Mobile Security Mobile Device Management Mobile Application Management



Similar documents
Mobile Security Mobile Device Management Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management

Symantec Mobile Management 7.2

Enterprise Smartphone and Mobile Device Management

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Symantec Mobile Management 7.2

AirWatch Solution Overview

Athena Mobile Device Management from Symantec

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

MDM Mobile Device Management

Mobile Security Mobile Device Management Mobile Applica6on Management

The ForeScout Difference

Systems Manager Cloud Based Mobile Device Management

ForeScout MDM Enterprise

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Cisco Mobile Collaboration Management Service

Total Enterprise Mobility. Norbert Elek

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Mobile Device Management for CFAES

Workplace-as-a-Service BYOD Management

What We Do: Simplify Enterprise Mobility

Systems Manager Cloud-Based Enterprise Mobility Management

ipad in Business Mobile Device Management

Dell World Software User Forum 2013

Sophos Mobile Control

iphone in Business Mobile Device Management

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Advanced Configuration Steps

Good for Enterprise Good Dynamics

Ensuring the security of your mobile business intelligence

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Symantec Mobile Management Suite

Securing Healthcare Data on Mobile Devices

Deploying iphone and ipad Mobile Device Management

Chris Boykin VP of Professional Services

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Enterprise Mobility as a Service

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

McAfee Enterprise Mobility Management

ios Enterprise Deployment Overview

Cloud Services MDM. ios User Guide

Secure, Centralized, Simple

RFI Template for Enterprise MDM Solutions

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Sophos Mobile Control Technical guide

Mobile device and application management. Speaker Name Date

PMDP is simple to set up, start using, and maintain

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

IBM United States Software Announcement , dated February 3, 2015

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Preparing for GO!Enterprise MDM On-Demand Service

Vodafone Secure Device Manager Administration User Guide

Managing enterprise in a mobile world

Feature List for Kaspersky Security for Mobile

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Enterprise- Grade MDM

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

An Intelligent Solution for the Mobile Enterprise

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Mobile Device Manager v Admin Guide

Sophos Mobile Control Technical Guide. Product version: 3

Kaspersky Lab Mobile Device Management Deployment Guide

Copyright 2013, 3CX Ltd.

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Embracing Complete BYOD Security with MDM and NAC

MaaS360 Mobile Device Management (MDM) Administrators Guide

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Fromdistance MDM. Setting the standard in device management

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

IT Enterprise Services

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Thanks for joining We ll start at 10am

Introduction to Directory Services

Mobile Device Management Version 8. Last updated:

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.2

Mobile Device Management and Security Glossary

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

Configuration Guide BES12. Version 12.1

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Windows Phone 8.1 in the Enterprise

Microsoft Enterprise Mobility Suite

ios Education Deployment Overview

Introduction to the EIS Guide

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

A Radicati Group Web Event

Cloud Services MDM. Overview & Setup Admin Guide

DEVICE MANAGEMENT EXTENSIONS

Transcription:

Mobile Security Mobile Device Management Mobile Application Management

Gartner s Magic Quadrant for Mobile Device Management Software AirWatch is positioned as a LEADER based on an evaluation of completeness of vision and ability to execute. Gartner recognizes AirWatch: Features a strong dashboard and detailed reporting capabilities Multitenant support is designed in for improved scaling, with selective isolation for large installations This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from AirWatch. Promotes rich policy management in non- Microsoft e-mail server environments, such as any Post Office Protocol (POP)/Internet Message Access Protocol (IMAP)/SMTP mail server, as well as Lotus Domino, Novell GroupWise and Gmail

Our Advantages Strong track record with deployments exceeding 50,000+ devices, growing to 100,000+ Highly scalable architecture that can be deployed on-premise, as an appliance or SaaS and meets strict requirements for high availability and redundancy Software built on industry standard.net, MS SQL and HTML 5 development platforms Feature-rich solution that incorporates an enterprise app catalog, robust compliance module and Secure Email Gateway for managing access to email infrastructure SDK framework that incorporates additional device management capabilities into internal applications for advanced security, authentication and data loss protection Integration to enterprise infrastructure such as LDAP / AD, certificate authorities, VPN, Exchange, help desk systems, etc. Advanced reporting, alerting and workflow with a complete DataMart for easy export of data out to third party business intelligence solutions Easy transition from 30-day trials and proof of concepts (POCs) to production environments Professional services and implementation packages available to fit enterprise deployment needs

