and WiFi network access protection. FUNCTIONALITY: 8 MARKET SHARE: 7 Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 33
34 KEY STRENGTHS: Tangoe offers end user empowerment tools such as the ability for users to selfactivate and connect their mobile devices. The Tangoe MDM Self-Service Portal reduces IT and help-desk work cycles. Tangoe supports a wide range of mobile platforms, including: ios, Android, Windows Phone, Windows Mobile, Symbian, and BlackBerry devices. Tangoe s EMM solutions are available as on-premises software or as cloud-based services. Tangoe s solutions are affordable and aggressively priced on a per user per month basis. WEAKNESSES: Tangoe s solution lacks some native capabilities and relies on technology partnerships to deliver some EMM features such as anti-spam/antivirus and cloudbased content management integration. Tangoe must increase their market awareness; competing vendors in this market rarely mention the company as a vendor they often come up against in sales situations. In order to take full advantage of the lifecycle management aspects of the solution, Tangoe MDM/EMM capabilities are best deployed as part of the vendor s Matrix Mobile suite, rather than as a standalone EMM solution. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 34
35 SYMANTEC 350 Ellis St Mountain View, CA Symantec provides a broad range of security solutions and services for consumers and businesses. Symantec s product portfolio includes solutions for: Enterprise Mobility Management (EMM), archiving, ediscovery, messaging security, and more. In 2012, Symantec acquired Nukona for its mobile application management technology and Odyssey for its MDM technologies. In May 2014, Symantec acquired NitroDesk a secure solution for Android and ios devices. SOLUTIONS Symantec Mobile Management Suite (SMMS) is an Enterprise Mobility Management (EMM) solution that is made up of several different products, including: Symantec Mobile Management (SMM) for advanced mobile device management, SMM offers management features for Apple ios, Google Android, and Microsoft Windows Phone devices. Specific device management features include: configuring passwords, remote lock and wipe, policies for individuals, devices, or groups from the directory system, and more. Symantec App Center for integrated mobile device management, mobile application management, mobile content management and mobile threat protection, Symantec App Center enables IT administrators to deploy, secure, and manage mobile apps and content on corporate-owned, and employee-liable devices. Businesses can also wrap any in-house, or web app by creating and enforcing policies on a per-app basis. Wrapped third-party apps are available via the Symantec Sealed Marketplace. Symantec Mobile Security for increased security protection Symantec Mobile Security includes: antivirus technology, advanced firewall, and web browser protection. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 35
36 FUNCTIONALITY: 6 MARKET SHARE: 8 KEY STRENGTHS: Symantec Mobile Management can be integrated with Symantec s endpoint management solution, Symantec Endpoint Management for a more convenient deployment to protect all endpoints in the enterprise. Symantec offers its Mobile Management Suite on a per-user basis regardless of the number of devices. Enterprises with users that utilize multiple mobile devices will see a great return on investment with this pricing structure. The Symantec App Center lets organizations containerize apps to keep corporate data separate from personal data. Organizations can enforce policies on a per-app basis and apps can be updated without re-wrapping. Symantec s mobile products have robust encryption capabilities and can offer FIPS-certified encryption through integration with its encryption solution. Symantec offers a secure content delivery system via Symantec Mobile Management and the Symantec App Center that can give employees access to applications, documents, links, and more. Symantec s recent acquisition of NitroDesk strengthens its support for secure for Android and ios devices. WEAKNESSES: Symantec only provides basic MDM for Windows Phone and Windows Mobile devices through their Symantec Mobile Management solution. Symantec App Center support for Windows Phone is planned for later this year. Symantec does not offer native integration with Microsoft SharePoint Server. However, this capability is supported through 3 rd party ISVs, who are part of the Symantec Sealed program. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 36
37 With the exception of Symantec App Center, the rest of the solutions in Symantec Mobile Management Suite can only be deployed on-premises. This may be limiting to organizations with fewer IT resources. Symantec Mobile Management Suite does not support BlackBerry devices, or Android variants like Samsung Safe and KNOX. Although support for Samsung Safe is planned for later this year. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 37
