BYOD Management : Geo-fence

Similar documents
MDM Mobile Device Management

MAM - Mobile Application Management

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

What We Do: Simplify Enterprise Mobility

Symantec Mobile Management Suite

The Future of Mobile Computing

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Kaspersky Security for Mobile

Cisco Mobile Collaboration Management Service

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Guideline on Safe BYOD Management

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Choosing an MDM Platform

Secure, Centralized, Simple

Ben Hall Technical Pre-Sales Manager

CHOOSING AN MDM PLATFORM

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

ForeScout MDM Enterprise

The ForeScout Difference

How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

How To Manage A Mobile Device Management (Mdm) Solution

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Secure Mobile Solutions

Feature List for Kaspersky Security for Mobile

BYOD Policy for [AGENCY]

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Securing Enterprise Mobility for Greater Competitive Advantage

How To Write A Mobile Device Policy

BYOD: End-to-End Security

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Codeproof Mobile Security & SaaS MDM Platform

AirWatch Solution Overview

BYOD BEST PRACTICES GUIDE

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Athena Mobile Device Management from Symantec

Healthcare Buyers Guide: Mobile Device Management

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Enterprise Mobility as a Service

The User is Evolving. July 12, 2011

Mobile Device Management for CFAES

Parla, Secure Cloud

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Embracing Complete BYOD Security with MDM and NAC

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

IT Resource Management & Mobile Data Protection vs. User Empowerment

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

User Manual for Version Mobile Device Management (MDM) User Manual

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Corporate-level device management for BlackBerry, ios and Android

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Seqrite Mobile Device Management

BYOD Guidance: BlackBerry Secure Work Space

Workplace-as-a-Service BYOD Management

Enterprise Mobility Management

Sophos Mobile Control

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

The. C s. of Mobile Device. Management

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

IBM Endpoint Manager for Mobile Devices

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Best Practices for Enterprise Mobile Printing

Android for Work powered by SOTI

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

A CIO s Guide To Mobility Management

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Securing BYOD With Network Access Control, a Case Study

BEST PRACTICES IN BYOD

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Kaspersky Security 10 for Mobile Implementation Guide

Cloud Services MDM. Overview & Setup Admin Guide

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Transcription:

Page 1

About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors, manages and supports mobile devices across platforms (Android, ios, BlackBerry, Windows), service providers and manufacturers. 1Mobility has a team of dedicated and talented professionals with over 8 years of innovative software development believes that today, Enterprise Mobility though not mandatory, is a fact of business life for various obvious reasons like increased productivity, cost savings, competitive advantage and better customer engagement. Having serviced industries like Banking, Financial Services, Insurance, Technology, Education, Pharmaceutical, Communication & Media and Government and initial focus on the emerging markets, 1Mobility provides affordable solutions either cloud based or privately installed, enabling over-the-air distribution of mobile applications, configuration settings and security policies to corporate owned or employee owned (BYOD) devices through a central web console. No matter what type of organization it is, 1Mobility has affordable solutions and services for all, be it initial, advanced or matured enterprise mobility. 1Mobility offers following solutions Enterprise Mobility Management (EMM) through consulting, development and managed services Data Loss Prevention (DLP) of Mobile Data Compliance enforcement and monitoring Containerization BYOD Management For further information, please visit the 1Mobility website at http://www.1mobility.com Page 2

Geo-fence Challenges Many of the organizations use combination of corporate owned and employee owned (BYOD) devices for various business purposes. Some of the risks with these devices are intentional or unintentional data loss, unproductive use of the devices and vulnerability to the internal company network. Locking down the devices completely is not always the best solution and certainly doesn t work in BYOD scenario. The best balance would be to lock down devices or apply compliances only when the devices are connected to the Wi-Fi network of the company or on a specific schedule. Solutions 1Mobility provides a comprehensive solution that extends a Wi-Fi and Time based geo-fencing solution. This allows organizations to define and apply restrictions on hardware and device features, compliances related Apps, Network configurations and Data Loss Prevention (DLP) policies while the devices, smartphones and tablets, are connected to corporate Wi-Fi or during work hours or specific schedule. The policies are removed when the devices are disconnected from the corporate Wi-Fi. This brings the best balance between the privacy and unrestricted benefits of the mobile devices to employees and security for organizations without any compromise. Features Define multiple fences (Wi-Fi or Time Based) Specify priority for fences in case of overlap Configure Restrictions per fence using our simple to use and intuitive web console Options to apply same or different restrictions across the fences Define restricted Apps within a fence Configurations can be defined based on the groups, locations and ownership of the devices Easy management as geo-fence configurations are part of rest of the policy definitions One click over-the-air (OTA) distribution of the geo-fence configurations through a central web console Page 3

Process Administrators define Wi-Fi or Time based fences and assign names to be referenced in the security policies. Include Geo-fence while configuring policies. Policies can be configured per-fence. Define separate set of Restrictions for each fence or apply same Restrictions to all fences. Define Restricted Apps for the fence to encourage productivity and safeguard Wi-Fi network. Wi-Fi Fence Define a fence based on the corporate Wi-Fi. Provide a logical name to the fence. It is recommended to define MAC address of the Wi-Fi network to uniquely identify the network. Use this fence in Device Profile configuration to specify fence based restrictions and Restricted Apps. Time Fence Define a fence based on specific schedule. Provide a logical name for the fence. Specify the Time Zone for this fence. When applying fence on the device, this Time Zone will be given priority over Time Zone of the device. Define Start Time and End Time of the fence. Daily Recurrence: The fence will be applied every day for the specified time. Weekday Recurrence: Specify the days of the week when this fence should be applied. Page 4

Restricted Apps Specify multiple apps that should be restricted inside the fences. For Wi-Fi based fence, if the app is running in background, the Wi-Fi is disconnected and a warning is shown to the user. If user tries to launch the Restricted App(s), a warning screen is shown to the user and the App is killed. Page 5