Seqrite Mobile Device Management

Similar documents
What We Do: Simplify Enterprise Mobility

LabTech Mobile Device Management Overview

MAM - Mobile Application Management

Feature List for Kaspersky Security for Mobile

Compliance Rule Sets in MaaS360

Codeproof Mobile Security & SaaS MDM Platform

Systems Manager Cloud-Based Enterprise Mobility Management

Cloud Services MDM. ios User Guide

ForeScout MDM Enterprise

The ForeScout Difference

McAfee Enterprise Mobility Management

IT Resource Management & Mobile Data Protection vs. User Empowerment

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

PMDP is simple to set up, start using, and maintain

Systems Manager Cloud Based Mobile Device Management

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Mobile Device Management Version 8. Last updated:

Data Loss Prevention & Mobile Device Management

Total Enterprise Mobility. Norbert Elek

Copyright 2013, 3CX Ltd.

Mobile device and application management. Speaker Name Date

IBM United States Software Announcement , dated February 3, 2015

Cisco Mobile Collaboration Management Service

When enterprise mobility strategies are discussed, security is usually one of the first topics

How To Manage A Mobile Device Management (Mdm) Solution

Junos Pulse for Google Android

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Ben Hall Technical Pre-Sales Manager

iphone in Business Mobile Device Management

Mobile Device Management Version 8. Last updated:

Symantec Mobile Management Suite

Securing Corporate on Personal Mobile Devices

IT Resource Management vs. User Empowerment

Sophos Mobile Control Technical Guide. Product version: 3

ipad in Business Mobile Device Management

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SOTI Inc. Presents. Andrew Aldis - Presale and professional service engineer jayp@soti.net.

Advanced Configuration Steps

Dell World Software User Forum 2013

Managing Mobility. 10 top tips for Enterprise Mobility Management

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)

Healthcare Buyers Guide: Mobile Device Management

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Mobile Device Management Solution Hexnode MDM

Samsung SDS. Enterprise Mobility Management

Deploying iphone and ipad Mobile Device Management

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Sophos Mobile Control Technical Guide. Product version: 3.5

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Enterprise Mobility as a Service

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

ESET MOBILE SECURITY FOR ANDROID

Sophos Mobile Control user help. Product version: 6.1

Symantec Mobile Management 7.2

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15

Symantec Mobile Management for Configuration Manager 7.2

Copyright 2013, 3CX Ltd.

Introduction to Google Apps for Business Integration

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Corporate-level device management for BlackBerry, ios and Android

Good for Enterprise Good Dynamics

An Overview of Samsung KNOX Active Directory-based Single Sign-On

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

A guide to enterprise mobile device management.

Installation Instructions

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

MTP. MTP AirWatch Integration Guide. Release 1.0

Administrator's Guide

Addressing NIST and DOD Requirements for Mobile Device Management

Kaspersky Security for Mobile

Microsoft Enterprise Mobility Suite

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Apple ios. Product version: 4

Symantec Mobile Security

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Secure, Centralized, Simple

We Manage Mobility. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

SysAid MDM User Guide for Android

Kaspersky Security 10 for Mobile Implementation Guide

Cloud Services MDM. Telecom Management Admin Guide

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

PULSE SECURE FOR GOOGLE ANDROID

Sophos Mobile Control Technical guide

MaaS360 Mobile Device Management (MDM) Administrators Guide

MDM Mobile Device Management

ESET ENDPOINT SECURITY FOR ANDROID

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Sophos Mobile Control

A. Welcome 4 B. Features 4 C. Getting Started 4. D. Using SureMDM Web Console 15

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Windows Phone 8.1 in the Enterprise

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Mobility Manager 9.5. Users Guide

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

An Overview of Samsung KNOX Active Directory and Group Policy Features

Transcription:

Enterprise Security Solutions by Quick Heal Seqrite

Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices within your enterprise from an intuitive web-enabled user console. Introducing Seqrite MDM In today s hyper connected world, mobile devices and applications have become an integral part of every organization s success. IT departments are now tasked with looking into the lifecycle management of these devices. This task is made harder thanks to the popularity and growth of smartphone usage within enterprises to enhance employee productivity. However, when a new device is connected to the enterprise network the possibility of data loss, malware infections and other threats increases manifold. Seqrite MDM allows you to implement a wide range of device controls without ever having to physically handle a user s device. Functioning completely over-the-air, MDM enables you to manage and regulate comprehensive device policies and configuration settings. Once Seqrite MDM has been enabled, enterprise users are a simple click away from completely secured access to their business assets.