38 SPECIALISTS MCAFEE 2821 Mission College Boulevard Santa Clara, CA McAfee, a wholly owned subsidiary of Intel Corporation, delivers security solutions and services for systems, networks, and mobile devices around the world. The company offers a wide variety of security products for endpoints, , Web, data, data centers, and databases. McAfee DeepSAFE technology, jointly developed by McAfee and Intel, sits below the operating system and close to the silicon to extend the security footprint and defend against rootkits and advanced persistent threats. SOLUTIONS McAfee Enterprise Mobility Management (McAfee EMM) is the vendor s mobile security solution. It can be purchased and deployed separate from other McAfee security solutions. However, McAfee EMM integrates with McAfee epolicy Orchestrator (McAfee epo) management software. This allows single-pane of glass management of mobile users and devices along with traditional endpoints, such as workstations, laptops and servers. McAfee EMM is also available bundled with McAfee s Complete Endpoint Protection suite. McAfee EMM provides protection for Apple ios, Android, and Windows Phone 7 and 8. The first two, require an agent on the device, whereas Windows Phone does not. It provides slightly different sets of features for the different mobile platforms under management. Key features include: VirusScan Mobile Security for Android and blocking devices if malware detected. Ensuring apps are secure with mobile app reputation. Block devices that have malware, are jailbroken or rooted, or have blacklisted apps. Enforce authentication and encryption. Provide network connectivity management, including certificate-based two-factor authentication for VPN and Wi-Fi on ios devices. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 38
39 Mobile threat alerts to administrators of devices that are jailbroken or rooted, or have malware, potentially malicious apps, or blacklisted apps for enhanced situational awareness. Remote locking, wiping corporate data, or full wiping of devices that are lost or stolen. Secure Container for Android, which provides encrypted storage and restricts cut and paste of data. FUNCTIONALITY: 3 MARKET SHARE: 7 KEY STRENGTHS: McAfee EMM benefits from McAfee s strength in malware detection. McAfee EMM fits seamlessly with McAfee epolicy Orchestrator for a single-pane of glass management experience. McAfee EMM is available as a standalone solution or bundled with McAfee s enterprise endpoint security solution. WEAKNESSES: McAfee EMM provides somewhat different features for different mobile platforms, for instance containerization is only available for Android devices. McAfee does not provide support for BlackBerry devices. Much of the benefits of McAfee EMM are visible only when it is deployed in the context of other McAfee security solutions, such as epolicy Orchestrator and McAfee s endpoint solutions. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 39
40 TREND MICRO Shinjuku MAYNDS Tower, 1-1, Yoyogi 2-Chome, Shibuya-ku Tokyo, , Japan Founded in 1988, Trend Micro provides multi-layered network and endpoint security solutions for businesses across the globe. The vendor offers , Web, and endpoint security platforms as software, appliances, and hosted solutions. Trend Micro solutions are powered by its cloud-based Trend Micro Smart Protection Network, which brings together threat reporting, analysis based on a worldwide threat assessment infrastructure. SOLUTIONS Trend Micro s Mobile Security is a solution that gives visibility and control of mobile devices, apps, and data through a single built-in console. It combines Mobile Device Management (MDM), Mobile Application Management (MAM), Application Reputation Services, and Device Antivirus (for Android) into a single solution. Trend Micro Mobile Security integrates with the Trend Micro Control Manager console, allowing customers to centralize policy and management across Trend Micro OfficeScan endpoint security as well as other Trend Micro solutions, for a single-pane-of-glass management approach. Mobile Security delivers the following features and functionality: Mobile Security protection for mobile devices, apps and data. Supports a broad range of mobile platforms, including ios, Android, BlackBerry, Symbian and Windows Phone. Mobile Device Management (MDM) - allows IT to remotely enroll, provision, deprovision, and track devices. Supports the setting and monitoring of cross-device and group policies. Mobile Device Security - blocks malware and malicious websites, monitors and blocks calls, MMS and SMS sent to and from devices. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 40
41 Mobile Application Management provides application black listing and white listing, allows IT to manage and block apps based on categories, identifies and blocks risky Android apps leveraging the Trend Micro Mobile Application Reputation Service. Pushes apps to end-user devices through a corporate app store, provides inventory management and reporting of apps used across devices and groups. Data Protection provides remote lock, wipe, selective wipe and device location capabilities. Enforces encryption, blocks the use of jail broken or unencrypted devices. Allows IT to lock down device features such as cameras, Bluetooth, SD card readers, etc. FUNCTIONALITY: 4 MARKET SHARE: 9 KEY STRENGTHS: Trend Micro supports all leading mobile platforms, including BlackBerry and Symbian. Trend Micro Mobile Security integrates with the vendor s Trend Micro Control Manager console to provide a single pane-of-glass management experience across mobile and endpoint devices. Trend Micro Mobile Security is available standalone or bundled with Trend Micro s enterprise security suites. Trend Micro Mobile Security benefits from Trend Micro s Mobile Application Reputation Service to ensure app safety. WEAKNESSES: Trend Micro Mobile Security is really intended to be used in the context of Trend Micro s full suite of endpoint security solutions. Trend Micro Mobile Security does not support containerization or app wrapping to allow users to keep personal and business data separate. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 41
