iphone and ipad in the enterprise. Secure? Sure.



Similar documents
SECUREPIM S RANGE OF FUNCTIONS 1. SecurePIM features and architecture

Cloud Services MDM. ios User Guide

Ensuring the security of your mobile business intelligence

Egnyte Cloud File Server. White Paper

CAS PIA. Description of Services

Symantec Mobile Management Suite

8 Critical Requirements for Secure, Mobile File Transfer and Collaboration

Manual for Android 1.5

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

ONE Mail Direct for Mobile Devices

Quick Start and Trial Guide (Mail) Version 3 For ios Devices

CoSign by ARX for PIV Cards

WHITEPAPER BYOD BRING YOUR OWN DEVICE. As private smartphones, tablet PCs & Co. result in a change in technology in the workplace.

EasiShare Whitepaper - Empowering Your Mobile Workforce

UNIFIED COMMUNICATIONS POST-MIGRATION INSTRUCTIONS

Sophos Mobile Control User guide for Apple ios. Product version: 4

Mobile Security. Policies, Standards, Frameworks, Guidelines

DriveLock and Windows 7

LOOK TO THE CLOUD: Cloud Computing Primer An ebook

Mobile Iron User Guide

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Software Solutions. Microsoft Dynamics CRM. SoftASA Business Software. masventa Business GmbH Von-Blanckart-Str Alsdorf

Ensuring the security of your mobile business intelligence

DriveLock and Windows 8

Intralinks VIA. Securely sync, share, collaborate and manage your business content. intralinks.com/via

Q. I use a MAC How do I change my password so I can send and receive my ?

SAP White Paper Enterprise Mobility

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Technical Whitepaper. Secure Docs

Protecting Your Data On The Network, Cloud And Virtual Servers

Simply Connected, Simply Secure. Security and lifestyle merges with C24 Interactive for total and complete control at your customer s fi ngertips.

activecho Frequently Asked Questions

Kony Mobile Application Management (MAM)

Connecting to Wireless networks and hotspots

How to wipe personal data and from a lost or stolen mobile device

IONU PRO Product Overview

Technology Requirements for Using Video Conferencing with Victims

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors

Hosted Microsoft Exchange Client Setup & Guide Book

How To Use Crm.Pad 2.0

SAP: One Logon for All Systems SAP NetWeaver Single Sign-On

Hosted Microsoft Exchange Client Setup & Guide Book

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Sophos Mobile Control User guide for Apple ios

MC3WAVES Wireless Connection Wizard

Chris Boykin VP of Professional Services

Research Information Security Guideline

RESCO MOBILE CRM QUICK GUIDE. for MS Dynamics CRM. ios (ipad & iphone) Android phones & tablets

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Lotus Notes Traveler User and Troubleshooting Guide for ios Devices. Manage the Settings for your Mail, Calendar, and Contacts Apps

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access:

Secure iphone Access to Corporate Web Applications

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Wonderware SmartGlance

Access All Your Files on All Your Devices

efficient workflow security capability streamlined productivity SOFTWARE SOLUTIONS

Support for Apple Mac and ios Devices

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services.

Client Training Manual

Voice. Internet. Apps. Data Center. Wide Area Networks. Business is better in the cloud

FileMaker Security Guide The Key to Securing Your Apps

Microsoft Outlook Phone Set Up

Windows Phone 8.1 Mobile Device Management Overview

Step-by-Step Setup Guide Wireless File Transmitter

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

RESCO MOBILE CRM USER GUIDE. Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8

AkrutoSync 4.0 User Guide

Apple Mail Outlook Web Access (OWA) Logging In Changing Passwords Mobile Devices Blackberry...

Product Analysis of owncloud Enterprise Edition 8

Windows Phone 8.1 in the Enterprise

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Web Application Security

Transcription:

iphone and ipad in the enterprise. Secure? Sure.

According to the current state of the art, when smart-card mode is activated, it is impossible to gain unauthorized access to business data stored in SecurePIM.

Your upgrade to business class Apple s mobile solutions simply make work more fun. But for enterprises the fun stops when it comes to securely handling sensitive business data. Devices go missing, personal and business data get jumbled up, and IT departments are unable to manage the vast number of mobile devices and protect them from unauthorized access. SecurePIM provides the first truly secure way of accessing data in a business environment using your iphone or ipad without restricting your use of those devices. You can access your business emails, contacts, calendars and documents centrally all from the same app. This personal information manager complies with the toughest enterprise security standards and is as straightforward and intuitive to use as you would expect from an app running on an Apple device. www.securepim.com

SecurePIM in the enterprise The top 5 reasons 1. Maximum security for mobile devices Corporate data is not secure on mobile devices. Devices get lost or are targeted by thieves, and data communications often take place in unsecured public spaces, such as airports. What is more, existing security measures only offer inadequate protection. SecurePIM, however, enables you to create a protected area on your mobile devices to hold important business data and so reliably protect this valuable resource against unauthorized access. 2. Deploy iphones and ipads in your enterprise? Sure, you can safely do that. Even when employees are banned by their companies from accessing business data with their iphones and ipads, they still fi nd ways of doing so by using, for instance, private email accounts or online services like Dropbox. They often simply do not understand the security risks associated with doing this. SecurePIM, however, offers a controllable solution so that your business data is accessed in a secure way. 3. Separation of business and personal data SecurePIM stores all company-related information inside a secure area on your mobile device. Business data is therefore reliably isolated from personal data. SecurePIM includes the Mobile Application Management Portal that lets you easily control and confi gure the access to data. It is this that makes a bring-your-own-device strategy at all possible in the fi rst place.

