SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.



Similar documents
Deploying iphone and ipad Mobile Device Management

iphone in Business Mobile Device Management

ipad in Business Mobile Device Management

Mobile Device Management ios Policies

Sophos Mobile Control Technical Guide. Product version: 3

LabTech Mobile Device Management Overview

Systems Manager Cloud-Based Enterprise Mobility Management

McAfee Enterprise Mobility Management

Sophos Mobile Control Technical Guide. Product version: 3.5

Fromdistance MDM Feature Sets. Symbian^3 & S60. Windows Mobile

Mobile Iron User Guide

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Bell Mobile Device Management (MDM)

Corporate-level device management for BlackBerry, ios and Android

System Configuration and Deployment Guide

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Policy and Profile Reference Guide. BES10 Cloud Market Preview

PMDP is simple to set up, start using, and maintain

Cloud Services MDM. ios User Guide

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.

Default Policy Settings ZENworks Mobile Management 2.7.x

Introduction to AirWatch and Configurator

Systems Manager Cloud Based Mobile Device Management

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Deploying iphone and ipad Security Overview

Mobile Device Management Solution Hexnode MDM

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Sophos Mobile Control Administrator guide. Product version: 3

Administration Guide BES12. Version 12.3

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Feature List for Kaspersky Security for Mobile

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Managing Mobility. 10 top tips for Enterprise Mobility Management

Junos Pulse for Google Android

Sophos Mobile Control Administrator guide. Product version: 3.6

User Guide. Version R9. English

Mobile Device Management (MDM) Policies

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Good for Enterprise Good Dynamics

Sophos Mobile Control user help. Product version: 6.1

Mobile First Government

Fromdistance MDM. Setting the standard in device management

Secure, Centralized, Simple

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)

AirWatch for ios Devices

Copyright 2013, 3CX Ltd.

Sophos Mobile Control Technical guide

Mobile Device Management (MDM) Policies. Best Practices Guide.

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control SaaS startup guide. Product version: 6

User Manual for Version Mobile Device Management (MDM) User Manual

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

Mobile Device Management Version 8. Last updated:

Remote MasterMind 4.0

User Guide. Version R92. English

Xperia TM and apps

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Policy and Profile Reference Guide

Vodafone Secure Device Manager Administration User Guide

Quick Start Guide. Version R9. English

Addressing NIST and DOD Requirements for Mobile Device Management

Sophos Mobile Control Startup guide. Product version: 3.5

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Sophos Mobile Control User guide for Apple ios

Windows Phone 8.1 Mobile Device Management Overview

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Introduction to Mobile Management (MEM)

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Administrator's Guide

Sophos Mobile Control Startup guide. Product version: 3

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

End User Devices Security Guidance: Apple ios 8

AirWatch for Android Devices

MaaS360 Mobile Device Management (MDM) Administrators Guide

Android support for Microsoft Exchange in pure Google devices

GO!Enterprise Mobile Device Management Android Release Notes

Advanced Configuration Steps

Telstra Mobile Device Management (T MDM) Getting Started Guide

Absolute Manage MDM. John Wu Systems Engineer

Huawei AnyOffice MDM Technical White Paper

ipad in Business Security

Symantec Mobile Management 7.2 SP3 MR1 Release Notes

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Transcription:

SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support more sophisticated MDM functionality. If a certain feature is not supported by some platform, it indicates that the platform cannot support the feature and building a support for it is not possible. Please ask a more thorough list of features from your SyncShield contact if you are interested in the differences between operating systems versions. SYSTEM FEATURES Device registration methods Active Directory / LDAP synchronization Device information import via Excel Registration from Self-Service Portal Self-registration via app market application Task notifications Data push notifications Requires data connection (Cellular data, WiFi) Import and synchronize user and device information from Active Directory / LDAP. Import information of the device fleet via.csv-file. Minimum required information: device name and phone number OR e-mail address. End users can register their devices via Self- Service Portal. SyncShield app can be downloaded from Appstore, Google Play market and Marketplace. Opening the app will begin device registration. SMS notifications as backup option Requires SIM card Device polling Device periodically connects to the server Task execution Scheduled tasks Periodic tasks Batch tasks SMS delivery Preset a certain task to be executed at a specific time. Preset a certain task to be executed periodically. Create customized sets of tasks, which are easy to run repeatedly. Send SMSs for informative purposes.

ACCOUNT CONFIGURATIONS Active Directory synchronization Self-registration options Self-Service Portal options Organisation structure Users & roles Device tagging Two tier authentication For in-house installations Synchronize the up-to-date device and user information from your Active Directory or other directory (LDAP). Choose whether to allow end user-made registrations. Choose what features are available for the end users in Self-Service portal. Create the kind of organization structure which fits your company s device fleet. Create users and assign roles: administrator /viewer for specific organisations. Tag devices automatically during registration, use custom tags and monitor policy status. Option for extra security, sends a login password to users phone whenever logging in the system. REPORTING AND TROUBLESHOOTING Device inventory Application inventory Device information and diagnostics Information of e.g. device model, hardware, software versions Domain reports Task Logs Event Logs For in-house installations Dashboard Reboot Listings of all devices by organization, user, platform, model etc. List of which applications are used in company devices and which devices use them Detailed reports on company account, devices, applications Information of all the tasks initiated for the company s devices, details of the task execution and administrator initiating the task. Information on all policy actions (warnings, violations), added and removed devices, configurations etc. Alerts and notifications concerning SyncShield administrator o Expiring certificates o Policy violations o New self-registrations o Failed self-registrations o Compromised device alerts o Removed MDM profiles

