Mobile Device Management Glossary. www.maas360.com



Similar documents
Mobile Device Management and Security Glossary

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

11 Best Practices for Mobile Device Management (MDM)

Mobile Device Management (MDM) Policies. Best Practices Guide.

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Advanced Configuration Steps

Insert Partner logo here. Financial Mobility Balancing Security and Success

M a as3 6 0 fo r M o bile D evice s

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

iphone in Business Mobile Device Management

ipad in Business Mobile Device Management

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

SECURING TODAY S MOBILE WORKFORCE

Symantec Mobile Management Suite

Symantec Mobile Management 7.1

Learn More Cloud Extender Requirements Cheat Sheet

Ensuring the security of your mobile business intelligence

MaaS360.com > White Paper. Mobile Data Security. Finding the Balance

Symantec Mobile Management 7.1

Kaspersky Security for Mobile

BES10 Cloud architecture and data flows

Cisco Mobile Collaboration Management Service

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Systems Manager Cloud Based Mobile Device Management

Managing and Securing the Mobile Device Invasion IBM Corporation

Cell Phone Operating Systems

Symantec Mobile Management for Configuration Manager 7.2

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage Mobile Device Management In Healthcare

Exchange 2010 ActiveSync: Connection

IBM Endpoint Manager for Mobile Devices

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

IBM United States Software Announcement , dated February 3, 2015

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Symantec Mobile Management 7.2

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

MDM Mobile Device Management

Mobile Device Management for CFAES

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success

The ForeScout Difference

McAfee Enterprise Mobility Management

Sophos Mobile Control Technical guide

Mobile Device Management (MDM) Policies

Deploying iphone and ipad Mobile Device Management

Enterprise solution comparison chart

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Copyright 2013, 3CX Ltd.

The User is Evolving. July 12, 2011

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Mobilize Your Corporate Content and Apps Enable Simple and Secure Mobile Collaboration for Business.

MaaS360 Cloud Extender

Athena Mobile Device Management from Symantec

MaaS360 On-Premises Cloud Extender

Comparing BlackBerry Solutions

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

ForeScout MDM Enterprise

Feature List for Kaspersky Security for Mobile

SA Series SSL VPN Virtual Appliances

Windows Phone 8.1 Mobile Device Management Overview

Special Report. Choosing the right mobile device platform for your business

Document Sharing on Mobile Devices. Securing Productivity on the Go!

Using the Apple Configurator and MaaS3360

Symantec Mobile Management 7.2

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Compliance Rule Sets in MaaS360

Social Media & Mobile Handheld Devices: The Platforms, Operating Systems, devices& Applications. The wireless last mile & User Interface choices

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Embracing Complete BYOD Security with MDM and NAC

MaaS360.com > White Paper. Cloud-based MDM Makes the Grade in Education.

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

IBM MobileFirst Managed Mobility

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Kaspersky Security for Mobile Administrator's Guide

BYOD: End-to-End Security

DEVICE MANAGEMENT EXTENSIONS

Bell Mobile Device Management (MDM)

ONE Mail Direct for Mobile Devices

Mobile Device Management Version 8. Last updated:

PULSE SECURE FOR GOOGLE ANDROID

The Future of Mobile Device Management

Oracle Mobile Security

The New Workplace: Supporting Bring your own

MaaS360 Mobile Device Management (MDM) Administrators Guide

... Lecture 11. Market Overview of Mobile Operating Systems and Security Aspects. Mobile Business I (WS 2014/15) Prof. Dr.