5 REASONS FUNCTIONS SECURITY 4. Intuitive and familiar user interface that you know and love SecurePIM puts all the business functions at your fi ngertips in a single app. Access your business emails, contacts, calendars and documents centrally without having to switch apps. All data is stored in encrypted form inside the secure container. SecurePIM s modular design means you can attach documents to your emails or add appointment details contained in emails to your secure calendar with a tap of your fi nger. 5. Straightforward enterprise integration SecurePIM is just as easy to introduce in your company as it is to use thanks to seamless integration in your IT environment: Microsoft Exchange Server support Microsoft SharePoint and OpenText document access Optional integration of SecurePIM in your public key infrastructure (PKI) www.securepim.com

5 REASONS FUNCTIONS SECURITY Emailing, browsing, managing a full set of business functions in a single app Secure Mailer Security for your emails Send and receive emails in encrypted form using the S/MIME standard. It is reassuring to know that even unencrypted emails are always stored on the device in encrypted form so they too are protected against unauthorized access. Secure Contacts Secure management of contacts SecurePIM securely manages contacts from your company s internal database and keeps them strictly separate from personal data. There are many apps like Facebook that may access personal contacts in the background. SecurePIM, however, always ensures such access to highly sensitive business contacts is denied. Secure Calendar Security for your appointments Your business calendar may also contain highly sensitive information that must be protected. SecurePIM lets you manage your appointments securely and conveniently and of course provides full integration in your company calendar. www.securepim.com

Appointment on April 10

5 REASONS FUNCTIONS SECURITY Secure Docs Security for your documents Secure Docs enables you to use confi dential documents conveniently and securely even outside your internal network. SecurePIM accesses the company s internal document management system via a secure channel and saves the fi les in encrypted form on your iphone or ipad. Only you can open the fi les using your personal key and edit them offl ine. Secure Browser Secured Web browser Secure Browser lets you decide which internal Web pages and portals your employees should have access to from inside the secure environment of SecurePIM and which ones they should not be able to access. This consequently also enables you, for instance, to protect access to the sensitive data held in an internal CRM solution. With respect to the security of your company s data, it then becomes irrelevant which pages your employees access using their iphone s or ipad s standard browser. Smart Card Solution Maximum security authentication Now, for the fi rst time, SecurePIM supports the optional use of smart cards for authentication on mobile devices. This permits highly sensitive areas of the company in particular to protect their data with the maximum level of security. The smart card can thus optionally be used as the sole method for logging in to SecurePIM and for decrypting all the data stored within it. Mobile Application Management The heart of SecurePIM The Mobile Application Management Portal lets your company s IT department centrally manage and confi gure the SecurePIM app on all the mobile devices used by each individual user. And if the worst comes to the worst, all enterprise data stored in SecurePIM can be locked immediately. Any personal data stored on the device, however, remains unaffected by this. Since the server supplies all the necessary settings centrally, the task of integrating SecurePIM in your company s IT infrastructure cannot be simpler. www.securepim.com

Maximum security with smart cards

5 REASONS FUNCTIONS SECURITY Ultimate security Made in Germany SecurePIM complies with the toughest security standards applied in German enterprises and prescribed by German data protection law. All data including emails, documents and contacts is stored in the hermetically isolated SecurePIM security container with the help of strong encryption algorithms based on the user s personal key. Authentication in SecurePIM is by password input in accordance with the enterprise s internal guidelines. At the highest security level, authentication and decryption are performed using a smart card (ISO 7816). This makes access impossible even in the event of targeted theft of the device with immediate deactivation of the network link. Thanks to the strict separation of business and personal data on the mobile device, SecurePIM reliably respects the guidelines pertaining to the protection of employee data. The user has full personal use of their mobile device while the Mobile Application Management Portal ensures the company retains complete control over all enterprise-related data and can enforce its internal security policies. The Mobile Application Management facility has no access to the user s personal data. The SecurePIM app is developed by the German software company virtual solution AG. All areas of the app pertaining to security as well as the associated management portal have been developed exclusively by the developer and are therefore one hundred percent Made in Germany. www.securepim.com

Try it now! Enterprises can test SecurePIM and the Mobile Application Management Portal for free. Request your test version at www.securepim.com info@securepim.com virtual solution AG Rupprechtstr. 25, 80636 Munich, Germany Tel.: +49 (0) 89-30 90 57-0 Fax: +49 (0) 89-30 90 57-200