Enterprise Mobility is Death by a Thousand Cuts WLAN Network Integration and Management Over-the-Air Configuration, Software Updates Asset Tracking and Management Security and Compliance Expanding Use of Wireless The Problem Complexity of managing larger number and variety of network and mobile devices Disparate hardware deployed across remote locations do not have the appropriate software versions Enterprises do not have true visibility into their wireless network, mobile assets or support costs Security mgmt is reactive and blind outages and rogue intrusions difficult to detect Wireless devices and applications are constantly changing and becoming mission critical, but systematic management lacking Best Practice Integrated, real-time, enterprise-wide, Web-based console for mobile device and WLAN management Wireless technology that supports reliable and scalable version control and OTA provisioning New category of tools for the full lifecycle mgmt of devices from sourcing through retirement Deploy and manage wireless technology as a strategic imperative, driving productivity and efficiency gains across enterprise Enable compliance to Payment Card Industry, HIPAA and Sarbanes Oxley and FINRA

A Single Console with Integrated Device, WLAN & M2M Management Secures, monitors, manages and supports all mobile devices, regardless of manufacturer or mobile platform Presents an integrated, real-time view of all mobile devices deployed across the enterprise Provides full life-cycle management of all mobile assets Streamlines device deployments, enrollments and configurations Secures individual devices and manages access across locations, roles and functions

Why AirWatch is Different Architecture Web-based Native user interface (iui) Multi-OS Enterprise integration Multi-tenant WLAN monitoring Multi-lingual Workflow and intelligent notifications Highly scalable Business intelligence and robust reporting Role-based access Integrated case management SDK library Knowledge management library Delivery Services SaaS Implementation services On-premise Professional services Appliance 24/7/365 technical support

Advanced Scalable Architecture Broadest platform support Android, Apple, BlackBerry, Symbian, Windows Mobile and Windows Phone 7 scalable and multi-tenant Web-based, intuitive user interface built on the latest HTML 5 standards Interactive dashboards and views, advanced filters and searches to automate repetitive tasks Exception management views and automated workflows for proactive issue resolution Role-based access control (RBAC engine) Enterprise infrastructure integration (Microsoft Exchange, BPOS, Office 365, Lotus Notes, Gmail for Business, LDAP, SAML, PKI (Certificate Authority) Complete DataMart for easy export of data out to third party business intelligence solutions SaaS or on-premise (appliance, dedicated hardware or VM) deployment options

Configuration Management and Policy Enforcement Fast deployments with a secure and streamlined device activation process Password, Email, Calendar, Contacts, VPN, Wi-Fi configuration and app distribution Shift-based re-configuration by user (e.g. shared devices for nurses) Over-the-air software and OS updates with push/pull delivery Device grouping and bulk management for large deployments Configuration libraries with profiles, templates and Golden Images Automated process for assigning and deploying configuration profiles Reduce IT time and effort to configure and reconfigure devices Full lifecycle support with minimal IT involvement

The Most Secure Mobile Management Enterprise directory-based authentication SCEP/Certificate Authority integration Configurable device password policies Device data encryption Compromised device detection Secure email gateway with device level access control and policies for securing attachments Secure mobile web browser Application lock down Security audits, events logs and compliance engine Remote lock, corporate/selective or full wipe Configurable privacy policies for employee-liable versus corporate-owned devices Role-based console access with enterprise directory integration

Secure Email Gateway Allow or block devices using white lists and black lists or manually based on exceptions Validate devices based on: Mobile user s email username Mobile user s email address Device serial number and OS version Unique device certificate Monitor interactions with the email server: Date and time of sync attempt ActiveSync command (SYNC, PROVISION, etc.) Amount of data traffic to and from the device ActiveSync version Device type (e.g., iphone, ipod, ipad) & IP address View and filter information for exceptions/threats Intercept sensitive email attachments and store in a secure document viewer Public Internet Corporate Firewall DMZ AirWatch Secure Email Gateway Corporate Firewall Corporate Network AirWatch MDM Server Mobile Email Front-End Server Back-End Email Servers

SDK/Developer Toolkit Developer toolkit for ios enterprise apps Device check-in and usage monitoring Device location App launch frequency App usage duration Data usage Compromised device detection with the ability to automatically wipe corporate data Enterprise app single sign-on with certificate or location-based authentication Enterprise app passcode and lock capabilities Data encryption for data stored within an enterprise app Remote wipe of corporate data based on # of failed passcode attempts or on-demand