If you can't beat them - secure them

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

[BRING YOUR OWN DEVICE POLICY]

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Mobile Device Management

Mobile Banking FAQ Page 1 of 9

Mobility Manager 9.5. Users Guide

BlackBerry Enterprise Solution

Kaspersky Security 10 for Mobile Implementation Guide

Managing BlackBerry Enterprise Service 10 version 10.2

Sophos Mobile Control Installation prerequisites form

Transcription:

Mobile Device Management Glossary www.maas360.com

Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink, an IBM company. No part of this document may be used, disclosed, distributed, transmitted, stored in any retrieval system, copied or reproduced in any way or form, including but not limited to photocopy, photographic, magnetic, electronic or other record, without the prior written permission of Fiberlink. This document is provided for informational purposes only and the information herein is subject to change without notice. Please report any errors to Fiberlink. Fiberlink will not provide any warranties covering this information and specifically disclaims any liability in connection with this document. Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are trademarks or service marks of Fiberlink and may be registered in certain jurisdictions. All other names, marks, brands, logos, and symbols may be trademarks or registered trademarks or service marks of their respective owners. Use of any or all of the above is subject to the specific terms and conditions of the Agreement. Copyright 2014 Fiberlink, 1787 Sentry Parkway West, Building Eighteen, Suite 200, Blue Bell, PA 19422. All rights reserved. 2

ActiveSync Android APNS (Apple Push Notification Service) Apple Root Certificate Authority BES (BlackBerry Enterprise Server) Certificate Authority Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes and use email, calendar, contacts and tasks applications on their mobile devices. Administrators can control which devices have access to the Exchange Server. EAS works with a wide variety of mobile operating systems, including Windows Mobile, Windows Phone, ios, Android, Symbian and Palm WebOS. http://www.microsoft.com/exchange/2010/en/us/mobility.aspx; http://en.wikipedia.org/wiki/exchange_activesync Android is a mobile operating system developed by Google and managed by the Open Handset Alliance (OHA) and the Android Open Source Project (AOSP). It runs on smartphones from many manufacturers, including Acer, HTC, Huawei, LG, Motorola, Samsung Electronics, and Sony Ericsson. As of September 2010 Android was estimated to be #1 in US market share for mobile operating systems (44%) and #2 in global market share (25%). Over 100,000 apps are available for Android through Google s Android Market (estimates from Canalys). http://www.android.com/; http://en.wikipedia.org/wiki/android_(operating_ system); http://www.gartner.com/it/page.jsp?id=1466313; http://www.canalys.com/ pr/2010/r2010111.html The Apple Push Notification Service (APNS) is a mobile service created by Apple that pushes notifications and alerts from applications on servers to iphones, ipads and ipods. http://en.wikipedia.org/wiki/apns The Apple Root Certificate Authority (CA) manages the generation, distribution and administration of encryption keys for the Apple Public Key Infrastructure (PKI). It facilitates encrypted secure communications between web servers and mobile devices. See Certificate Authority. http://www.apple.com/certificateauthority/ The BlackBerry Enterprise Server (BES) is a middleware software package from Research In Motion that synchronizes emails, calendaring information and contacts between BlackBerry devices and messaging servers such as Microsoft Exchange and IBM Lotus Notes. It also connects BlackBerry devices with enterprise applications. BES includes a range of management and security features to help email administrators. http://us.blackberry.com/apps-software/business/server/full/; http://en.wikipedia.org/wiki/blackberry_enterprise_server A certificate authority (CA) is a trusted organization that issues digital certificates. Digital certificates are used with Public Key Infrastructure (PKI) technology to facilitate encrypted secure communications between web servers and endpoints such as mobile devices, laptops and PCs. When an endpoint contacts the server it requests a digital certificate with information about the owner of the web site and a public key. The endpoint sends the certificate to the Certificate Authority, who validates that it comes from the purported source (e.g. the user s employer or the user s bank). The endpoint uses the public key to establish an encrypted connection with the server. Third party certificate authorities include VeriSign, Entrust and GoDaddy. Enterprises and government agencies can set up their own CAs. http://en.wikipedia.org/wiki/certificate_authority; http://www.verisign.com/ssl/ index.html; http://www.entrust.com/pki/index.htm 3

