mobilecho: 5-Step Deployment Plan for Mobile File Management

Similar documents
When enterprise mobility strategies are discussed, security is usually one of the first topics

5 Things You Need to Know About ipad in the Enterprise

activecho Frequently Asked Questions

Access Your Cisco Smart Storage Remotely Via WebDAV

activecho Driving Secure Enterprise File Sharing and Syncing

Deploying iphone and ipad Apple Configurator

Getting Started. with VitalSource Bookshelf. How to Access your ebooks Using VitalSource Bookshelf

Installation and Upgrade Guide

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

ManageEngine Desktop Central. Mobile Device Management User Guide

Deploying iphone and ipad Mobile Device Management

ipad in Business Mobile Device Management

ios Enterprise Deployment Overview

iphone in Business Mobile Device Management

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG)

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Advanced Configuration Steps

Mobile Configuration Profiles for ios Devices Technical Note

Ensuring the security of your mobile business intelligence

Hosted Microsoft Exchange Client Setup & Guide Book

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

The User is Evolving. July 12, 2011

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Cloud Services MDM. ios User Guide

iphone in Business How-To Setup Guide for Users

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Novell Filr 1.0.x Mobile App Quick Start

Phone: Fax: Box: 230

ios Education Deployment Overview

Mobile Iron User Guide

Dell Mobile Management. Apple Device Enrollment Program

Hosted Microsoft Exchange Client Setup & Guide Book

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Administration Guide

Deploying Apple ios in Education

EMR Link Server Interface Installation

Symantec Mobile Management for Configuration Manager 7.2

Mobile Device Management Version 8. Last updated:

Symantec Mobile Management 7.2

PRACTICE LINK. Getting Started. version 1.0.x. Digita Support: Digita Sales: digita.com

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

ANIRA/AVTS Managed VPN Capability for ios Devices (ipad, iphone, ipod touch )

Dolphin Ocean Server and Dolphin Mobile Client Installation and Configuration instructions

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Systems Manager Cloud Based Mobile Device Management

Novell Filr. Mobile Client

Mobility Manager 9.5. Users Guide

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

ios Deployment Simplified FileMaker How To Guide

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Deploying iphone and ipad Security Overview

Zenprise Device Manager 6.1.5

CentraStage & Apple Configurator

QuickStart Guide for Mobile Device Management

SharePlus Enterprise: Security White Paper

The Maximum Security Marriage:

iphone in Business Security Overview

Deploying iphone and ipad Apple Configurator

How to wipe personal data and from a lost or stolen mobile device

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices

Deploying iphone and ipad Virtual Private Networks

QuickStart Guide for Mobile Device Management. Version 8.6

Symantec Mobile Management Suite

McAfee Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management

Colligo Briefcase Enterprise. Administrator s Guide

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

Copyright 2013, 3CX Ltd.

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

ios How to Back Up from icloud

Creating an Apple APNS Certificate

ipad in Business Security

MDM Mobile Device Management

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Symantec Mobile Management 7.1

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?

EZ RMC Remote HMI App Application Guide for ios

INTRODUCTION OF IPAD USE AT UT. Introduction of ipad use at the University of Twente Content Introduction... 2

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Preparing for GO!Enterprise MDM On-Demand Service

Mobile Device Strategy

Defender Token Deployment System Quick Start Guide

SafeWord 2008 Customer Release Notes

Creating an Apple ID on an iphone, ipad, or ipod touch with a Credit / Debit Card

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

How To Protect Your Mobile Devices From Security Threats

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Generating an Apple Push Notification Service Certificate

Transcription:

mobilecho: 5-Step Deployment Plan for Mobile File Management

Overview GroupLogic s mobilecho is the industry s first and only secure Mobile File Management (MFM) solution for ipads. mobilecho enables IT organizations to provide secure and managed corporate file access for enterprise ipad users, based on existing security and access control policies. With the simplicity demanded by end-users, and the security and management required by enterprise IT, mobilecho provides organizations with the foundation for their mobile file management strategy. mobilecho consists of an ipad app which is downloaded for free from the Apple App Store i and a server component which is purchased or trialed from GroupLogic. ii The server is installed on the Windows file servers that store the files that your mobile users need to access. If outside your corporate network, the mobilecho ipad client needs to connect through your firewall to the mobilecho file server running on your Windows server. One server can optionally be designated as the mobilecho client management server. All mobilecho clients will receive their configuration over-the-air (OTA) from the server, both the first time the user configures mobilecho and also on subsequent connections, to refresh the settings on the mobile device. In planning your deployment of mobilecho, you need to understand the topology of the solution and then determine the best path for your organization. i http://itunes.apple.com/us/genre/mobile-software-applications/id36?mt=8 ii http://www.grouplogic.com/ 2

