An Intelligent Solution for the Mobile Enterprise



Similar documents
Symantec Mobile Management 7.1

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.2

Symantec Mobile Management 7.1

Advanced Configuration Steps

What We Do: Simplify Enterprise Mobility

An Overview of Samsung KNOX Active Directory and Group Policy Features

Symantec Mobile Management for Configuration Manager 7.2

ADDING STRONGER AUTHENTICATION for VPN Access Control

Embracing Complete BYOD Security with MDM and NAC

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Symantec Mobile Management Suite

STRONGER AUTHENTICATION for CA SiteMinder

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Systems Manager Cloud Based Mobile Device Management

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Real-World Scale for Mobile IT: Nine Core Performance Requirements

Cisco Mobile Collaboration Management Service

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

The ForeScout Difference

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

How To Manage A Mobile Device Management (Mdm) Solution

ForeScout MDM Enterprise

AirWatch Solution Overview

Enterprise Mobility as a Service

IBM Endpoint Manager for Mobile Devices

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

How To Protect Your Mobile Devices From Security Threats

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Sophos Mobile Control SaaS startup guide. Product version: 6

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

IT Resource Management & Mobile Data Protection vs. User Empowerment

Good for Enterprise Good Dynamics

ios Enterprise Deployment Overview

Systems Manager Cloud-Based Enterprise Mobility Management

Mobile Device Management for CFAES

Dell World Software User Forum 2013

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

When enterprise mobility strategies are discussed, security is usually one of the first topics

Quick Start Guide. Version R9. English

Why Digital Certificates Are Essential for Managing Mobile Devices

Mobile Iron User Guide

RSA SecurID Two-factor Authentication

Windows Phone 8.1 in the Enterprise

BENEFITS OF MOBILE DEVICE MANAGEMENT

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Copyright 2013, 3CX Ltd.

Mobile First Government

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Enterprise- Grade MDM

MDM Mobile Device Management

Mobile Device Management Version 8. Last updated:

Mobile Device Management

MaaS360 Mobile Device Management (MDM) Administrators Guide

Cloud Services MDM. ios User Guide

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Securing Enterprise Mobility for Greater Competitive Advantage

Mobile Device Management

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Kaspersky Lab Mobile Device Management Deployment Guide

Secure, Centralized, Simple

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

ManageEngine Desktop Central. Mobile Device Management User Guide

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

IT Resource Management vs. User Empowerment

RFI Template for Enterprise MDM Solutions

Cloud Managed Printing

Symantec Managed PKI Service Deployment Options

Mobile Device Management and Security Glossary

PMDP is simple to set up, start using, and maintain

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Securing Corporate on Personal Mobile Devices

Secure Your Mobile Device Access with Cisco BYOD Solutions

An Enterprise Approach to Mobile File Access and Sharing

EasiShare Whitepaper - Empowering Your Mobile Workforce

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Top. Enterprise Reasons to Select kiteworks by Accellion

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Marble & MobileIron Mobile App Risk Mitigation

ios Education Deployment Overview

Feature List for Kaspersky Security for Mobile

Comprehensive Device Management Platform comprising of Management Suites specialized in addressing different problem domains, extensively

The Future of Mobile Device Management

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Security Architecture Whitepaper

Transcription:

An Intelligent Solution for the Mobile Enterprise

IntelliGO - An Intelligent Solution for the Mobile Enterprise BYOD and the mobile movement continue to gain momentum fueled by the explosive growth of smartphones and diversity in Wi-Fi enabled devices. Most will not deny the potential that can be unleashed by enabling a mobile enterprise and more broadly, a mobile ecosystem. Several examples exist in healthcare, retail and virtually every industry that demonstrate the productivity benefits, and new business models made possible in a mobile world. But BYOD and mobile enablement are disruptive concepts, ones that challenges the traditional corporate IT management model, and introduce a host of challenges that need to be understood and addressed before mobile is truly embraced. Organizations facing this mobile trend must strike a balance between empowering mobile users with the capabilities they need to stay productive, and protecting the enterprise from the new risks personal, and corporate-owned mobile devices present to network security and sensitive data. With BYOD and the desire to enable more mobile use cases, IT must adopt a new management model and technology solutions to support mobile experiences. Organizations must choose intelligent solutions that address network access security, and management across the entire mobile device lifecycle, without imposing a significant burden on IT. IntelliGO is a secure mobile enablement and intelligence platform that provides tight control over the entire mobile device lifecycle including: configuration, provisioning, security, monitoring, management and decommissioning. The solution integrates two critical aspects of mobile enablement into a single platform, network access control (NAC) and mobile device management (MDM). This standards-based platform makes use of digital certificates to securely authenticate and manage corporate and user owned mobile devices across most popular mobile platforms. With IntelliGO, IT administrators can use a single console to easily authenticate and centrally manage a diverse set of devices such as smartphones, tablets, laptops, point-of-sale terminals, barcode scanners, and Wi-Fi enabled medical devices. 1 CONFIGURE Setup common configuration Between all your mobile devices MOBILE DEVICE LIFECYCLE MANAGEMENT 6 DECOMMISSION Centrally Report and Manage From a single console Setup Email Setup Secure Wi-Fi Revoke Access Decommission Report Secure VPN 2 PROVISION 5 Rapidly register new or existing devices with flexible enrollment options Self-Registration 3 SECURE 4 MONITOR Intuitively set & enforce Security policy across all networks Identify and Track Users and Devices MANAGE Centrally Report and Manage From a single console Lock, Wipe, Locate Notify in Email Setup Identity Encrypt Data Secure Renewal Identify Devices Collect Statistics Automate Revocation Integrate with tools Report on Activity Apply Restrictions Tie User to Device 2

1. CONFIGURE POLICIES & RESTRICTIONS Email Certificate Distribution With IntelliGO, IT administrators can use the admin portal to setup a policy-based common configuration between all mobile devices. These include a common email setup process, restrictions, PIN / Passcode, and calendar synchronization. The policies allow IT to configure devices, control user access and set security policies. Configuration can be setup by device, device group, or by user when integrated with Active Directory. Alternatively, IT administrators can use the email distribution option to enroll users by sending a secure certificate to the device via the Wi-Fi network and the registration instructions to the authorized user via email or SMS. This method may be preferred for bulk-provisioning of corporate-owned devices. The same platform can be used to enroll devices and users onto the VPN and wired networks. From a user standpoint, the experience is identical. Users follow the same process and are provided secure network access. Guest Management For guest access, IT administrators can time-box access to the network allowing guests on to the network for only the desired length of time. 3. A SECURITY FOCUSED APPROACH TO MOBILE ENABLEMENT 2. ENROLLMENT IS AS EASY AS 1,2,3 IntelliGO offers flexible device enrollment options including an end-user self-service provisioning portal, setup via email notification, or LDAP integration. The simple enrollment options provide a consistent agentless enrollment flow for many major mobile platforms, and allows both administrators and end users to easily enroll devices. Self-provisioning Portal The IntelliGO self-provisioning portal makes device enrollment easy. Whether the user is an elementary school student or a sophisticated IT professional, the menu-driven self-provisioning steps will enable users to quickly, easily and safely get on to the corporate network. Mobile devices will become an increasingly popular target for advanced attackers. They can intercept communication and interact with the corporate network via mobile devices. Compromised mobile devices can easily record audio, video, and eavesdrop on phone calls, and give cybercriminals many more opportunities to compromise a corporate network. At its core, IntelliGO is a secure device authentication solution offering military-grade encryption to protect the corporate network. Security is at the heart of the solution and has been carefully considered in the design of the solution features and functions. IntelliGO offers on-demand VPN functionality, is designed to integrate with corporate firewalls and security information & event management (SIEM) solutions, and has a built-in certificate authority. These functions provide an enhanced level of security and intelligence for IT administrators across all corporate networks (wired, Wi-Fi, VPN). On-demand VPN For Apple ios and Android platforms, a VPN is automatically initiated by the user when a corporate application is opened on their mobile device. IntelliGO s automated VPN feature establishes a secure connection encrypting the communication between the authorized device and the corporate backend. Without this VPN feature, the enrollment process would leave the corporate network exposed to the Internet, representing a potential point of entry for malicious attackers and a risk to data and application security. Digital certificates are used for network access to ensure safe, encrypted wireless access. The settings and credentials are auto-configured once a user enters their domain credentials and the appropriate restrictions, apps and policy settings are pushed down to the device. 3

