Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

Similar documents
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

Codeproof Mobile Security & SaaS MDM Platform

A Guide to MAM and Planning for BYOD Security in the Enterprise

Mobile App Testing. Mobile App Testing. Seite 1 von 10

ForeScout MDM Enterprise

The ForeScout Difference

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Mobile Device Management for CFAES

Total Enterprise Mobility

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

When enterprise mobility strategies are discussed, security is usually one of the first topics

How To Protect Your Mobile Device From Attack

Mobile Security: The good, the bad, the way forward

BENEFITS OF MOBILE DEVICE MANAGEMENT

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

The Essential Security Checklist. for Enterprise Endpoint Backup

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

How To Secure Your Mobile Device

Secure, Centralized, Simple

Copyright 2013, 3CX Ltd.

Kony Mobile Application Management (MAM)

How To Protect Your Mobile Devices From Security Threats

Mobile device and application management. Speaker Name Date

Cloud Services MDM. ios User Guide

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

BYOD: End-to-End Security

Symantec Mobile Management for Configuration Manager 7.2

Mobile Device Management Version 8. Last updated:

Weak Spots in Enterprise Mobility Management Dennis Schröder

GETS AIRWATCH MDM HANDBOOK

MAM - Mobile Application Management

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

IBM United States Software Announcement , dated February 3, 2015

Securing Corporate on Personal Mobile Devices

Preparing for GO!Enterprise MDM On-Demand Service

RFI Template for Enterprise MDM Solutions

Sophos Mobile Control Administrator guide. Product version: 3

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

How To Write A Mobile Device Policy

Athena Mobile Device Management from Symantec

Enterprise Security with mobilecho

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Symantec Mobile Management 7.2

BYOD in the Enterprise

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Symantec Mobile Management 7.1

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Advanced Configuration Steps

[BRING YOUR OWN DEVICE POLICY]

Symantec Mobile Management 7.2

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Security Architecture Whitepaper

7 Risks of Dropbox to Your Corporate Data

Ensuring the security of your mobile business intelligence

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Mobile Security: Controlling Growing Threats with Mobile Device Management

Compliance Rule Sets in MaaS360

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones)

The Risks and Rewards of Social Media and Mobile Devices

Windows Phone 8.1 in the Enterprise

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Feature List for Kaspersky Security for Mobile

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Symantec Mobile Management 7.1

Mobile First Government

Hands on, field experiences with BYOD. BYOD Seminar

Mobile Security and Management Opportunities for Telcos and Service Providers

AirWatch Solution Overview

How To Support Bring Your Own Device (Byod)

How To Manage A Mobile Device Management (Mdm) Solution

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

MaaS360 Mobile Device Management (MDM) Administrators Guide

Mobile Device Strategy

GO!Enterprise Mobile Device Management ios Release Notes

Enterprise- Grade MDM

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Seqrite Mobile Device Management

McAfee Enterprise Mobility Management

BEST PRACTICES IN BYOD

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Sophos Mobile Control Technical guide

Enterprise Mobility as a Service

Advanced Administration

The Conference Room of Today. Easy & Secure. Instant Meeting

Good for Enterprise Good Dynamics

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Managing Enterprise Devices and Apps using System Center Configuration Manager

Bell Mobile Device Management (MDM)

Transcription:

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data? Are you aware of the possible consequences of the misuse of your mobile devices? IT S NOT THE LENGTH OF THE FEATURE LIST WHAT MAKES THE DIFFERENCE BETWEEN A GOOD PRODUCT AND A BETTER ONE. MANY CAN PROGRAM SOFTWARE. IT IS ESSENTIAL ADDING EXPERTISE AND KNOWLEDGE OF THE USERS SITUATION AND TARGETS.

DO MUCH. DO EVERYTHING. DO THE RIGHT THINGS. FACT We are witnesses of a new digital revolution - mobile devices revolution. Your company works in this surrounding. It is necessary integrating and managing your mobilized work-processes and the mobile hardware utilized - from smartphone to tablet PCs - in an optimal way. Enterprise mobility Management (EMM) is the solution you need. ONE SOFTWARE - ALL PLATFORMS ALL IS POSSIBLE RAISE PRODUCTIVITY - Device management (inventory, lock, wipe, etc.) - System management (backup, update, etc.) - Reporting (log relevant processes) - Configure, update & handle any number of devices with some mouse clicks saves time. - Automate processes - Simply integrate corporate processes via Web APIs SIMPLER NICER BETTER AS FLEXIBLE AS YOUR DEMAND SAFE FOR SURE - The easy to use graphical user interface is more than just nice. - Customizing is very simple. - Every user group owns its optimized working environment. - The end user different from the administrator. - Flexible development of the models with mobility management services in order to increase web and mobile applications performanses. - TÜV certified - Security audited - You configure suitable actions on policy breaches

MAM is a component for your Enterprise Mobility Management (EMM), that automatically responds to potential app risks. It helps you manage your applications, their installation, update, possible reconfiguration and their removal. Your black- & whitelist for apps tested by professionals and always updated. THE CHALLENGE Although there are security controls that an app has to pass before the launch of the app at the various application stores, tests from various security providers show that every 2.nd app leaks non-approved data. Every day new apps are added to the various application stores and provides a new potential security risk within the company. Do YOU have the time for testing all the apps at the various application stores, that your employees access, for any potential risks?