Cloud Extender Configuration Profile Device Encryption Enterprise App Store idep (ios Developer Enterprise Program) ios Line of Business A cloud extender is a cloud-based service, for example a database or a backup service, which can interact with and extend the functionality of other cloud-based services and applications. A configuration profile is a set of parameters used to configure a mobile device for a user or group of users. The parameters might include minimum requirements for the passcode, information on how to connect to the corporate email server, virtual private network (VPN) settings, and authorized Wi-Fi networks. Device encryption is the ability to encrypt selected files or all of the files on a device to protect them from unauthorized access if the device is lost or stolen. Typically the user must enter a PIN before the device will decrypt and display encrypted files. An App Store is an online service that allows users to browse a web site and download applications to their smartphones. The most widely-known app stores are from vendors such as Apple (itunes Store), Google (Android Market) and Microsoft (Windows Marketplace for Mobile). An Enterprise App Store is an app store created by a single enterprise or government agency to distribute apps developed in-house or authorized and supported by the IT group. The ios Developer Enterprise Program (idep) is an Apple program to encourage corporate and government software developers to create inhouse mobile applications for the ios operating system. These applications are for internal use and do not get published on the public App Store. http://developer.apple.com/programs/ios/enterprise/ ios, formerly known as iphone OS, is a mobile operating system developed by Apple for the iphone, ipad, ipod Touch and Apple TV. It runs exclusively on devices manufactured by Apple. As of September 2010 ios was estimated to be #2 in US market share for mobile operating systems (26%), with 17% market share worldwide (estimates from Canalys). Over 300,000 apps are available in Apple s App Store. http://www.apple.com/ios/; http://en.wikipedia.org/wiki/ios_(apple); http://www.gartner.com/it/page.jsp?id=1466313; http://www.canalys.com/ pr/2010/r2010111.html In general usage line of business (or LOB ) refers to products, services or marketing campaigns targeted at one or more specific vertical industries. In the context of mobility, mobile line of business applications are solutions designed for industry-specific needs that run on mobile devices. Examples include inventory management in retail, mobile route accounting in shipping and logistics, patient data acquisition in healthcare, and sales force automation in many industries. 4

Lock/Unlock Lotus Notes Traveler MeeGo MDM (Mobile Device Management) Lock is an MDM (Mobile Device Management) feature that allows administrators or users to prevent anyone from using a mobile device or seeing data stored on it. Remote Lock is usually accomplished by sending an SMS message from a server to the device. Locking can also be enforced locally, for example if the wrong passcode is entered too many times. An Unlock command removes the lock. All MDM systems provide an over-the-air Lock feature for administrators, and some also provide self-service locking and unlocking for users through a web portal. IBM Lotus Notes Traveler is a push email product for IBM that provides access from mobile devices to email and Personal Information Management (PIM) applications for Lotus Notes users. It allows mobile users to access IBM Lotus Domino servers and use e-mail, calendar, contacts, journal and to-do applications on their mobile devices. Lotus Notes Traveler supports Apple ios, Android, Windows Mobile, and Symbian devices. Lotus Notes Traveler also provides some MDM features for Lotus Notes users, such as remote wipe, passcode policy management, and event monitoring. http://www-01.ibm.com/software/lotus/products/notes/traveler.html; http://en.wikipedia.org/wiki/ibm_lotus_notes_traveler MeeGo is a mobile operating system designed for smartphones, tablets, netbooks, and consumer information appliances such as web-connected televisions and invehicle infotainment devices. It is a Linux-based open source project managed by the Linux Foundation and driven by Intel and Nokia. MeeGo is intended to span a wide range of mobile and non-mobile computing devices, including tablet computers, but in 2010 had not yet been released on a smartphone. http://meego.com/about; http://en.wikipedia.org/wiki/meego; http://www.zdnet.co.uk/news/mobile-devices/2010/12/01/nokia-meego-will-notdisplacesymbian-as-enterprise-os-40091029/ Mobile Device Management (MDM) systems are used to provision, monitor, manage, secure, support and secure mobile devices. Most MDM systems include a serverbased management component and an agent or app that runs on each device. Some systems are vendor-specific (e.g., work only with ios or RIM BlackBerry devices), while others span multiple operating systems and manufacturers (e.g. ios, Android, Windows Mobile and Symbian). Most MDM solutions are premises-based, although cloud-based alternatives are emerging. Typical features of MDM systems include: Tracking of devices by serial number, user name, manufacturer and operating system. Inventory of software and hardware on devices. Management of passcode policies. The ability to distribute and manage Wi-Fi and VPN policies. Remote over-the-air configuration and provisioning. Remote wipe, lock and unlock. The ability to block or disable cameras, browsers and access to app stores. Reporting on the status and configuration of devices. http://en.wikipedia.org/wiki/mobile_device_management; http://www.informationweek.com/news/mobility/business/showarticle. html?articleid=228500207 5