42 Analytics and reporting is minimal compared to other EMM solutions. KASPERSKY LAB 39A Leningradsky Highway Moscow Russia Kaspersky Lab is a privately held company, founded in It is a leading vendor of security solutions targeted at the consumer and enterprise market. The company has a global presence with offices in 30 different countries. SOLUTIONS Kaspersky Security for Mobile is a mobile security and management solution aimed at the needs of corporate customers, across all sizes from SMBs to very large customers. The latest version is Kaspersky Security 10 for Mobile, which is available as a standalone solution, or bundled with Kaspersky s business security suites: Endpoint Security for Business (Select/Advanced), or Total Security for Business. Kaspersky Security 10 for Mobile consists of four components as follows: Exchange Active Sync the EAS connector supports all popular mobile platforms including Android, ios, Windows Mobile, Windows Phone, BlackBerry, Symbian and others. It supports rich controls such as password management, encryption enforcement, camera/bluetooth use, application use controls, and more. Apple MDM allows management of iphones and ipads and supports all Apple MDM features, including device management and configuration controls, device and application usage information and more. Samsung MDM supports Samsung for Enterprise (SAFE) devices which allows for deeper control and administration of select Samsung devices (e.g. Samsung Galaxy Tab). Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 42
43 Security Agent supports all popular smartphones and tablets. It provides rich antimalware and anti-phishing protection through the Kaspersky Security Network, antitheft controls which include remote lock, full or select wipe, GPS tracking and SIM control, application control through containerization, web/safe browsing detection, jailbreak/rooting detection and encryption. Kaspersky Security for Mobile is centrally managed from a single administration console, Kaspersky Security Center, which supports centralized management of mobile devices as well as most other IT resources across the corporate network. FUNCTIONALITY: 5 MARKET SHARE: 10 KEY STRENGTHS: Kaspersky has established a large installed base of enterprise customers, which is a key differentiator that enables Kaspersky to sell their mobile solutions to their existing customer base. Kaspersky s EMM solutions provide support for a broad range of mobile devices, including: Apple ios, Google Android, BlackBerry, Windows Phone, Windows Mobile and Symbian. Kaspersky s roots in the enterprise security market enable them to offer native mobile security functionality without the need to deploy a third-party security solution that many of the pure-play MDM vendors require. Kaspersky offers secure Web browsing as a part of their MDM solution, which enables filtering of Web content based on categories, such as gambling or entertainment. Kaspersky includes its own powerful anti-malware protection, anti-phishing, antitheft, encryption, and containerization (app wrapping) to separate personal and corporate data. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 43
44 WEAKNESSES: Kaspersky s EMM solutions are currently delivered as on-premises software. Cloud-based services, however, are on the roadmap and under development. Feature sets across all supported mobile platforms are not identical. Businesses with BYOD environments and several different mobile operating systems within their corporate setting may find some difficulties in managing these devices. Kaspersky does not yet offer an automated helpdesk, however this is under development for late SOTI 5700 Hurontario St. Suite 1100, Mississauga, Ontario L5R 3G5 Canada SOTI provides enterprise solutions for the management, securing, supporting and tracking of mobile and desktop computing devices. In October 2013, SOTI announced the release of their latest generation EMM platform, MobilControl. Founded in 1995, SOTI is headquartered in Ontario, Canada and has regional offices in the UK, Australia, and India. SOLUTIONS SOTI s EMM offering, MobiControl, provides a broad range of mobility services. MobiControl supports Apple ios, Google Android, Microsoft Windows Mobile devices, as well as computers running Apple s and Microsoft`s Desktop and Server operating systems. MobiControl can be deployed in the cloud, on-premise, or as a managed solution. The key components of MobiControl include: mobile device management, mobile security management, mobile content management, mobile application management, and mobile management. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 44
