Codeproof Mobile Security & SaaS MDM Platform



Similar documents
Symantec Mobile Management 7.1

Feature List for Kaspersky Security for Mobile

Symantec Mobile Management 7.2

Symantec Mobile Management for Configuration Manager 7.2

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.2

Symantec Mobile Management 7.1

How To Manage A Mobile Device Management (Mdm) Solution

Symantec Mobile Management Suite

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

BENEFITS OF MOBILE DEVICE MANAGEMENT

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Cisco Mobile Collaboration Management Service

Google Identity Services for work

Dell World Software User Forum 2013

What We Do: Simplify Enterprise Mobility

Systems Manager Cloud Based Mobile Device Management

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Systems Manager Cloud-Based Enterprise Mobility Management

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Mobile Device Management Version 8. Last updated:

How To Protect Your Mobile Device From Attack

Kaspersky Security for Mobile

Microsoft Windows Intune: Cloud-based solution

Managing Mobility. 10 top tips for Enterprise Mobility Management

Enterprise Mobility as a Service

Mobile Encrypted Messaging: A Perfect Complement to MDM

Mobile Device Management for CFAES

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Securing Corporate on Personal Mobile Devices

BYOD: End-to-End Security

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Putting Operators at the Centre of

IBM United States Software Announcement , dated February 3, 2015

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Seqrite Mobile Device Management

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

When enterprise mobility strategies are discussed, security is usually one of the first topics

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

Copyright 2013, 3CX Ltd.

MDM Mobile Device Management

A Guide to MAM and Planning for BYOD Security in the Enterprise

SECURING TODAY S MOBILE WORKFORCE

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Secure, Centralized, Simple

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

IT Resource Management vs. User Empowerment

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business

White Paper. Data Security. journeyapps.com

Administrator's Guide

Healthcare Buyers Guide: Mobile Device Management

MTP. MTP AirWatch Integration Guide. Release 1.0

Sophos Mobile Control

Three Best Practices to Help Enterprises Overcome BYOD Challenges

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

IBM Endpoint Manager for Mobile Devices

Comodo Mobile Security for Android Software Version 3.0

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

AirWatch Solution Overview

DOBUS And SBL Cloud Services Brochure

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Enterprise- Grade MDM

Guideline on Safe BYOD Management

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Parla, Secure Cloud

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

Kaspersky Security 10 for Mobile Implementation Guide

DUBEX CUSTOMER MEETING

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Endpoint protection for physical and virtual desktops

EndUser Protection. Peter Skondro. Sophos

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

PULSE SECURE FOR GOOGLE ANDROID

IT Resource Management & Mobile Data Protection vs. User Empowerment

Bitdefender GravityZone Sales Presentation

Mobility Manager 9.5. Users Guide

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

McAfee Enterprise Mobility Management

The Challenges of Implementing a Bring Your Own Device Policy

The increasing popularity of mobile devices is rapidly changing how and where we

Hands on, field experiences with BYOD. BYOD Seminar

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Security and Compliance challenges in Mobile environment

The. C s. of Mobile Device. Management

Choosing an MDM Platform

Transcription:

Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression, enterprise computing and entertainment. Doubling in power and capacity every 18 months, these devices are capable of increasingly sophisticated tasks such as video conferencing, storing large documents and media, sending and receiving multimedia messages, online banking, online shopping, and other purposes. While the benefits are undeniable, these new capabilities and features open up significant new apertures for risks, according to Global Industry Analysts. The threat of malicious applications compromising devices and accessing key information poses serious risks to organizations and individuals is "a perfect business case for mobile security. With so many personal devices unsecured by even a password, sensitive information such as personal contacts, e-mail, and social-media accounts are just a few taps away. This is exactly why modern businesses should have a cloud-based, highly secure, flexible solution to manage their employee s mobile devices, regardless of the mobile platform or operating system they use.