Network Security Integration When integrated with an existing corporate firewall or IPS, IntelliGO can federate device or user identities to the firewall to help enforce access control policies to the company Intranet and web applications. This tight integration allows the network to filter application traffic and deliver content filtering based on user group membership to any device over any network. With IntelliGO, IT can extend the investment made in the Internet perimeter to their users with on-demand VPN features that integrate with the existing firewall or VPN. This enables secure connectivity while web browsing and using critical applications. Syslog can be sent to an SNMP server or SIEM solution to enable automatic security alerting capabilities, allowing better visibility and control of user activity on the network. IntelliGO records both device and console events to capture detailed information for system monitoring. Logs can be viewed in the console or exported to generate reports. The Admin portal enables IT administrators to view real-time device data and user activity, including login history and a full audit trail of user activity while on the network. Double click on any device and the device-level information is made available including, software and hardware details such as the device ID, hardware model and firmware version. The high-level view provides essential information in a single view for each device including when the policies were last updated on the device, the device name, the operating system and version, and the authorized user associated with the device. An interactive world map enables a bird s-eye-view of the location of all authorized mobile devices, and provides IT with the ability to search and locate a specific device s exact coordinates on the map. Built-in Certificate Authority IntelliGO s built-in certificate authority (CA) secures communication. Without an IntelliGO-certificate, devices cannot gain access to the corporate Wi-Fi network. This protects the wireless network against rogue devices attempting to gain access. If an organization wishes to set up an internal Public Key Infrastructure (PKI), IntelliGO can be deployed quickly to meet the corporation s needs and significantly reduce the resource time and effort to setup, rollout and manage a PKI solution. IntelliGO takes the complexity out of creating, distributing and managing digital certificates. Achieve PCI Compliance with IntelliGO For credit card merchants that must meet PCI DSS compliance requirements, IntelliGO helps meet requirement 10 by providing accurate tracking, and reporting of all access to network resources and cardholder data. 4. THE VISIBILITY NEEDED TO MAKE INTELLIGENT DECISIONS IntelliGO equips IT with visibility across all enrolled corporate-owned, user-owned and shared devices, regardless of platform or device type, and provides the ability to drill-down into device and user-level details. This single-pane-of-glass gives IT administrators a streamlined way to monitor all users and devices across any network (wired, wireless and VPN) from a single console. The web-based console can be accessed anywhere giving IT a high-level graphical view of their deployment, and a comprehensive list of enrolled devices. Mobile devices can be located by searching on a variety of parameters such as device name, IP address, user name, or MAC address to name a few. IT administrators can also follow the movement of any device over time. This is particularly useful in a criminal investigation or stolen device scenario in which security or law enforcement is attempting to locate a stolen device or the person in possession of the device. All movement of the device is logged and is graphically depicted on the map providing a visual trail of the device. Administrators can also monitor compliance information such as installed profiles, certificates, and the presence or absence of a passcode, etc. 5. MANAGE ACROSS SITES, NETWORKS & MOBILE PLATFORMS To adequately manage mobile users and devices, visibility across multiple platforms, sites, and all networks is required. IntelliGO empowers IT to manage all authorized devices for most major platforms, across all corporate networks in one management console. It delivers common mobile device management functions including the ability to lock, wipe and locate lost or stolen mobile devices to protect against costly data loss and leakage disclosures. 4

VALUE DELIVERED ACROSS INDUSTRIES IntelliGO can enable a wide variety of use cases within the realm of network access control and mobile enablement across any industry sector. One of IntelliGO s unique features is the ability to remotely access and control the camera on a lost or stolen smartphone, tablet or laptop. IT administrators can take a picture of the person in possession of the device, as well as a screenshot of the device in an attempt to determine the actions being taken on the mobile device and by whom. Within retail, IntelliGO can be used to deliver secure network access and mobile device management for all Wi-Fi enabled and wired devices including point of sale terminals within store locations, barcode scanners at distribution centres, and tablets and smartphones at head office. The full lifecycle management of these devices can be done centrally through IntelliGO making it easy to securely manage devices, and generate compliance reports. If desired, IntelliGO also provides the ability to sound an alarm or alert message to the device to notify anyone in the vicinity that the phone has been located and is being tracked. Reporting To support an organization in managing their mobile device population, IntelliGO can offer a number of useful activity reports. Reporting options include, a complete asset inventory of active and non-active devices by type, user activity reports, device details covering device geographic location, installed applications, running processes/applications, hardware information such as current and historical IP location, network interfaces, and battery and storage usage. 6. DECOMMISSION Easy-to-use search and menu-driven capabilities ensure the rapid decommissioning of devices that are inactive or must be decommissioned upon employee/user departure. With IntelliGO s remote-wipe functionality, the corporate profile and all associated applications, including email, are removed from corporate-owned devices. Network access for all the employee s devices must also be revoked upon employee departure. Using IntelliGO, IT can easily revoke access for all the employee s devices with the click of a button. Network access can be provisioned for devices or for users. In an environment with several shared devices, such as retail, provisioning network access by user enables IT to revoke network access for a single user on a shared device with no impact to other users. Conversely, in an environment where users are in possession of multiple devices, network access can be revoked for the lost, stolen or inactive device without impacting any of the other devices that belong to the same user. Within healthcare, IntelliGO can be used to authenticate Wi-Fi enabled medical devices in addition to the widespread use of ipads and iphones within a healthcare setting. This enables the enterprise to keep track of and follow all Wi-Fi enabled devices, giving administrators visibility and control over shared devices they previously did not have. In conclusion, deploying a solution that delivers MDM capabilities, and addresses network access and security across the entire device lifecycle will enable IT to support a number of valuable mobile use cases for the business. 5