45 Helpdesk features are built-in to MobiControl. SOTI, however, also has a standalone helpdesk solution called MobiAssist that is available for customers only looking for helpdesk support features, such as remote diagnostics, mobile helpdesk chat, and more. FUNCTIONALITY: 4 MARKET SHARE: 11 KEY STRENGTHS: MobiControl is available in several different deployment options, including: cloud-based, on-premises, and managed solutions. SOTI has an established presence within the rugged device market with their EMM platform. This existing installed base gives SOTI an advantage over other vendors as these rugged device customers transition to Apple ios, Google Android, and Windows Phone devices. SOTI s SKD for Apple ios devices enables businesses the ability to wrap ios apps for additional MAM functionality. Administrators are able to view and access the wrapped application s file directory remotely over the air. SOTI includes Web filtering in its MobiControl solution that can create white/black lists for websites, browsing rules by category, and more. SOTI offers robust encryption for data on mobile devices. The encryption is FIPS certified. WEAKNESSES: SOTI must work to increase their market presence. They offer a highly capable EMM platform, however, many of the other vendors in this market rarely come up against SOTI in sales situations. While SOTI offers EMM for a variety of mobile platforms, their strong emphasis on Google Android devices may turn off customers with a strong investment in other mobile platforms. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 45
46 SOTI relies on partners to license some of its EMM technology components, such as containerization. This leaves the company vulnerable to shifts in the marketplace. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 46
47 THE RADICATI GROUP, INC. The Radicati Group, Inc. is a leading Market Research Firm specializing in emerging IT technologies. The company provides detailed market size, installed base and forecast information on a worldwide basis, as well as detailed country breakouts, in all areas of: Security Instant Messaging Unified Communications Identity Management Web Technologies The company assists vendors to define their strategic product and business direction. It also assists corporate organizations in selecting the right products and technologies to support their business needs. Our market research and industry analysis takes a global perspective, providing clients with valuable information necessary to compete on a global basis. We are an international firm with clients throughout the US, Europe and the Pacific Rim. The Radicati Group, Inc. was founded in 1993, and is headquartered in Palo Alto, CA, with offices in London, UK. Consulting Services: The Radicati Group, Inc. provides the following Consulting Services: Management Consulting Whitepapers Strategic Business Planning Product Selection Advice TCO/ROI Analysis Multi-Client Studies To learn more about our reports and services, please visit our website at Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 47
48 MARKET RESEARCH PUBLICATIONS The Radicati Group, Inc. develops in-depth market analysis studies covering market size, installed base, industry trends and competition. Current and upcoming publications include: Currently Released: Title Released Price* Information Archiving Market, May 2014 $3, Statistics Report, Apr $3, Office 365, Exchange Server and Outlook Market Analysis, Apr $3, Microsoft SharePoint Market Analysis, Apr $3, Mobile Statistics Report, Feb $3, Enterprise Mobility Management Market, Nov $3, Endpoint Security Market, Nov $3, ediscovery Market, Nov $3, Instant Messaging Market, Oct $3, Europe Cloud Market, Sept $3, Business User Survey, 2013 Aug $3, Cloud Business and Consumer Market, Jul $3, Microsoft SharePoint Analysis, Jul $3, * Discounted by $500 if purchased by credit card. Upcoming Publications: To Be Title Price* Released Cloud Business Messaging Market, Aug $3, Messaging Platforms Market, Aug $3, * Discounted by $500 if purchased by credit card. All Radicati Group reports are available online at Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 48
49 MANAGEMENT STAFF Sara Radicati, PhD President & CEO Sara is a computer scientist, author, entrepreneur and industry analyst. Sara was a pioneer in the early development of unified communications, , directory services and security systems. She played an active role in the development of several international standards for networking and communications, and served on the board of directors of various industry associations, as well as Interop. In 1993, she founded The Radicati Group an analyst firm specialized in tracking emerging communication and collaboration technologies. The company provides quantitative and qualitative market research, as well as advises corporate clients on procurement issues, and works with vendors and network operators to help them define their business strategy and product direction. The company also works frequently with investment funds to perform duediligence and evaluate new opportunities. Prior to founding The Radicati Group, Sara was lead architect for network protocols at Xerox Corporation and held management positions at 3Com and Novell. Sara holds Computer Science degrees from Queens College CUNY, and the California Institute of Technology. Copyright July 2014 The Radicati Group, Inc. Reproduction Prohibited 49