POLICY MANAGEMENT Custom policies for different management levels Inherited policy rules Policy rules Policy tasks Policy warnings Policy violations Define a corporate policy for the entire company, and unique policy for each organization. Company level policy rules affect all organisations, however there is a possibility to disable any company policy rule for an organization if necessary. Set required applications, files and settings for each organization. Each rule may have a parent rule, which needs to be met before applying the new rule. Device management tasks, such as enabling company app catalog or sending an SMS, may be linked to a policy. The tasks are executed when policy has been correctly applied or when the policy is reset. If the device does not comply with the policy, the end user may receive a warning message, which directs the end user to correct the situation. If the device does not comply with the policy in a set amount of time, policy violation message is sent to SyncShield administrator via e-mail, SMS and/or on SyncShield dashboard. It is possible to set a violation task, which occurs when the violation is reported to the administrator e.g. lock device. SELF-SERVICE PORTAL Portal customization End user actions Add devices Reinstall MDM Get device information Lock device Wipe device Change portal name and helpdesk conctact information shown to end users. End users can add their devices to the system, the devices are automatically linked to their MDM user profile. If the end user changes a device, he/she can continue with the same MDM profile by reinstalling the profile to the new device. End user automatically gets the device information upon MDM installation. End user can lock the device remotely, removes the need to contact helpdesk for immediate security action. End user can wipe the device remotely, removes the need to contact helpdesk for immediate security action.

APPLICATION MANAGEMENT Basic application management Includes installing, uninstalling and updating applications and listing applications on device Silent application management Application installations and uninstallations require no end user interaction Application inventory List of which applications are used in company devices and which devices use them Company app catalog Share company apps and recommend app market apps for end users in company s own app market, available applications depend on the device s organization Application blacklist Forbidden applications and exceptions Application roaming restrictions Determine which applications are not allowed to use data in foreign network Application installer lock Prevent all end user made application installations Appstore application volume purchasing program Apple s volume purchasing program (VPP) allows bundle purchases for specific apps to enterprise use. When bundle is bought, Apple delivers an Excel sheet containing license key for each installation of the app. Import this sheet to SyncShield. CONTENT MANAGEMENT File system management Add, delete and execute files on the device, information on the exact location required Distribute files via company app catalog Grant access to files via company app catalog, available files depend on the device s organization

CONNECTION MANAGEMENT Exchange account settings Create a settings template for Exchange account. Exchange settings can be both sent to and deleted from device. E-mail (pop/imap) settings Create a settings template for e-mail account. E-mail settings can be both sent to and deleted from device. TouchDown settings Create a settings template for TouchDown account. TouchDown settings can be both sent to and deleted from device. Lotus Notes Traveler settings Create an EAS settings template for Lotus Notes Traveler account. Lotus Notes Traveler settings can be both sent to and deleted from device. WiFi access point settings Send, edit and delete access point settings. Proxy settings Send, edit and delete access point settings. Send web bookmarks Send bookmark icon to device s home screen. EXPENSE MANAGEMENT Prevent MDM connections while roaming SyncShield notices when device is roaming and does not send notifications during roaming. Lock and wipe actions are regardless of this setting. Application roaming restrictions Determine which applications are not allowed to use data in foreign network. Data counters Displays how much cellular data, roaming data or WiFi data the device has used. Limit mobile data usage Per day, week, month.

SECURITY MANAGEMENT Lock device Lock the device remotely. Backup & restore For calendar, contacts, SMSs. Backups are encrypted and stored on SyncShield server. VPN settings Send VPN settings to the device, configure the settings and delete them from the device. Anti-Theft Protective action when SIM card is changed (lock, wipe). Detection of compromised device Detects jailbroken ios devices and rooted Android devices. Device lock code policies Autolock Set a time in minutes how long a device can be unused before the device is locked. Force lock code use Prevents end user from disabling the autolock. Minimum lock code length Alphanumeric lock code required Require complex characters Disallow simple lock code Maximum of failed attempts allowed After set amount of failed attempts is made, the device is wiped. Lock code expiration period Set how often the lock code should be renewed. Lock code history Prevents the reuse of old lock codes. Administrator given lock code End user cannot change the lock code.

Remote wipe Full wipe to factory settings Clears all data and settings. Selective wipe Wipes only phone memory, the external memory card is left unharmed. Corporate data wipe Deletes settings and applications which are linked to the company profile on the device. Certificate management Root certificate installation Install certificates which are not device specific. SCEP settings Device specific certificate delivery. Encryption Phone memory encryption Uses device s native encryption. SD card encryption Restrictions Disallow camera Disallow access to settings Disallow Bluetooth Disallow WLAN Disallow native browser Disallow native app market Disallow Youtube Disallow access to SD card

ios SPECIFICS Disallow user to make in-app purchases Disallow FaceTime Disallow Photo Stream Force encrypted backups ios backups are saved in itunes Force itunes password query Disallow itunes Disallow icloud backup Disallow icloud document and key-value synchronisation Disallow multiplayer gaming Disallow adding Game Center friends Disallow untrusted HTTPS certificates Don't remember what users enter in web forms Prevent access to fraud websites Disallow automatic sync while roaming Disallow screenshots Disallow voice dialing Disallow JavaScript Disallow popups Allow cookies

SAMSUNG ANDROID SPECIFICS Disallow non-market application installation Prevent SyncShield client uninstallation Disallow factory reset by user Disallow crash report sending Disallow GPS Disallow microphone use by 3rd party applications Disallow NFC adapter Disallow SD card write operations Disallow tethering Disallow VPN Disallow data roaming Disallow clipboard use Disallow screen capture Disallow USB debugging Disallow USB usage as mass storage Disallow USB media player