Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017
|
|
- Charla Briggs
- 5 years ago
- Views:
Transcription
1 Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017
2 Market Overview
3 Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than their companies think 2x Data breaches involving smartphones or tablets more than doubled in 2015 (1) 2/3 of employees say they use their personal smartphones for work; their companies think only 25% do (2) 15 % 66% of large organizations have had a security or data breach involving smartphones or tablets in 2015 (1) Work use reported by employees Work use reported by IT in companies 26% 40% 17% 54% 17% Smartphones Tablets Laptops 1) HM Gov t, Information Security Breaches Survey ) Ovum, Employee Mobility Survey
4 Mobility Management MDM Mobile Device Management EMM Enterprise Mobility Management UEM Unified Endpoint Management???
5 Mobility Management Today MDM Mobile Device Management MAM Mobile Application Management EMM Enterprise Mobility Management MCM Mobile Content Management MSM Mobile Security Management 5
6 Mobility Management Tomorrow Smartphones/Tablets COBO, COPE, BYOD BUSINESS DATA Unified Endpoints Windows, Mac, ios, Android Wearables Smartwatches, WYOD, activity trackers IoT Connected homes, cars, gadgets, pets 6
7 Sophos Mobile Product Overview
8 Sophos Mobile in brief Sophos Mobile is a complete EMM solution Mobile device management, data protection, containers, easy-to-use management console, mobile security Manage ios, Android, Windows 10 Mobile, Windows 10 desktops Either hosted in Sophos Central or available on-premise EMM Enterprise Mobility Management MDM Mobile Device Management MCM Mobile Content Management MAM Mobile Application Management MSM Mobile Security Management 8
9 Mobile Device Management Easy to use management UI and dashboard Inventory and asset management Remote device configuration Loss and theft protection Compliance checks and enforcement Self Service Portal Apple DEP support Control build in containerisation from ios, Android Enterprise and Samsung Knox ios, Android, Windows 10 Mobile, Windows 10 desktops o Includes extended MDM support for Samsung, LG and Sony Android devices 9
10 Mobile Application Management Remote app installation and removal Enterprise App Store Apple VPP and Google Play for Work support View installed apps on device White-listing/Black-listing Block apps from running Control App Store access Network usage rules for apps 10
11 Mobile Content Management Securely allow access to data and content o Publish corporate documents from Sophos Mobile o Access via cloud storage or enterprise file systems Award-winning data protection keeps documents on the device secure Documents stored encrypted in the secure container View, edit and annotate documents for collaboration Data Leak Prevention rules control sharing 11
12 Mobile Security Management Award-winning mobile malware protection Jailbreak or Rooting detection Device attestation OS version control and patch level visibility Web Filtering Spam Protection Additional security tools and advisors o Privacy Advisor o Authenticator o Secure QR Code Scanner 12
13 Containers Separate Business and Personal Data BUSINESS PERSONAL 13
14 Containerisation Options Vendor embedded data separation Samsung Knox Workspace Apple Sophos Container Android Enterprise (Android for Work) 14
15 Samsung Knox Container Manage Samsung Knox Container License management Provisioning Configuration App management Decommissioning Lock 15
16 Sophos Container Overview Sophos Secure o Corporate o Corporate Contacts o Corporate Calendar Sophos Secure Workspace o Corporate Documents o Corporate Browser o Seamless encrypted content 16
17 Container Apps 17
18 What s new in Sophos Mobile 7
19 Feature Parity! With this major update the entire feature set of Sophos Mobile on-premise will be available in Sophos Central, making Sophos Mobile simpler to understand, communicate and sell. Mobile in Central = Mobile on premise 19
20 What s New in Sophos Mobile 7 Server Clients Updated UI to match Central Admin Android enterprise ( Android for Work ) support Office 365 support in EAS Proxy Extended policy settings Locate Windows 10 desktops and much more Web Filtering is back for Android 6+ Edit Office files in Secure Workspace Improved Enterprise App Store Help users Fix it Enforce restrictions via App Control Handle password-protected HTML5 files in Secure Workspace IoT device support 20
21 IoT Device Support
22 Introducing Sophos Mobile for IoT Over 20 billion IoT devices by 2020 will touch everything we do Security requirements universally uncertain across industry Adding support for IoT devices in Sophos Mobile 7 Core management and control of IoT devices running o Android Things o Windows 10 IoT Available for download from MySophos Questions: Sophos-Mobile-IoT@sophos.com 22
23 Why Sophos Mobile for IoT? Lets organizations add a cost-efficient communication and management framework to their Internet of Things (IoT) projects A unified endpoint management approach of IoT devices side-by-side with mobile devices, laptops, desktops, and tablets in Sophos Mobile A great way for companies to reduce deployment time and streamline company security policies Sample use cases: Retail/POS, office automation, connected classrooms, etc. 23
24 Sophos Mobile for IoT - Capabilities Android Things Windows 10 IoT Dashboard and device monitoring P P Compliance rules and automatic mitigation P P Display device status (last sync time, OS, online status, etc.) P Basic Monitor device properties P P Wireless configuration P P Device restrictions (Bluetooth, camera, etc.) - P Reporting P P 24