MSM (Mobile Service Management) OTA Configuration Passcode Provisioning Profile QNX SCEP Mobile Service Management (MSM) products gather network, server and application health and performance data in order to provide end-to-end monitoring of mobile applications. This allows an administrator to track when users are having trouble connecting, or are getting slow performance on email and mobile applications. Some MSM vendors are branching out by adding MDM features to their solutions. Over-the-air (OTA) configuration, also known as over-the-air programming and overthe-air provisioning (OTAP), is the ability to configure and assign policies to remote mobile devices solely through a wireless connection. OTA configuration eliminates the need for IT administrators or support personnel to physical touch devices in order to prepare them for email and corporate applications. This is particularly important when there are many distributed users, and when users purchase their own devices. OTA configuration can also refer to distributing software and application updates to mobile devices. http://en.wikipedia.org/wiki/over-the-air_programming A passcode is a string of characters or numbers used to authenticate a user to a device. Most mobile devices can be configured with passcode policies, for example a requirement that passcodes have a minimum number of characters, or include at least one alphabetic and one numeric character, or be changed within a certain time period. A provisioning profile is a file installed on mobile devices, especially iphones, that allows specific in-house applications to be installed and executed. Administrators can use provisioning profiles to restrict applications to specific devices. QNX is a Unix-like real-time operating system used primarily for embedded systems. It is a good fit for embedded systems with limited space because it is small and, as a microkernel-based OS, functionality not required for a specific system can be turned off. It was acquired by Research in Motion and is the basis of the new BlackBerry Tablet OS. RIM has indicated that it a version of QNX will ultimately replace the BlackBerry OS. http://en.wikipedia.org/wiki/qnx; http://www.intomobile.com/2010/09/28/ blackberry-os-qnxhandheld-confirmed-rim/ The Simple Certificate Enrollment Protocol (SCEP) is an industry standard protocol designed to simplify the issuing and revocation of digital certificates. It allows administrators to securely issue certificates to large numbers of network devices using an automatic enrollment technique. See Certificate Authority. http://en.wikipedia.org/wiki/simple_certificate_enrollment_protocol; http://www.ucertify.com/article/what-is-simple-certificate-enrollment-protocolscep.html 6

Secure Messaging Selective Wipe Smartphones Symbian OS Tablet Computer Secure messaging technology provides for secure communications between email users regardless of whether they are using email clients or browser-based email systems. Typically messages and attachments are stored entirely on servers, so they are not vulnerable to attacks on endpoint systems. Messages sent over the network are encrypted using SSL, S/MIME, TLS (Transport Layer Security) or other encryption technologies. Servers are provided with spam blocking, malware detection and data leak prevention (DLP) capabilities. http://en.wikipedia.org/wiki/secure_messaging; http://imagesrv.gartner. com/mediaproducts/pdf/microsoft/issue1_secure_web_final.pdf Selective wipe is the ability to delete corporate email, data, policies and apps from mobile devices without affecting personal email and files. Selective wipe is especially important in organizations where employees provide their own smartphones and devices, because these users would not accept having their personal data removed when they leave the organization. See Wipe. Smartphones are handheld devices that include a computing operating system as well as wireless communications capabilities. They allow users to exchange email as well as run mobile applications or apps. The leading manufacturers, in order of worldwide shipments (3Q 2010) are: Nokia, Samsung, LG, Apple, Research In Motion, Sony Ericsson, Motorola, HTC, ZTE, Huawei Technologies. The leading mobile operating systems, in order of worldwide shipments (3Q 2010) are: Symbian, Android, ios, Research In Motion, Microsoft Windows Mobile, and Linux (estimates from Gartner). http://en.wikipedia.org/wiki/smart_phone; http://en.wikipedia.org/wiki/mobile_ operating_system; http://www.gartner.com/it/page.jsp?id=1466313; http://www.canalys.com/pr/2010/r2010111.html Symbian OS is a mobile operating system developed by Symbian Ltd. (acquired by Nokia) and managed by the Symbian Foundation, a non-profit open source organization. It runs on smartphones from many manufacturers, including Fujitsu, Mitsubishi, Motorola, Nokia, Samsung, Sharp, Siemens and Sony Ericsson. As of September 2010 Symbian was estimated to be #1 in worldwide share for mobile operating systems (37%), although only #3 in the United States, after Android and Apple ios (estimates from Gartner). http://www.symbian.org/; http://www.gartner.com/it/page.jsp?id=1466313; http://www.canalys.com/pr/2010/r2010111.html A tablet computer or tablet is a book-sized computer with a flat touch screen that uses a stylus, digital pen, or fingertip as the primary input device. Most tablets run modified versions of traditional desktop operating systems on Intel chips, but newer entries like the Apple ipad use mobile operating systems and chips based on the simplified ARM architecture. Apple dominated the category in 2010, but other vendors in or expected to enter the market include Hewlett Packard, RIM, Dell, Acer, Samsung and Lenovo. http://en.wikipedia.org/wiki/tablet_computer; http://en.wikipedia.org/wiki/arm_ architecture; http://www.isuppli.com/display-materials-and-systems/news/pages/ Apple-Set-to-Dominate-Tablet-Market-Through.aspx; http://news.cens.com/cens/ html/en/news/news_inner_33947.html 7

