Kony Mobile Application Management (MAM)



Similar documents
Mobile Application Management

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Secure, Centralized, Simple

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Ensuring the security of your mobile business intelligence

POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION

What We Do: Simplify Enterprise Mobility

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

How To Manage A Mobile Device Management (Mdm) Solution

AVG Business SSO Partner Getting Started Guide

IBM Endpoint Manager for Mobile Devices

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

STRONGER AUTHENTICATION for CA SiteMinder

ForeScout MDM Enterprise

Statement of Direction

Securing Office 365 with MobileIron

Symantec Mobile Management Suite

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

IT Resource Management vs. User Empowerment

1 Mobile Device Management

GETS AIRWATCH MDM HANDBOOK

The ForeScout Difference

Cloud Services MDM. ios User Guide

How To Protect Your Mobile Devices From Security Threats

Symantec Mobile Management 7.2

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Hands on, field experiences with BYOD. BYOD Seminar

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec Mobile Management for Configuration Manager 7.2

Advanced Configuration Steps

Healthcare Buyers Guide: Mobile Device Management

Sophos Mobile Control Administrator guide. Product version: 3.6

Oracle Mobile Security

Good for Enterprise Good Dynamics

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

User Manual for Version Mobile Device Management (MDM) User Manual

BENEFITS OF MOBILE DEVICE MANAGEMENT

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Sophos Mobile Control Administrator guide. Product version: 3

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Mobile Device Management for CFAES

activecho Driving Secure Enterprise File Sharing and Syncing

Symantec Mobile Management 7.2

IT Resource Management & Mobile Data Protection vs. User Empowerment

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Windows Phone 8.1 in the Enterprise

Cloud Services MDM. Overview & Setup Admin Guide

Simplifying and Empowering the Implementation of Enterprise Mobile Strategy

RFI Template for Enterprise MDM Solutions

When enterprise mobility strategies are discussed, security is usually one of the first topics

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

MDM and beyond: Rethinking mobile security in a BYOD world

Administering Jive Mobile Apps

WatchDox Administrator's Guide. Application Version 3.7.5

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Total Enterprise Mobility

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

[BRING YOUR OWN DEVICE POLICY]

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Mobile First Government

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Smartphone Enterprise Application Integration

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

Security and Compliance challenges in Mobile environment

AirWatch Solution Overview

CHOOSING AN MDM PLATFORM

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Symantec Mobile Management 7.1

Introduction to the Mobile Access Gateway

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Feature List for Kaspersky Security for Mobile

Sophos Mobile Control Technical guide

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

Enterprise Mobility as a Service

Corporate-level device management for BlackBerry, ios and Android

Middleware- Driven Mobile Applications

An Overview of Samsung KNOX Active Directory and Group Policy Features

Cisco Mobile Collaboration Management Service

MaaS360 Mobile Device Management (MDM) Administrators Guide

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime

How To Write A Mobile Device Policy

IBM United States Software Announcement , dated February 3, 2015

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

THE SIX GOTCHAS: COMMON MISCONCEPTIONS IN MOBILE APPLICATION DEVELOPMENT WHITE PAPER AUGUST Kony Solutions

Sophos Mobile Control Technical Guide. Product version: 3

Novell Filr. Mobile Client

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Storgrid EFS Access all of your business information securely from any device

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Microsoft Enterprise Mobility Suite

Introduction to IBM Worklight Mobile Platform

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

McAfee Enterprise Mobility Management

Google Apps Premier Edition. Included Yes Yes Yes Storage 25 GB Varies by deployment

Transcription:

Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief

Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview 4 Features and Benefits of the Kony MAM Solution 5 Process Flow 6 Provisioning 7 Client Components 8 Server Components 8 Kony Application Manager Console 8 Analytics 9 About Kony 10 2 Kony s Secure Mobile Application Management Feature Brief