5 Easy Steps to Deploy mobilecho 1. Secure ipad with a Passcode Lock and backup with encryption Using the iphone Configuration Utility (ICU) http://www.apple.com/support/iphone/enterprise/ or your mobile device management (MDM) solution, set your devices to require a Passcode Lock. Apple Data Protection hardware encryption requires a Passcode Lock be enabled in order to provide encryption, so you must use the ICU or your MDM solution to require that devices have a PIN. This step will also secure your back up in itunes. Your ios device is backed up every time it is synched to itunes. This back up is a potential security risk that will be secured automatically once your device is configured to "require a device PIN" on your itunes backup. Please read the Group Logic Enterprise Security with mobilecho Whitepaper to fully understand the security elements of mobilecho and the ipad. Apple documentation notes that: If you protect your iphone or ipod touch with a passcode, you will be prompted to enter the passcode when you connect to itunes. Once you successfully enter the passcode, itunes will recognize that device as authorized and you will not need your passcode to back up or sync. [Reference http://support.apple.com/kb/ht1766] You can confirm that your device backup is secured with a password in the Preferences -> Devices panel of your itunes software as pictured here: 3

2. Select your method of traversing the firewall When outside your corporate network, mobilecho clients need to connect from the Internet to the mobilecho server running inside your firewall. mobilecho can communicate securely using HTTPS, with or without a VPN, so your options are: Certificate Authentication. enterprise apps through the firewall. convenience is valued. For more information on VPN on Demand with Certificate Authentication, check here: http://support.apple.com/kb/ht1288 For information on configuring an HTTPS reverse proxy, consult the Microsoft Forefront Threat Management Gateway (formerly ISA) [http://www.microsoft.com/forefront/threat-management-gateway] or documentation on other reverse proxy solutions [http://en.wikipedia.org/wiki/reverse_proxy]. 4

3. Determine which servers your mobile users need mobilecho server software must be installed on at least one server. A mobilecho server can be configured to give access to locally stored files and can also act as a gateway to SMB/CIFS volumes on other corporate file servers and NAS storage. Make arrangements for the server software to be installed, configured and managed, ideally via a central management tool such as Microsoft Systems Center. 5

4. Configure mobilecho client management profiles for your users or groups With mobilecho client management profiles, you can centrally configure the mobilecho client security settings, application settings and server settings. Management profiles allow complete control of the mobilecho app s capabilities. For each user or group, configure the appropriate Security settings. These settings can require an application lock password and specify password complexity requirements. Users can be prevented from changing and removing their mobilecho management profiles. [mobilecho Profiles - Security settings] 6

For each user or group, configure the appropriate Application settings. These settings determine which functions of the mobilecho app are enabled. Keep in mind that mobile users may or may not need the same breadth of functions available to desktop users, so it may be okay to disable privileges from your mobilecho app. [mobilecho Profiles - Application settings] 7

For each user or group, configure the appropriate Server settings. These settings determine how often the user must log into servers and automatically provision the list of servers that appear in the mobilecho app. [mobilecho Profiles - Server settings] 5. Deploy mobilecho to users via email or webpage Upon completion of these steps, you can deploy mobilecho to ipad users in your organization and deliver productivity while securing the organization s data against loss. Send your users an email or link to a webpage containing two required items: Hotlink this button to the App Store [ http://www.grouplogic.com/web/meappstore ] where they can install the free mobilecho app Hotlink this button to the invitation file generated by the mobilecho client management server. This invitation file connects the mobilecho app to your mobilecho management server. The user is prompted to authenticate with the Active Directory credentials and is then automatically configured OTA with their assigned user or group profile. 8

Summary Deploying mobilecho is easy and puts your organization on the path of establishing a secure mobile file management strategy. mobilecho enables your enterprise to provide secure access to enterprise file servers for ipad users, eliminating the need for work-arounds and third-party mobile applications that compromise the security of corporate files and assets. Configurable and deployable across the enterprise within minutes, mobilecho promotes efficient IT management while ensuring corporate security and compliance standards are met. Enterprise end-users of mobilecho can access, browse, search and interact with corporate files as well as cache files for offline access, improving overall mobile worker productivity regardless of job function. About GroupLogic GroupLogic helps enterprise and education IT organizations simply and securely integrate diverse computing platforms into enterprise environments, connecting employees and students to enterprise files, content and assets to facilitate a more productive and efficient work environment. With more than two decades of experience, GroupLogic leads the marketplace in helping IT organizations effectively and easily manage the integration of Apple products into the enterprise ecosystem. Whether IT organizations are looking to integrate existing Apple assets, purchase additional Apple hardware like Macs and ipads, or want to take advantage of the hardware costs savings that accompany the adoption of IT consumerization, GroupLogic enables IT organizations to easily and securely manage the rapid integration of diverse platforms while ensuring resources are optimized. GroupLogic enables the enterprise to focus on what is really important competitive differentiation, improved employee productivity, mitigated risk and reduced costs. GroupLogic s proven products mobilecho, ExtremeZ-IP, ArchiveConnect, and MassTransit are in use by some of the world s most innovative companies, including Christie s, International Greetings and Omnicom Group. GroupLogic, mobilecho, ExtremeZ-IP, MassTransit, Zidget, ShadowConnect and ArchiveConnect are all registered or unregistered trademarks of Group Logic, Inc. All other trademarks referenced herein are the property of their respective owners. 2011 Group Logic, Inc. All Rights Reserved. 9