Endpoint Mobile Device Security Management Product Highlights Seqrite MDM provides end-to-end deployment of anti-theft features, policy compliance, device status and safeguards corporate devices. Cloud-based mobile device management solution that offers true SaaS. Reliable and scalable solution that expands as your operations grow. Flexible deployment options available to suit your customized needs. Over-the-air enrollment makes setup easy, quick and economical. Proactive device security upholds compliance of enterprise devices. Flexible application control provides transparency and compliance of all installed apps. Anti-theft features and seamless configuration of profiles and policies. Custom reports about device non-compliance, data usage or infection status.

Features List SEAMLESS CLOUD-BASED SOLUTION Seqrite MDM is a completely cloud-based solution that works seamlessly and gives you all the advantages of a true SaaS (Software-as-a-Service). When it comes to deployment and management, you can enjoy the following benefits: Instant availability allows enterprises to get up and running within minutes Anytime and anywhere access gives enterprises tremendous flexibility Easy availability of any new features and enhancements Flexible deployment options for on-premise installation or cloud as per client needs UNIFIED MANAGEMENT CONSOLE Seqrite MDM allows you to manage all mobile devices within your enterprise with utmost ease. Through a simple graphical interface, IT administrators can gain a bird s eye view of all enrolled devices and enforce policies. The unified console provides: Comprehensive dashboard with global search in real-time Proactive notifications and alerts for actionable responses Holistic view of devices, infections and compliance status Individual device view for in-depth status and activities on a device Network and app usage stats showing trending apps and malware Simple navigation to details of all entities

EFFORTLESS DEVICE ENROLLMENT Seqrite MDM minimizes resources spent towards setting up and configuring devices by carrying out seamless device enrollment over-the-air. Individual devices can enroll within minutes and enterprises can reach them irrespective of their location. Once the device is integrated into the MDM system, enterprises can also create custom user groups for flexible profile management. Flexible enrollment via email, SMS, or QR codes IMEI validation check against preset list during enrollment After authentication, real-time sync of configurations, policies, apps and restrictions Real-time notifications to users about pending actions Level-based user role privileges for IT administrators PROACTIVE SECURITY MANAGEMENT Enterprises can now dynamically monitor all enrolled devices for any security risks or insecure settings, and then take corrective action. Browsing protection, phishing protection and web protection is afforded to the devices and web categories/urls can also be allowed or blocked. Policies to ensure security and compliance of all devices Enforce passcode policies with configurable parameters Remotely locate, lock and wipe data on lost or stolen devices Carry out a custom wipe of selected data Periodic tracking of device location

SIM card changes can be flagged and communicated Block device USB access Schedule a Quick Scan/Full Scan at any time CUSTOM REPORTING IT admins can view customizable reports based on the requirements by selecting one or more entities and applying defined set of criteria. Real-time and interactive graphical summaries about infection status, app non-compliance, network data usage and more can be viewed. This allows admins to get a comprehensive view of the status of mobile devices within the enterprise. Custom reports can be defined by enabling the administrator to select data and define conditions Instant and detailed audits and real-time graphical summaries User activity logs for better visibility and transparency Warnings for non-compliance in case of app installation/uninstallation or pending device upgradation Real-time multiple device locations available on the map APPLICATION CONTROL Application control enables administrators to manage the app repository and install/uninstall apps and set restrictions on apps that are installed on devices. These settings can be managed on devices remotely from the server portal, thus enabling ease of use and access. Application control allows the administrator to perform the following functions on client devices:

Manage app repository at the enterprise level Recommend apps to be installed on devices Block apps based on predetermined app categories Block/install apps and maintain a whitelist/blacklist of Android apps Block application installation on Android devices Upgrade custom apps or apps from Google Play NETWORK DATA MONITORING With the help of this feature, admins can monitor data usage details over mobile networks, Wi-Fi or roaming data to know how bandwidth is consumed. Admins can also get all details for calls/video calls/sms/mms sent and received on enterprise devices. Additionally, the following details can also be gained: Which apps or devices are using the most amount of data On what date and at what time was the most data consumed Complete data usage details of individual devices All incoming/outgoing calls and duration of calls on a particular device All incoming/outgoing SMS s on a particular device