Enterprise mobile device strategies are experiencing enormous disruption thanks to staff insisting on using their own devices to access work systems and data as part of the bring your own device (BYOD) trend. Many organizations are considering personally-owned mobile devices for business apps. Their goal is to drive employee satisfaction and productivity through the use of new technologies, while simultaneously reducing mobile expenses. This trend is one of the more dramatic results of the consumerization of IT, in which consumer preference not corporate initiative drives the adoption of technologies in the enterprise. However, many of these devices were not built with enterprise requirements in mind, so IT teams often feel uncomfortable about security and supportability of their corporate applications running on a foreign device over which they have no control. BYOD is more than just shifting ownership of the device to the employee. It has many complex and hidden implications; organizations would do well to define a comprehensive BYOD strategy in advance of implementation. Businesses want the ability to securely manage mobile applications installed on employee devices. As a result, IT concerns have begun moving from mobile device management (MDM) to mobile application management (MAM) as part of a shift in thinking over whether to allow mobile devices toward how to best take advantage of them. What is Mobile Application Management? Mobile Application Management is an essential tool for organizations that provide in-house apps to employees or contractors using corporateliable or individual-liable devices. Unlike Mobile Device Management, Mobile Application Management focuses primarily on the applications resident on mobile devices, rather than the devices themselves. For example, if a user leaves an organization or group, apps and data belonging to the organization can be de-provisioned, without resorting to a full device wipe which could expose an organization to liability. Any organization s BYOD strategy should allow for enterprise applications to be used without compromising its implemented security policies. The goal is for an employee to be able to use both personal and enterprise applications on the same device, without concerns over privacy violations by their employer. A Mobile Application Management solution should allow enterprise IT policies to be enforced on enterprise applications and only on enterprise applications and ultimately reduce the cost of ownership for an enterprise. Kony s Secure Mobile Application Management Feature Brief 3

Kony Mobile Application Management Solution Overview Kony s Mobile Application Management solution allows an IT organization to securely deploy, manage, and analyze mobile apps without compromising enterprise or user data privacy, and all while ensuring total focus on optimizing the mobile user experience. With the Kony MAM solution you add code to your mobile apps that use Kony s policy APIs. The APIs let the app communicate with the Kony App Management server to enforce policies for that app and/or user, such as restricting usage to geo locations or copy/paste into/out the app or deleting on device data if the user s permissions are revoked. The Kony Mobile Application Management component allows administrators to monitor activities such as an app access so that they can then check the current device and application state against the policies. Via the embedded libraries, the app communicates its status and activity back to the server not entire device status, which may lay concerns from employees, contractors, and business partners over how invasive your device management may be. Importantly, management is embedded in the app, so you don t have to manage the device itself. Thus, you should be able to extend legitimate application management to a greater number of users than the universe of devices you actually manage. Kony s MAM focuses on role-based security, provisioning and control of mobile apps in an organization. Additional capabilities include what is commonly called inventory management, since MAM provides a complete view of all devices, and their characteristics such as device type, operating system, memory, and installed applications. Modified App Native Code Application UI Integrated Kony Policy Framework Native Code Device makes the request at application startup to check for modified policies Binary Management / App Catalog Native SDK Security & Usage Policy Data Device OS Policies are returned in JSON format Policy Management Figure 1: Kony Mobile Application Management Component View 4 Kony s Secure Mobile Application Management Feature Brief

