MDM Mobile Device Management



Similar documents
MAM - Mobile Application Management

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

BYOD Management : Geo-fence

What We Do: Simplify Enterprise Mobility

Cisco Mobile Collaboration Management Service

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Mobile Device Management for CFAES

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Symantec Mobile Management Suite

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Sophos Mobile Control

Secure, Centralized, Simple

Mobile Security Mobile Device Management Mobile Application Management

Systems Manager Cloud Based Mobile Device Management

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

AirWatch Solution Overview

Mobile Security Mobile Device Management Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management

Advanced Configuration Steps

Managing Mobility in the BYOD Era:

Workplace-as-a-Service BYOD Management

Cloud Services MDM. ios User Guide

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Embracing Complete BYOD Security with MDM and NAC

MobileIron Cloud Pricing Packaging

ManageEngine Desktop Central. Mobile Device Management User Guide

Mobile Device Management and Security Glossary

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

The User is Evolving. July 12, 2011

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Mobile App Containers: Product Or Feature?

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

IT Resource Management vs. User Empowerment

Dell World Software User Forum 2013

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Symantec Mobile Management 7.1

User Manual for Version Mobile Device Management (MDM) User Manual

IT Resource Management & Mobile Data Protection vs. User Empowerment

Symantec Mobile Management 7.1

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Feature List for Kaspersky Security for Mobile

McAfee Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

ipad in Business Mobile Device Management

Total Enterprise Mobility. Norbert Elek

Athena Mobile Device Management from Symantec

iphone in Business Mobile Device Management

Ben Hall Technical Pre-Sales Manager

ios Enterprise Deployment Overview

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Deploying iphone and ipad Mobile Device Management

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

6 Steps to Migrate from BlackBerry to a Secure, Multi-OS Environment

AirWatch for ios Devices

M a as3 6 0 fo r M o bile D evice s

Mobile Iron User Guide

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

Securing Enterprise Mobility for Greater Competitive Advantage

Cloud Services MDM. Overview & Setup Admin Guide

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Manage Mobile Devices

1 Mobile Device Management

Enterprise Mobility Management for Financial Sector

Symantec Mobile Management for Configuration Manager 7.2

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

ForeScout MDM Enterprise

Exchange ActiveSync (EAS)

Symantec Mobile Management 7.2

Mobile Security Solution BYOD

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

How To Manage A Mobile Device Management (Mdm) Solution

Kaspersky Security for Mobile

Absolute Manage MDM. John Wu Systems Engineer

Telstra Mobile Device Management (T MDM) Getting Started Guide

Mobile Device Management Glossary.

McAfee Enterprise Mobility Management 11.0 Software

An Overview of Samsung KNOX Active Directory and Group Policy Features

BYOD: End-to-End Security

Total Enterprise Mobility

Choosing an MDM Platform

Ensuring the security of your mobile business intelligence

ios Education Deployment Overview

Mobile device and application management. Speaker Name Date

MaaS360 Mobile Device Management (MDM) Administrators Guide

When enterprise mobility strategies are discussed, security is usually one of the first topics

Transcription:

Page 1

About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors, manages and supports mobile devices across platforms (Android, ios, BlackBerry, Windows), service providers and manufacturers. 1Mobility has a team of dedicated and talented professionals with over 8 years of innovative software development believes that today, Enterprise Mobility though not mandatory, is a fact of business life for various obvious reasons like increased productivity, cost savings, competitive advantage and better customer engagement. Having serviced industries like Banking, Financial Services, Insurance, Technology, Education, Pharmaceutical, Communication & Media and Government and initial focus on the emerging markets, 1Mobility provides affordable solutions either cloud based or privately installed, enabling over-the-air distribution of mobile applications, configuration settings and security policies to corporate owned or employee owned (BYOD) devices through a central web console. No matter what type of organization it is, 1Mobility has affordable solutions and services for all, be it initial, advanced or matured enterprise mobility. 1Mobility offers following solutions Enterprise Mobility Management (EMM) through consulting, development and managed services Data Loss Prevention (DLP) of Mobile Data Compliance enforcement and monitoring Containerization BYOD Management For further information, please visit the 1Mobility website at http://www.1mobility.com Page 2

Mobile Device Management Device Support Enroll 1Mobility supports the following Mobile OS / Platforms: o Apple ios: 4+ (iphone, ipad, ipod touch) o Android: 2.3+ o Blackberry: between 5 & 7 o Windows Phone 8+ Device Ownership: Enroll employee, corporate owned devices in your enterprise environment Device Registration: Enable IT to register existing devices one by one or in bulk. End users can add their own devices through DIY Portal, subject to approval by the administrators User Authentication: Authenticate users via 1Mobility or directory-based authentication (AD/LDAP) EULA: Create custom End User License Agreements (EULAs) for various groups and locations and mandate acceptance during enrollment Restrictions: Set up restrictions to block devices based on platform, version, etc. Non-compliant devices are not allowed to b be enrolled. Secure Passcode: Require a device passcode with configurable complexity, length, lock and wipe rules Encryption: Enforce full device and storage card encryption Restrictions: Lock down an end user s ability to use specific device features, apps and web browsing Compliance: Set up rules for non-compliant activities and compromised devices with automated responses Page 3

Configure Profiles: Configure device settings and user credentials for accessing enterprise resources Certificates: Integrate with certificates for secure distribution and management of profiles Accounts: Provision access to corporate Email, Calendar, Contacts, Wi-Fi and VPN networks Applications: Distribute and manage internal/public/purchased apps via the App Catalog Content: Distribute corporate documents and secure mobile access using Content Locker Monitor Compliance Alerts: Create email alerts with automated compliance rules to notify IT administrators and/or end users. Set up rules that define non-compliant events/activities and automated responses Compliance Actions: Automated compliance checks and their corresponding actions to secure data. For example, Delete Corporate Data, De-enroll Device etc. Reporting: On demand detailed compliance reports. Export device data to in CSV format to be consumed by other enterprise tools. Manage Queries: OTA on-demand and automated capturing of device information. Updates: Real time broadcast of applicable security policies, compliance requirements, applications and configurations. Commands: Send commands on-demand or automated to devices to request info, lock, wipe a device and much more. De-enrollment: De-enroll devices from your environment, remove corporate data and wipe device. Page 4

Support Messaging: Send a customized message to one or more devices troubleshooting instructions. Remote Diagnostics: Perform remote diagnostics to identify device issues in real-time. Remote Control: Take remote control of an end user s device for troubleshooting via Team Viewer. Do-It-Yourself: Enable end users to clear their passcode, locate their device and more via DIY portal a.k.a. selfservice portal. Page 5