TEM (Telecom Expense Management) Windows Mobile Windows Phone 7 Wipe Telecom Expense Management (TEM) products track all types of telecom spending and allow enterprises to reduce operating costs and negotiate better agreements with their vendors and service providers. TEM systems typically track services and equipment inventory, usage and charges, match them against contracts and invoices, and highlight excessive charges from service providers and out-of-control cost categories. Some TEM vendors are branching out by adding MDM features to their solutions, and some MDM vendors are adding TEM features to their products. http://www.temia.org/; http://en.wikipedia.org/wiki/telecom_expense_ Management Windows Mobile is a mobile operating system developed by Microsoft and used in smartphones and mobile devices. It is a successor to Windows CE, but will be replaced in the future by Windows Phone 7. It runs on smartphones from manufacturers including HTC, LG and Samsung Electronics. As of September 2010 Windows Mobile was estimated to be only #5 in worldwide mobile operating systems, with a 3% market share (estimate from Canalys and Gartner). See Windows Phone 7. http://en.wikipedia.org/wiki/windows_mobile; http://www.microsoft. com/windowsphone/enus/default.aspx; http://www.gartner.com/it/page. jsp?id=1466313; http://www.canalys.com/pr/2010/r2010111.html Windows Phone 7 is a mobile operating system developed by Microsoft and used in smartphones and mobile devices. It is a successor to Windows Mobile. It was released in selected countries in October and November 2010. It has been announced for smartphones from manufacturers including, Dell, Hewlett Packard, HTC, LG, Samsung Electronics and Sony Ericsson. Microsoft has indicated that Windows Phone 7 is designed primarily for the consumer market rather than for enterprise applications. http://www.microsoft.com/windowsphone/en-us/default.aspx; http://en.wikipedia.org/wiki/windows_phone_7 Wipe is an MDM (Mobile Device Management) feature that allows administrators or users to delete all of the data on a mobile device. If a device is lost or stolen, wipe prevents sensitive data from being misappropriated. Wipe is usually accomplished by sending an SMS message from a server to the device. All MDM systems provide an over-the-air wipe feature for administrators, and some also provide self-service wipe for device owners through a web portal. Not all mobile devices support wipe. See also Selective Wipe. All brands and their products, featured or referred to within this document, are trademarks or registered trademarks of their respective holders and should be noted as such. For More Information To learn more about our technology and services visit www.maas360.com. 1787 Sentry Parkway West, Building 18, Suite 200 Blue Bell, PA 19422 Phone 215.664.1600 Fax 215.664.1601 sales@fiberlink.com WP_201203_0034 8