Features and Benefits of the Kony MAM Solution The key feature of Kony s MAM is the concept of a Secure Mobile Application Management Container that completely abstracts applications and data away from the specifics of the device and operating system. Kony s secure mobile application container provides a separate and secure virtual environment on the mobile device in which to run Kony and non-kony applications and store related data. This mobile enterprise container provides true configure once, run everywhere capability, offering a single, consistent, secure method to provision applications and synchronize data across all major device types (e.g., ios, Android, BlackBerry, and Windows) seamlessly. It also provides integration of native applications (e.g., calendar, maps, camera, etc.) and supports embedded HTML. The primary benefit of the Kony secure container is total security of all its applications and data on the device. Initial provisioning of the container itself can be controlled through the use of trusted whitelists, profiles and passwords. Figure 1: Example of a policy revoked from a user All configurations, application definitions and data are encrypted. Even if the device is hijacked, jail broken or the container is copied, the contents are protected. All data transmissions over the network are encrypted. The container can be locked to a specific device, meaning that it will not start if copied to another device. The container may be blacklisted, i.e., all applications and data will be automatically removed if an attempt is made to connect to the host. The container may be configured to automatically shut down if idle for a period of time or if the device goes into sleep mode. HTML can be securely executed inside of the container without the risks associated with a browser. All provisioning and access requests are audited. Following are some of the key features of the Kony container: Decommissioning and Blacklisting At any stage, an entire container or specific user may be blacklisted. This means that the next time that the container is started and has network access, all the relevant applications and data will be automatically removed from the device, i.e., reset back to its initial provisioning state. This functionality is essential if a device is lost or stolen. Device Lock You may lock a Kony container to a specific device, i.e., if it is illegally copied to another device, it will not start. This prevents any unauthorized backup or replication of the container data. Security The primary benefit of the Kony secure container is complete security of all its applications and data on the device. The following is a summary of the security features: Initial provisioning of the container itself can be controlled through the use of trusted whitelists, profiles and passwords. All configuration, application definitions and data are encrypted. Even if the device is hijacked, jail broken or the container is copied, the contents are protected. All data transmissions over the network are encrypted. The container can be locked to a specific device, meaning that it will not start if copied to another device. The container may be blacklisted, i.e., all applications and data will be automatically blocked from being accessed. A range of identity management options can be used to authenticate user access to the container through standard directory services, 3rd party security applications, custom functionality etc. Users can only access the applications and data that they are authorized to. The role-based provisioning is strictly controlled through the user profiling facility on the central Kony admin console. The container may be configured to automatically shut down if idle for a period of time or if the device goes into sleep mode. HTML can be securely executed inside of the container without the risks associated with a browser. All provisioning and access requests are audited. The innovative secure container feature provides smarter mobility by allowing for identity management/role-based provisioning and modular application implementation. Kony s Secure Mobile Application Management Feature Brief 5

Process Flow Figure 2 below describes the complete process flow. Using enterprise connectors and sync, a Kony developer builds an application. The application is written with a single code base and made consumable on any device type and on multiple channels. Once the application is written with a single code base, i.e. JavaScript, the developer can publish to a choice of channels as seen here. Note channels available in native ios, Android, Windows Phone, and BlackBerry, as well as HTML5, single page applications and even desktop and desktop web. The IT Administrator wraps policies to the binary, assigns the application to users/group(s)/role and promotes the app to his enterprise branded app store. In this example, John is assigned an app based on his role and use credentials. Once John downloads the app store he will be able to push this app automatically. John brings his personal device to work. He then has the option of downloading his company branded app store from the general app marketplace or via a URL. Once he logs into his enterprise app store, he is pushed notifications about apps to which he has access and others that are suggested for him. One of the first apps that he downloads is the enterprise mobile container. This container is a secure area where applications can be loaded and managed separately from the rest of the applications on his device. The administrator can then manage the secured container, as opposed to the entire device, with centralized policy management. Admin Monitors App Figure 2: Kony Mobile Application Management Process Flow 6 Kony s Secure Mobile Application Management Feature Brief

Provisioning Following are the steps for initial provisioning of the secure application: 1) When the employee wishes to use the company apps on a personal device he or she is instructed to go to an initial URL by the company system administrator in the form of an email. 2) They login using their Active Directory credentials. 3) The folder app gets downloaded onto the phone after the display of a pop up asking for permission to download the folder app. The default language for this message is: Are you sure you want to install the folder that will contain all your corporate apps? 4) Only the folder app will be downloaded on first use. No other app will be downloaded at that point. This user experience is demonstrated in Figure 4 below. Figure 4: Kony MAM Provisioning Steps Kony s Secure Mobile Application Management Feature Brief 7