SEQRITE LAUNCHER This feature allows admins to customize how mobile devices function within the enterprise. Apps on the device and in-built features can be enabled or disabled as per company policies. Seqrite Launcher functions as a standalone app and ensures that mobile devices are locked down into kiosk mode for maximum productivity. Complete lockdown of apps with Seqrite Launcher Run apps in Kiosk Mode or Single App Mode Admins can customize the launcher s title and system settings and the notifications Configure Launcher to restrict or limit app usage on the user s devices App request from Seqrite Launcher VIRTUAL FENCING This feature works as a virtual boundary or fence to secure the corporate devices by immediately notifying admins when these devices enter or leave the designated location, time limits and Wi-Fi zone. By setting up triggers that allow or restrict device functionality on the basis of defined boundaries, enterprises can uphold compliance within the organization. Fencing to monitor and restrict the use of mobile devices beyond a fenced perimeter Allow an admin to set up triggers so when a device enters (or exits) the defined boundaries, an email alert is sent Geo-fencing to enable location-based configurations and policy management by defining virtual perimeter Time-fencing to manage configurations and policy based on predetermined time slots Wi-Fi-fencing to enable configurations and policy on devices when they connect to company s wireless networks

Feature Android ios* Windows* Feature Android ios* Windows* Enrollment Blacklist/Whitelist URLs Enrollment Category Based Blocking Anti-Virus Real-Time Protection Scheduled Scan Wi-Fi Configuration Support Different Security Options Schedule Scan Configuration Remote Scan Scheduling New Scan Auto Updates to Clients Network Usage Configuration Features Configuration Actionon Device Ring Lock Block Unblock Locateand Trace Wipe Call/SMS Monitoring ResetPassword Network Data Usage Monitoring Anti-Theft Configuration Notification Change on SIM Lockon SIM Change Lockon Airplane Mode Web Security Configuration Browsing Protection Phishing Protection Web Protection Policy Wi-Fi Data Usage Monitoring Mobile Data Usage Monitoring Roaming Data Usage Monitoring Policy Password Screen Lock Time Password History Block Camera Block Factory Reset Block Access to Safe Mode Block USB Block Bluetooth and Tethering Block Wi-Fi Block Hotspot Block NFC Call and Data Control While Roaming Location Service to Locate the Device Force to Set Google Account

Feature Android ios* Windows* Feature Android ios* Windows* Block Certificates Block Screen Capture Block App and Windows Store Block itunes Restriction on Safari Browser Block Face Time Block Voice Recording Block USB Connection Block Text Copy-Paste Block Primary Microphone Block Voice Dialing on Lock Screen Restrict Safe Mode Access Block Siri Other Fencing Geo, Time, Wi-Fi Fencing App Launcher Advance Launcher Exit Launcher App Request Broadcast Message Broadcast Message Upgrade Client Notification * MDM manages these devices using native OS level support. There is no need to install agent/client software on these devices. Compatible with Android 4.2.X (Jelly Bean) and above, ios 7 and above and Windows Phone 8.1. Device Time-Out Force Auto Time Zone Block Open Wi-Fi App Management App Control Restrict Access to Newly Installed Apps Whitelist Apps Recommend Apps to Install Apps to Uninstall Fully Block the Blacklisted Apps App Repository Individual Device Level App Control App Blocking Based on Category

Key Differentiators Seqrite MDM True SaaS SaaS always turns CAPEX into OPEX. Seqrite MDM offers enterprises the advantage of an economical ondemand solution. Easily Scalable With Seqrite MDM there is no limitation to the number of devices that can be supported. As your scale of operations and mobility expands, our MDM solution grows with you quickly and efficiently. Multi-Tenant Architecture Seqrite MDM offers a multi-tenant architecture that allows instances of the software to support multiple enterprises (or tenants) without compromising the security of their data. Flexible App Control Seqrite MDM grants complete control over the apps that are installed and run on any mobile device within an enterprise, thus allowing admins to align active applications with their business objectives. Virtual Fencing Seqrite MDM allows admins to configure virtual boundaries based on Wi-Fi networks, geolocations or time so as to customize device functionality. Comprehensive Reporting Seqrite MDM provides interactive and graphical summaries about a wide range of critical data such as infection status, network data usage and app non-compliance. Corporate Office Quick Heal Technologies Limited Marvel Edge, Office No.7010 C & D, 7th Floor, Viman Nagar, Pune - 411014, Maharashtra, India Email: info@seqrite.com Website: This document is current as of the initial date of publication and may be changed by Quick Heal at any time. Copyright 2016 Quick Heal Technologies Ltd. All rights reserved. All Intellectual Property Right(s) including trademark(s), logo(s) and copyright(s) are properties of their respective owners.