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Implement Mobile Device Management to Deploy HCSS Mobile Apps
Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo [email protected] Our Goal Understand mobile device management and its benefits Examine different
Comprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Sophos Mobile Control
Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
t I. Mobile Device Management: 2014 Vendors and Comparison Guide 1. MDM Considerations By Kasia Lorenc, Fritz Nelson, JUNE 10, 2014 10:30 AM
t I. Mobile Device Management: 2014 Vendors and Comparison Guide By Kasia Lorenc, Fritz Nelson, JUNE 10, 2014 10:30 AM 1. MDM Considerations Making sense of the different mobile device management solutions
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
IBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
Citrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) [email protected] Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
Windows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise
MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact
Mobilize Email with Enterprise-Grade Security and a Great Experience
White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Sophos Mobile Control - Competitive Overview
Sophos Mobile Control - Competitive Overview Content Page Introduction to MDM Market overview, positioning and discovery questions 2 Lightweight vs Heavy weight approaches 3 Competitive comparisons AirWatch
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013
WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest
Vodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
The top five enterprise mobility management vendors: product focus and financials
The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest
Top. Reasons Federal Government Agencies Select kiteworks by Accellion
Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government
Mobile Application Management with XenMobile and the Worx App SDK
Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
Brief History of Enterprise Mobility. Existing Stuff
Brief History of Enterprise Mobility Existing Stuff YOUR ASSETS ARE ON A PC TODAY YOU HAVE 50-500 APPS 90% ON-PREMISE 70% WEB 25% WINDOWS IT Owned IT Managed Domain Joined 90% CIFS 5% NATIVE 50% SHAREPOINT
MobileIron and Samsung Value Proposition
MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global
Top. Enterprise Reasons to Select kiteworks by Accellion
Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
The fastest, most secure path to mobile employee productivity
The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Enterprise solution comparison chart
Enterprise solution comparison chart This quick reference compares supported devices and features across,, and Server. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
The Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
ShareFile for enterprises
Product Overview ShareFile for enterprises Secure, sync and share enterprise files everywhere ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs
The Forrester Wave : Enterprise Mobile Management, Q3 2014
For: Infrastructure & Operations Professionals The Forrester Wave : Enterprise Mobile Management, Q3 2014 by Christian Kane, Tyler Shields, September 30, 2014 Key Takeaways IBM, Citrix, MobileIron, AirWatch
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Enterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
Management of Multi-OS Smart Devices Made Simple.
Singtel Business Product Factsheet Managed Mobility Device Defense Manager Services Management of MultiOS Smart Devices Made Simple. A smart solution that enables companies to secure, control and manage
11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
Secure mobility with Citrix & Cisco
Secure mobility with Citrix & Cisco Enterprise IT resources on tablets and smartphones BYOD & Mobile Networks Damjan Mirtic Citrix South East Europe 1.3 Billion Mobile workers by 2015 Mobile Worker Population
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Total Enterprise Mobility. Norbert Elek [email protected] www.maas360.com
Total Enterprise Mobility Norbert Elek [email protected] www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
Mobile Device Management Glossary. www.maas360.com
Mobile Device Management Glossary www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink,
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
Mobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Enterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility [email protected] / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com
White Paper Secure Mobile Collaboration with Citrix XenMobile and ShareFile Mobile devices and BYOD have brought unprecedented agility to the enterprise, allowing users to collaborate, access information
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system
MobileIron Hendrik Van De Velde Exclusive Mobile Eco-system Agenda MobileIron Company and Vision Mobile First and Mobile IT The MobileIron Solution Mobile Device Management Mobile Application Management
MobileIron Product Packaging
MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content