25 Summary and Conclusion
26 Sophos Mobile - Top Value Propositions Enable use of mobile devices and limit risks Easy to install, configure, manage and maintain Powerful containers ensure security Affordable and flexible license pricing Integrates with leading Sophos technologies
27 Try It for Yourself - sophos.com/mobiledemo 27
28
Mobile App Security and Malware in Mobile Platform
Mobile App Security and Malware in Mobile Platform Siupan Chan Sales Engineering Manager, Greater China 23 September, 2016 The Mobile Security Epidemic 2 A Radical Shift is Occurring When will your organization
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationBlackBerry UEM + Samsung Knox
Datasheet BlackBerry UEM + Samsung Knox Comprehensive EMM Management + Together, Samsung and BlackBerry secure and enable key enterprise workflows, from the boardroom to the battlefield, exceeding the
More informationWebinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director
Webinar: Mitigating the risks of uncontrolled content access from mobile devices Presented By: Brian Ulmer, Product Management Director 2013 1 Employees are going mobile Mobile devices are being used for
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
UEM2205BE Get Up to Speed on Innovations in the Mobile Ecosystem: ios, macos, Android, and Chrome OS VMworld 2017 Content: Not for publication Sascha Warno #Vmworld #UEM2205BE Disclaimer This presentation
More informationHow Microsoft s Enterprise Mobility Suite Provides helps with those challenges
2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium
More informationBRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT
WHITE PAPER DECEMBER 2016 BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT Unified endpoint management brings together traditional client management with a modern enterprise mobility management
More informationAdaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia
Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES
More informationPhil Schwan Technical
Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationTrend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012
Trend Micro Guide and solution to help embrace Consumerization and BYOD James Walker EMEA Product Marketing Manager 26 September 2012 Agenda Consumerization What is it? What should I do? Mobile Security
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationEnterprise Security Solutions by Quick Heal. Seqrite.
Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices
More informationIntroducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer
Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?
More informationEnterprise Mobility Management Buyers Guide
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business Leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationDeploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE
Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationXenApp, XenDesktop and XenMobile Integration
XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility
More information2016 BITGLASS, INC. mobile. solution brief
mobile solution brief BYOD Security has been a constant challenge for many enterprises. Stories of failed MDM deployments are rampant, with firms struggling achieve meaningful adoption. According to the
More informationSophos Mobile. administrator help. product version: 9
administrator help product version: 9 Contents About this help... 1 About...2 About Admin... 3 Dashboard... 3 Table views...4 Prerequisites... 4 User roles... 4 Change your password... 5 Password recovery...
More informationMANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE
GUIDE APRIL 2019 PRINTED 17 APRIL 2019 MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Audience Getting Started with Android
More informationSECURE, CENTRALIZED, SIMPLE
1 SECURE, CENTRALIZED, SIMPLE Multi-platform Enterprise Mobility Management Whitepaper 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is an end-to-end, multi-platform, device,
More informationKODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform
& Secure Collaboration Platform by Paweł Mączka, Storware CTO Table of Contents OVERVIEW 3 WHAT IS KODO? 4 HOW IT WORKS? 5 BACKUP & RESTORE 6 TABLE OF FEATURES 8 END-TO-END ENCRYPTION FOR ANDROID DEVICES
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationBYOD Business year of decision!
Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco
More informationEM L01 Introduction to Mobile
EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions
More informationThe Connected Worker and the Enterprise of Things
The Connected Worker and the Enterprise of Things Todd Berger Sr. Director Technical Solutions January 2018 2007 2 Apple iphone 2017 BlackBerry. All Rights Reserved. 2 2017 Apple iphone X 2017 BlackBerry.
More informationCitrix XenMobile and Windows 10
White Paper Citrix XenMobile and Windows 10 Citrix XenMobile and Windows 10 With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Windows
More informationA Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper
A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today White Paper As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices.
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationEnterprise Security Solutions by Quick Heal. Seqrite.
Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices
More informationEnhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management
SharePoint 2013 and Colligo Apps Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Email Management SharePoint 2013 is the latest release of Microsoft s leading business collaboration
More informationDevice commands. Device Command. Compliance
Device commands Compliance Apply the latest Device mgmt. Profile & app info Apply the latest Device mgmt. Profile Apply the latest app mgmt. profile Apply the latest internal app info Apply customized
More informationQuo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory,
Quo vadis? System Center Configuration Manager Full managed desktop Mobile device management Light managed device policies, inventory, Hybrid management One pane of glass Integration of mobile device management
More informationSecurity Challenges: Integrating Apple Computers into Windows Environments
Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively
More informationConsumerization. Copyright 2014 Trend Micro Inc. IT Work Load
Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web
More informationSophos Mobile administrator help. Product version: 7.1
Sophos Mobile administrator help Product version: 7.1 Contents 1 About this help...6 2 About Sophos Mobile...7 3 About the Sophos Mobile console...8 3.1 User interface...8 3.2 Table views...9 3.3 Prerequisites...9
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationSophos Mobile in Central administrator help. Product version: 7.1
Sophos Mobile in Central administrator help Product version: 7.1 Contents 1 About this help...6 2 Key steps for managing devices with Sophos Mobile...7 3 Dashboard...8 4 Reports...9 5 Tasks...10 5.1 Monitor
More informationSophos Mobile on Premise
administrator help product version: 8.6 Contents About this help... 1 About Sophos Mobile...2 About Sophos Mobile Admin... 3 User interface... 3 Table views...3 Prerequisites... 4 User roles... 4 Change
More informationQuick Heal Mobile Device Management. Available on
Available on Infinite Devices. One Unified Solution. Quick Heal A simple yet powerful solution, Quick Heal is a unified platform for managing and monitoring multiple mobile devices within your enterprise
More informationSecuring Institutional Data in a Mobile World
University of Wisconsin Madison Securing Institutional Data in a Mobile World July 13, 2017 Securing Institutional Data in a Mobile World / Agenda 01 What is a mobile device? 02 Protecting institutional
More informationARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018
REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural
More informationUSING PRODUCT PROVISIONING TO DELIVER FILES TO WINDOWS 10: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE
GUIDE OCTOBER 2018 PRINTED 4 MARCH 2019 USING PRODUCT PROVISIONING TO DELIVER FILES TO WINDOWS 10: VMWARE WORKSPACE ONE VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience Delivering
More informationConsumerization: What It Means to IT Operations
Consumerization: What It Means to IT Operations Scott Hardie, Sr Princ Systems Engineer Justin Ware, Technical Director, Intuitive Consumerization: What It Means to IT Operations 1 Agenda 1 Consumerization
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd
More informationPLATFORM CONVERGENCE JOURNEY
Windows 10 Client PLATFORM CONVERGENCE JOURNEY Converged OS kernel Converged app model Windows 10 DEPLOYMENT CHOICES Wipe-and-Load In-Place Provisioning Traditional process Capture data and settings
More informationSamsung Knox Tizen Wearable v2.0
Samsung Knox Tizen Wearable v2.0 Introduction for app vendors Sep. 2016 Samsung Electronics Co., Ltd. What is Samsung Knox Tizen Wearable? HARDWARE-BASED, BUILT-IN PLATFORM THAT EXISTS IN MOST SAMSUNG
More informationIBM MaaS360 with Watson Evaluator s Guide. Version 2.2
IBM MaaS360 with Watson Evaluator s Guide Version 2.2 Introduction Welcome to the IBM MaaS360 with Watson Evaluator s Guide. This document provides you with a self-guided, hands-on review of our leading
More informationVMware Workspace ONE UEM Apple tvos Device Management. VMware Workspace ONE UEM 1811 VMware AirWatch
VMware Workspace ONE UEM Apple tvos Device Management VMware Workspace ONE UEM 1811 VMware AirWatch You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD Trends Bring Your Own Device BYOD at Cisco Cisco BYOD Solution Use Cases Summary Trends #CiscoPlusCA Demand for Mobility 15 billion new networked mobile
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationIBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012
IBM Endpoint Manager Francesco Censi WW ATG IEM consultant francesco.censi@it.ibm.com Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012 2012 IBM Corporation Endpoint complexity continues to
More informationBlackBerry UEM Configuration Guide
BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator
More informationOffice 365: Modern Workplace
Office 365: Modern Workplace November 8, 2018 Bruce Ward, VP of Business Strategy Helping you grow your business with scalable IT services & solutions for today s challenges & tomorrow s vision. 2018 Peters
More informationEnterprise Product Guide
Enterprise Product Guide BlackBerry Enterprise Software April 2018 Published: 2018-06-06 SWD-20180606124626584 Contents BlackBerry enterprise products... 5 The BlackBerry Infrastructure...6 BlackBerry
More informationConfiguration Guide. BlackBerry UEM. Version 12.9
Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration
More information905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of
More informationBYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled
BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled effectively. Contents Introduction.... 3 Primary Bring Your Own
More informationMaaS360 Secure Productivity Suite
MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity
More informationCounterACT Afaria MDM Plugin
Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...