CODEPROOF SOLUTION Codeproof provides an integrated mobile security and device management platform built on top of Amazon's elastic cloud stack for maximum scalability and security. Our Server-and-Agent-based management platform provides comprehensive visibility, security and control of both mobile devices and applications. Codeproof cloud MDM enrollment process makes it easy for anyone regardless of technical expertise, to enroll and manage their devices in little time. Codeproof services include- Antivirus Protection Lost device Detection, including Device Lock, Remote Wipe, and Encryption Password Restrictions, App Restrictions and Directory-based Policy Management Remote Configuration of Email, Wi-Fi, and Virtual Private Networks (VPNs) Device Telemetry & Asset Management App Distribution & Mobile App Management (MAM) Cloud MDM : Over-the-air ios Profile Installation Role Based Admin Management Multi-Tenant Architecture Developer APIs True SaaS, Built on Amazon Elastic Cloud Stack Supports popular Mobile OS's Android and ios including Kindle Fire

HOW IT WORKS a. First, enroll on the Codeproof platform by installing Codeproof s Security Agent App on each smartphone and tablet, including iphone and ipad. b. Then Codeproof Security Agent will communicate with Codeproof Cloud securely over SSL.

c. Once device enrollment is completed, a device node will appear automatically in the Codeproof Cloud console directory tree. d. Next, the Codeproof Cloud will push optional password restriction policies to the device to make sure that the device is protected. e. The administrator can immediately log in to the Cloud Console at https://www.codeproof.com/console and manage devices and apps remotely. Done!. CODEPROOF SECURITY AGENT APPS Codeproof Security Agent app available for Android and ios Devices. Install the app from itunes Appstore or Google Play store and enroll your device to Codeproof platform by logging-in to Codeproof using your enrollment account. 1. CODEPROOF ios APP The Codeproof ios app lets you to enroll your device securely with the Codeproof platform. ios App runs in the background, listening to the location service and communicating with Codeproof webservice. You can also install & update ios MDM profile via Codeproof ios Agent app.

iphone/ipad App download link is here 2. CODEPROOF ANDROID APP Codeproof Android Agent app contains a complete mobile antivirus component. Mobile Antivirus constantly scans the device to ensure that all applications are clean and not malicious. If an app fails the Codeproof Test, Mobile Antivirus will warns the user and also sends alerts to Codeproof Cloud. The Administrator can login to console and see such alert information in the Console dashboard.

Android App download link is here

CLOUD CONSOLE Device Dashboard : Real-Time System Health Overview Codeproof Dashboard warns of Real Time Mobile Security Risk Overall System Health Virus Detected Events Jail Break Detection Device without Screen Lock password Latest Device Events App Installation Events

Mobile Policy Manager: Company-wide Mobile Policy Enforcement Directory-based Mobile Group policy enforcement Inherited Mobile policy and Configuration management Codeproof s Mobile Policy Manager allows configuring MDM policies at the root level of the directory tree, allowing all the devices below to inherit policies. This ensures that the administrator won t have to configure MDM policies for each individual device node. Mobile Policy Manager allows exceptions for a single device/node by over-writing the inherited policies just for that device or node. Using Mobile Policy Manager, Administrator can also create custom device groups, and set custom policies for certain devices. The directory tree allows you to drag and drop devices between groups as well.

REPORTS Using Cloud Console Report Generator, Administrators can generate various reports. Codeproof s reporting functionality can either print the report directly or download and save them as PDF files. Security Compliance report Device Asset Report Detection of Malicious Apps report Apps report OS report DEMO VIDEO: http://youtu.be/h1w3ojjvsve

ADMINISTRATION Administrators can create new admin users on an account using the Cloud Console. These additional admins can login to the Console and manage devices simultaneously. COMPANY OVERVIEW Codeproof technologies is a leading platform provider of true SaaS, cloud hosted mobile security and cloud MDM platform. Our patent pending technology secures your personal and corporate data in mobile phone and tablets. With Codeproof's ease of deployment and management support for multiple device platforms, businesses can quickly ramp up their security solutions, managing both employee-owned (BYOD-Bring Your Own Device) and corporate-owned devices from a single cloud console. Codeproof focuses on two key areas: 1. Mobile Endpoint Security: Securing your mobile experience at home and work. Protecting users from mobile malware threats, data theft and privacy intrusion, anti-theft, and various other security risks. 2. Cloud MDM platform: Codeproof s Cloud MDM platform makes it easier to manage data across different families of smartphones and tablets. Using central Cloud Console interface, administrators can perform various mobile device management tasks, such as over-the-air installation of configuration profiles, directory-based mobile security policy enforcement, device asset inventory and telemetry, remote configuration of email, Wi-Fi, and Virtual Private Networks (VPNs). This provides total control and visibility to both employee-owned and corporate-owned devices. Codeproof Technologies Inc, a Delaware corporation with principal place of business at 17371 NE 119th Way Redmond, WA.

CONTACT Email: sales@codeproof.com Website: https://www.codeproof.com Send us a tweet @ https://codeproof.com/tweet Visit our Facebook page @ https://codeproof.com/facebook