Application Catalog and Distribution Distribute and perform silent updates to enterprise apps Limit selection, recommend and ease the distribution of publicly available apps (Apple AppStore or Android Market) Monitor app lists (installed/not installed/out of date), app usage and data usage Manage app white lists/black lists and compliance policies Lock down devices (kiosk mode) to an ITapproved set of programs or apps Set up a workflow to automatically manage policy violations: Notify user and/or IT Disable app/corporate access (Wi-Fi, VPN, Email) Selective/corporate or full wipe

Remote Control Remote power management and device reboot Remote control capabilities for BlackBerry and Windows Mobile devices Screen resolution options to maximize response time in low-network bandwidth conditions (i.e., WWAN, satellite, etc.) Screen capture and video recording Central storage of electronic documents for issue tracking and trending analysis Remote device registry and file management

Location Tracking and Management GPS and Wi-Fi location tracking Breadcrumb mapping showing speed, location and direction Geo-fencing for location-based provisioning and access control for corporate apps and resources Enterprise app location-based authentication Location history search using configurable date and time ranges Historical breadcrumb analysis for route audits and optimization

Business Intelligence, Workflow and Reporting Automated workflow for exception management Isolate or wipe at-risk devices Remote help desk and troubleshooting capabilities with an integrated case management system Self-service portals to locate devices, reset passcodes and remotely lock or wipe lost devices Alerts via console, Email or SMS triggered by specific device or user actions Reporting portal with over 100+ customizable reports and automatic report distribution Multiple export formats: PDF, EXL, EML or CSV Central knowledge management system for storing documents, manuals etc.

Integrated WLAN Management and Views Enhanced security by monitoring the device from the network side and vice versa WPA key/ssid rotation and synchronization between infrastructure and devices Easy to view parent and child relationships with a history of network associations Network performance (signal strength) monitoring Exception management and troubleshooting Full lifecycle support Compliment OEM management platforms Flexible monitoring tools to minimize overhead Controlled access and support Historical data for trend analysis

Our Benefits Enterprise-grade security from the industry s most secure mobility platform Reduce IT involvement through the automation of device enrollment and configuration Mitigate legal and business risk associated with enterprise mobility Gain comprehensive, integrated view of all your mobile devices Streamline the management of all your mobile assets and applications Reduce the cost and effort of mobile device deployments Improve the overall support experience for mobile workers Increase IT and help desk efficiencies and productivity rates Increase mobile worker productivity Enable and enforce IT security and compliance policies Improve communications and reduce help desk response times

# of Devices Deployment Options Software as a Service (SaaS) On-premise Appliance Requirement Complexity

Deployment Options On-premise Appliance Software as a Service 1-100,000+ devices 1-5,000 devices 1-100,000+ devices Physical or virtual hardware Integrates with multiple enterprise services (Email environments, Directory Services, Certificates, etc.).net, SQL architecture Tiered solutions to optimize appliance size Industry standard hardware Redundant hardware components AirWatch perpetual licenses Multiple redundant data centers Best of class hardware -Cisco, F5, EMC and Dell 24 / 7 / 365 Atlanta-based NOC High availability (HA) Standard SLA > 99.9%

Multi-tenant Architecture Manage assets by division, geography or organizational grouping Customize user access and capabilities Standard roles for easy implementation Granular control for custom roles Users can carry different access rights across different logical device groupings Secured access for third-party device support organizations and third-party application providers (if applicable)

Multi-lingual Console Localizes languages by integrating cultural, linguistic or industry terms Creates a data dictionary for any IT or business-defined group of console users Gives console users the ability to select their preferred language and dialects Converts and stores all languages in Unicode Uses the IETF language tag to support internal localization Supports double and quad byte character sets

Secure Role-based Access Provide hierarchical console access based on location, role and function: Active Directory integration Role-based access to views and functionality N-tier levels of security Single sign-on integration with 3rd party apps Complete audit trail, ensuring only authorized users are accessing the system

Intelligent Notifications Provide immediate notifications to end users and IT groups for security and compliance issues: Device roaming alert Non-compliance Device compromised Inactive device Unauthorized applications Expired certificates SIM card change Restriction audit failure

Robust Reporting Generate actionable reports Provide automated distribution Multiple access and reporting levels Reports linked with security model Provide IT-defined access to partners and other third parties Extensive library of reports Flexible and easy customization: Desired data points Date ranges File format preferences CSV, XML, PDF, XLS