More informationSophos Mobile Control Administrator guide. Product version: 5.1
Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this
More informationDatasheet. Only Workspaces delivers the features users want and the control that IT needs.
Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationSophos Mobile in Central
administrator help Product Version: 8 Contents About this help...1 About Sophos Mobile Admin... 2 User interface... 2 Table views... 2 User roles... 3 Key steps for managing devices with Sophos Mobile...4
More informationWindows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft
Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business
More informationPowerful, affordable Unified Endpoint Management. Fusion UEM. Web:
Powerful, affordable Unified Endpoint Management Fusion UEM One device manager for everything Available in Gold and Platinum versions Fusion UEM comes in two versions each of which delivers more features
More informationHosted Exchange. Presented by Joseph Lee
Hosted Exchange Presented by Joseph Lee Hosted Exchange Hosted Exchange provides users with essential productivity tools and admins with control, simplicity and choice. Hosted Exchange For users: High
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationManaging Devices and Corporate Data on ios
Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible
More informationCONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE
GUIDE FEBRUARY 2019 PRINTED 26 FEBRUARY 2019 CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience
More informationWalter Narisoni Sales Engineer Manager
Walter Narisoni Sales Engineer Manager Sophos History Evolution to complete security Founded in Abingdon (Oxford), UK Voted best small/medium sized company in UK Acquired Astaro Divested noncore Cyber
More informationThe Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationVMware AirWatch Android Platform Guide
VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationWeak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann
Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile
More informationSophos Mobile Control startup guide. Product version: 7
Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses
More informationINSTALLATION AND SETUP VMware Workspace ONE
GUIDE NOVEMBER 2018 PRINTED 9 JANUARY 2019 VMware Workspace ONE Table of Contents Installation and Setup Introduction Prerequisites Signing Up for a Free Trial Launching the Workspace ONE UEM Console Navigating
More informationConfiguration Guide. BlackBerry UEM. Version 12.7 Maintenance Release 2
Configuration Guide BlackBerry UEM Version 12.7 Maintenance Release 2 Published: 2017-12-04 SWD-20171130134721747 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the
More informationREVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS
REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS Table of Contents Executive Summary VMware Reference Architectures Audience Reference Architecture Design Methodology
More informationAbout us. How we help?
Go to Top About us Mobile Device Manager Plus is a mobile device management solution developed by ManageEngine. Mobile Device Manager Plus provides admins the power to perform device management from a
More informationRHM Presentation. Maas 360 Mobile device management
RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership
More informationSophos Mobile. super administrator guide. Product Version: 8
Sophos Mobile super administrator guide Product Version: 8 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...
More information7 Things You Need to Know about Virtual Mobile Infrastructure
7 Things You Need to Know about Virtual Mobile Infrastructure Executive Summary Employees are bringing their phones and tablets to work in droves. This tidal wave of unmanaged devices has forced IT departments
More informationSophos Mobile user help. Product version: 7.1
Sophos Mobile user help Product version: 7.1 Contents 1 About this help...4 2 About Sophos Mobile...5 3 Login to the Self Service Portal...6 3.1 First login...6 3.2 Login...6 3.3 Password recovery...6
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationSophos Mobile. user help. product version: 8.6
user help product version: 8.6 Contents About this help... 1 About...2 Set up on your device... 3 Enrollment steps for Android devices... 3 Enrollment steps for ios devices...3 Enrollment steps for Macs...
More informationUnified Endpoint Management: Security and productivity for the digital workspace
White Paper Unified Endpoint Management: Security and productivity for the digital workspace Unified Endpoint Management: Security and productivity for the digital workspace The workplace has evolved from
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationGoogle on BeyondCorp: Empowering employees with security for the cloud era
SESSION ID: EXP-F02 Google on BeyondCorp: Empowering employees with security for the cloud era Jennifer Lin Director, Product Management, Security & Privacy Google Cloud What is BeyondCorp? Enterprise
More informationThe following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card
10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationThe Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions
The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:
More informationSophos Mobile. installation guide. Product Version: 8.5
installation guide Product Version: 8.5 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses...
More informationAugmenting security and management of. Office 365 with Citrix XenMobile
Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com
More information