Client Components Kony Mobile Application Management also includes client components, which consist of: 1) Client App Framework Provides isolation of application from other applications and ensures a secure framework. App Management Capabilities include: i. Authorize application ii. Handling, creation, validation and revocation of tokens / certificates iii. Remote wipe of data in application iv. Remote revocation of application authorization v. Interfaces to authentication and authorization services 2) HTML5 Renderer HTML5 Compliant rendering components including application UI caching, navigation and branding. 3) Local Data Management Manage offline data container including handling of data encryption and content classification metadata 4) Content Policy Engine Policy engine for controlling application functionality in offline and online mode based on content classification. 5) Inter-App Communication This is how the communication occurs within the folder from one app to another. 6) App Management Provides connection point for remote administration of application and content and distribution of offline policies. Server Components In addition to client components, Kony Mobile Application Management contains server elements that are critical to executing comprehensive application management: KonyOne Server KonyOne provides an enterprise grade mobile application server that sits on top of traditional J2EE application servers. The KonyOne Server provides key services such as device detection, a services bus, session state, security services, analytics, reporting, and more. KonyOne runs on open, industry standard J2EE technology like IBM WebSphere, Oracle Weblogic, and Tomcat Integration Services Integrate into backend systems with web services, direct database access, through Java or via any of Kony s prebuilt Connectors for SAP, Oracle and Microsoft enterprise systems. Kony Application Manager Console Kony provides a single location to manage app security, app usage policies, app updating and securitizing, provisioning apps to the Enterprise App Store and more, thereby ensuring a manageable and end-to-end solution for the IT Policy Officer. Working in conjunction with your mobile device management vendor if present, KonyOne Platform provides an integrated console through which changes can be made and tracked, while also providing a wide range of analytics and reports to help optimize the employee experience, and that of your corporation. Employee Authentication and Authorization Services Integration with SiteMinder/Active Directory and other security based systems. This includes Enterprise App Distribution to control access to applications allowing only employees authorized to download the apps. Kony provides a single location to manage app security, app usage policies, app updating and securitizing, provisioning apps to the Enterprise App Store and more, thereby ensuring a manageable and end-to-end solution for the IT Policy Officer. 8 Kony s Secure Mobile Application Management Feature Brief

Administrators gain complete visibility into their applications, so they can immediately see when users are experiencing performance issues rather than waiting for them to complain about crashes, slow response times, or error messages. As a result, you can take immediate troubleshooting action. With Kony s Application Management Console, customers can automatically: Monitor App performance Manage App errors/faults/crashes and ensure optimum service provided by your Apps Evaluate log files (across myriad devices) to determine reasons for crashes and understand what a user was attempting to do when a fault or crash occurs Monitor start/end times for App usage, as well as transaction processing times Minimize the burden of help desk support Figure 5: Kony Application Manager Console Analytics Report, analyze, and audit using built-in modules and industry standards like Adobe Omniture, IBM Coremetrics, Google Analytics, and Webtrends Analytics. 4 types of report views are available: Tabular Bar Line Pie Two types of report selections are available: Figure 6: Kony Application Manager Console Report Apps: Total apps per platform Downloads: Total downloads per platform Mandatory apps not installed per user Information on users per device and per OS number of apps downloaded Information on apps number of users per device and per OS These reports can also be scheduled to run at different times. These could include scheduling reports daily, per hour, per week etc. Kony s Secure Mobile Application Management Feature Brief 9

About Kony Kony and the KonyOne Platform enable Fortune 500 companies to offer consumers and employees feature-rich mobile applications in less time and at lower costs than any other solution. Leveraging a Write Once, Run Everywhere single application definition, applications are designed and developed just once, in a device independent manner, and deployed across multiple channels, including native applications, deviceoptimized HTML5 and HTML4 mobile web, SMS, web gadgets, kiosks, and tablets. Kony s unique platform is proven to future-proof a company s mobile investment by enabling applications to be changed once for all channels, ensuring faster adoption of new operating systems and standards as they are introduced, while eliminating maintenance, upgrade and future development costs. More information can be found at www.kony.com/mobile-application-management 7380 West Sand Lake Road Suite #390 Orlando, Florida 32819 Tel: 1.321.293.KONY (5669) Toll free: 1.888.323.9630 Fax: 321.293.0161 2012 Kony Solutions, Inc. All rights reserved. Kony and the Kony Platform are trademarks of Kony Solutions, Inc. Apple and iphone are trademarks of Apple Inc., registered in the U.S. and other countries. BlackBerry is a registered trademark of Research In Motion. Android is a trademark of Google Inc. Other product names mentioned are the property of their respective holders.