THE SOLUTION MAS MOBILE APP SECURITY BASED ON EUROPEAN STANDARD MAS offers you an access to an application directory (TAD), where you can find results and ratings of tested apps from all the various application stores for mobile operating system platforms. Then you have a proven basis to decide yourself if you find the app secure or if you find it insecure and would add the app to a Blacklist. The creation of Black- & Whitelists for your company apps is either done automatically or via your MDM admin control using simple clicks creating your own customized lists.

MCM is a component for your Enterprise Mobility Management (EMM), that allows protection of your most valuable asset data. Losing a hardware is retrievable, but losing data will hurt your company directly. Your reputation will be seriously compromised. In order to prevent these situations, you can use MCM that offers you data security functions, partial or complete removal of data in the case your mobile device gets lost. Identity Management (IM) enables you to define the actions that are allowed for mobile device users, as well as keeping track of their activity.

INTELLIGENT MOBILE DEVICE MANAGEMENT THAT UNDERSTANDS YOUR NEEDS. MDM is the component that integrates enterprise mobility into your business systems: Not only does it provide all the functions you need its architecture, the services that accompany it and our security requirement reflect the demands of leading European enterprises perfectly. WHY DO YOU NEED MDM? Enables efficient call cost control (roaming) Protects your company data against loss through mislaid mobile devices Supports your business processes Gives your employees secure mobile access to data protection regulations and rules on conduct of your IT infrastructure Controls mobile devices via actions and rules of usage

MDM CHARACTERISTICS? MDM solution offers functions that can be used on smartphones with the following operating systems: ios, Android, Windows Phone Available in english and german Easy installation An integrated viewer makes it possible to view and to process standard office files and images, as well as media files Strictly separates the business data from the private area of the device user Keeps data costs and call costs in home and/or roaming networks under control

MDM TOOLS

YOU DECIDE WHO ACCESSES YOUR COMPANY DATA! The fact that tablet PC and smartphones are now very widespread means that employees are also increasingly checking their email while on the go. Now it must be ensured that this infrastructure is protected from damage by being accessed from outside, irrespective of the operating system of the end device and the type of access. SAG and your firewall together protect your IT infrastructure from misuse and damage. If users want to access the Exchange server by means of a mobile end device, they must be authenticated to get through the firewall. This is done on the basis of a "unique identifier" (IMEI, serial number, ActivesynclD, AppID). The firewall checks the Secure Access gateway, a MDM option on the MDM server to see whether the identifier belongs to an end device that is registered in the MDM. If this is the case, data access is permitted. Otherwise, the device is rejected by the firewall. This is how you can protect your data and information from unauthorized use and abuse.

NOW, PHONE COSTS CAN BE PLANNED, CONTROLLED AND REMAINED WITHIN THE BOUNDS OF THEIR CONTRACTED TARIFFS. This app allows you to control phone call costs, especially roaming costs. THE APP HAS 3 MAJOR FEATURES Whitelisting of phone numbers (phone numbers that are not on the list can t be dialed) Control of the voice call duration Control of the data volume usage CostGuard app can either be enrolled and configured automatically to all Android devices in the company, or installed locally, and manually configured. Besides, app can control phone costs, roaming costs, the amount of data transfer and which number you can call, it also gives alert to the user if it comes to determined limit. When the actual limit has been reached, or exceeded, the user will only be able to dial previously defined numbers (e.g. director, manager, admin etc.), these limits can be temporarily extended. Emergency numbers are always available!

PROTECTING DATA AND SAFE ACCESS ARE IMPORTANT, BUT AVAILABILITY OF DATA IS ALSO VERY IMPORTANT. YOU WANT YOUR EMPLOYEE AVAILABLE TO THE CUSTOMERS AT ANY TIME. We offer a solution for ios terminals, which makes it possible to access data from the company network that have been approved for mobile access. An integrated Viewer allows it to view and edit standard Office files and images, as well as media files. Files2Go makes it possible to synchronize locally modified data with the company's IT infrastructure. Communication takes place via a certificate-based SSL connection between mobile end device and IT infrastructure. All data are exchanged in a cloudless manner - direct and encoded - between the app and the server in the company.

BUSINESS DATA OF YOUR COMPANY NOW CAN BE USED WITHOUT ANY RESTRICTION, PROTECTED BY PASSWORD AND SELECTIVELY DELETED IF IT S NECESSARY. Popularity of mobile devices endanger privacy and safety of company's documents and data. Mobile devices, as we all know, are often used by busy users in unsecured surroundings, such as public hotspots, coffee houses, and shops and pose a significant risk of loss and of course theft! MDM gives you one more tool Secure PIM (Personal Information manager). This tool on a mobile device separates user's private and business zone. This tool is available for ios devices, soon for Android.

DO YOU HAVE TIME FOR TESTING ALL THE APPS AT THE VARIOUS APPLICATION STORES, THAT YOUR EMPLOYEES ACCESS? Every day new apps are added to the various application stores and provide a new potential security risk within the company and tests from various security providers show that every 2nd app leaks non-approved data. MAS offers you an access to an application directory (TAD), where you can find results and ratings of tested apps from all the various application stores for mobile operating system platforms. Then you have a proven basis to decide yourself if you find the app secure or if you find it insecure and want to block that app. This tool enable creating lists for approving certain apps and also list for blocking those apps that threatens your data safety. For those apps that do not violate your company safety you can create Whitelists, and for those apps which do violate your company safety you can create Blacklist and block them. This tool is available for Android and IOS devices.