Of course security and privacy are paramount in healthcare, and ensuring the security of the wireless network is of critical importance. IntelliGO enables hospitals and care facilities to provide guest access to hospital visitors. IT can rest easy knowing that the IntelliGO approach provides the security needed to protect the network. Within education, IntelliGO can be used to safely enable students to bring their own devices to school or campus. IntelliGO protects against rogue access to the network providing a safe Wi-Fi environment for students and staff. Within law enforcement, IntelliGO can be used in criminal investigations to track down stolen mobile assets that contain valuable information, or individuals who may be in danger and are in possession of their cell phones. Using IntelliGO, law enforcement can gain control of the camera on the device to take a picture of the person in possession of the device, and follow the movement of the device on an interactive map. GET UP AND RUNNING IN A FEW HOURS Not only can you get up and running faster with one solution than multiple point solutions, IntelliGO also eliminates the cost and complexity associated with deploying and separately managing network access control and MDM point solutions. IntelliGO is provided on a purpose-built hardened appliance that has been optimized for security and performance. The appliance has been architected to deliver and maintain the highest advertised number of authentications per second with zero latency or performance degradation, making the network secure even during peak hours. IntelliGO can be cost-effectively deployed on any network and requires no changes to your current infrastructure. The platform can be deployed in less than one day in a distributed or central architecture to provide authentication to medium-sized, campus and large enterprise organizations. Seamless failover is achieved through an active-active high-availability deployment making IntelliGO one of the most robust and reliable mobile enablement solutions. SUPPORT DOMAIN & NON-DOMAIN DEVICES IntelliGO supports secure and simple authentication for a number of platforms including Symbian and Linux. IntelliGO also allows organizations to extend the same authentication used for domain devices to non-domain devices such as Microsoft Windows RT, Linux, VOIP and Printers. APPROPRIATE FOR DEPLOYMENTS OF ALL SIZES IntelliGO scales to support deployments of hundreds to thousands of devices through a robust architecture that is fully configurable according to your environment and requirements. IntelliGO can be deployed in a highly available environment and fully supports disaster recovery configurations to minimize downtime. The solution can scale to support 250,000 active and 1,000,000 registered devices using a single appliance. Clients can easily scale the solution by purchasing additional licenses without having to upgrade the base appliance. This enables organizations to pilot the solution for a specific use case and then effortlessly scale the solution across the entire enterprise without upgrading the appliance. The latest release of IntelliGO delivers mobile management capabilities for the Apple ios, Samsung Knox and Windows platforms. 6

IntelliGO is a cost effective mobile enablement and intelligence platform designed to securely authenticate any device to the corporate network and manage authorized users and devices post network access. Organizations choose IntelliGO because it allows them to quickly deploy a solution that will deliver a secure mobile experience for corporate users and guests. For IT administrators, the user-friendly administrator portal makes the solution very easy to use and provides the visibility and control needed to enable the enterprise s mobile use cases. IntelliGO is the way to GO for your mobile device lifecycle management needs. www.spyders.ca www.spyders.us Head Office: 207 Queens Quay West, Toronto, ON, M5J 1S7 1-888-855-3555 1-416-365-7333 (650) 485-4915 info@spyders.ca Toronto Ottawa Palo Alto, California Spyders Inc. is a high-growth IT security and networking firms, and the manufacturer of IntelliGO. Spyders designs and delivers solutions and services to secure organization s valuable corporate assets, protect their sensitive data, and enhance network security and performance. Copyright 2014 Spyders Inc., All rights reserved. 7