White paper. April Security

Size: px
Start display at page:

Download "White paper. April Security"

Transcription

1 White paper April 2011 Security

2 This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of technology. This document contains specifications for Sony Ericsson smartphones launched on Android 2.3 or later. Document history Version April 2011 First released version Version 1 Sony Ericsson website For more information about Sony Ericsson business propositions, go to This White paper is published by: Sony Ericsson Mobile Communications AB, SE Lund, Sweden Sony Ericsson Mobile Communications AB, All rights reserved. You are hereby granted a license to download and/or print a copy of this document. Any rights not expressly granted herein are reserved. First released version (April 2011) Publication number: This document is published by Sony Ericsson Mobile Communications AB, without any warranty*. Improvements and changes to this text necessitated by typographical errors, inaccuracies of current information or improvements to programs and/or equipment may be made by Sony Ericsson Mobile Communications AB at any time and without notice. Such changes will, however, be incorporated into new editions of this document. Printed versions are to be regarded as temporary reference copies only. *All implied warranties, including without limitation the implied warranties of merchantability or fitness for a particular purpose, are excluded. In no event shall Sony Ericsson or its licensors be liable for incidental or consequential damages of any nature, including but not limited to lost profits or commercial loss, arising out of the use of the information in this document. 2 April 2011

3 Table of contents Introduction...4 Feature overview Device security...5 IT policies...5 Specifications...5 Setup...5 Enforce password...6 Setup...6 Application download restriction...6 Network security...7 VPN...7 Specifications...7 Setup...7 SSL/TLS...8 Certificates...8 Specifications...8 Setup...8 Information security...9 Remote wipe...9 Specifications...9 Setup...9 Store information safely...10 Specifications...10 Copy contacts to a SIM card or memory card...10 Copy to a computer...10 Synchronise with a web service...11 Synchronise with Microsoft Exchange Server...11 Trademarks and acknowledgements April 2011

4 Introduction A phone for business must be secure since it may contain not only classified information, but also access to your corporate servers and networks. This document shows what features are available in the Sony Ericsson Android smartphones to protect your smartphone and its contents from unauthorised use and to ensure secure access to your corporate resources. For safe network access, the smartphone supports VPN, SSL/TLS encryption and client certificates. Protect the information in your smartphone by enforcing passwords and PIN codes. You can push your corporate IT policies to the smartphones and manage the security settings remotely from the server. If one of your corporate smartphones are stolen or lost, you can remotely wipe the information in the smartphone and reset it. Then restore all the information to a new smartphone by downloading your previously backed up or synchronised information. There are several options for safely storing and synchronising information. In order to meet the evolving threat landscape, Sony Ericsson is continuously working on improving the security of its products. Feature overview Device security IT policies Enforce password Application download restriction Network security VPN SSL/TLS Certificates Information security Remote wipe Store information safely 4 April 2011

5 Device security To protect your Sony Ericsson Android smartphone from unauthorised use, you can push and deploy your corporate IT policies into the smartphone, and manage and administrate the settings remotely from the Exchange server. Depending on your corporate policies and needs, you can select different passcode options for your smartphone. Lower the risk of getting malware into your corporate smartphones by setting them to only accept downloads from Android Market. IT policies IT policies are set by an administrator in the Microsoft Exchange Server and dictate, for example, whether the user must enter a password to activate the smartphone, how long the password should be and rules for the combination of numbers and letters. When the smartphone connects to the Microsoft Exchange Server the user is asked to accept the IT policies. If the user accepts, and the smartphone is compliant to the IT policies, the user is permitted access to the server and its contents. Specifications Supported password/it policies Require password Minimum password length Require alpha-numeric password Allow simple password (Microsoft Exchange Server 2007) Number of failed attempts Timeout without user input Setup Your Microsoft Exchange Server should have the option Allow non-provisioned device active for accessing the IT policies. Establish your preferred IT policies on the Exchange server. You can also use a Mobile Device Management solution to push the IT policies to the smartphone. 5 April 2011

6 Enforce password You can enforce passwords or PIN codes upon the users to secure that the smartphone is only used by the person intended. Set the requirements to suit your company security policy and needs. Setup Activate the Enforce password option on the Microsoft Exchange Server or manually in the smartphone. Then select if you want the users to authenticate themselves to the smartphone with a: password PIN code Passwords ensure a higher security than PIN codes. In the smartphone you can also define a screen unlock pattern. Once defined and set, this pattern must be drawn correctly on the screen by a finger to unlock the phone after an inactivity period. Application download restriction Example of screen unlock pattern Certain downloadable applications can contain malware or other harmful components. You can manage this risk by configuring your smartphone to only accept downloads from Android Market. 6 April 2011

7 Network security The Sony Ericsson Android smartphone is an efficient work tool that enables you to access your corporate resources and information at any time and place. The smartphone offers secure connections and protected data transmission. VPN Your smartphone contains a VPN (Virtual Private Network) client that provides a secure remote connection to your corporate servers using industry-standard protocols and user authentication. This connection is Internet based. Specifications VPN PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) L2TP/IPSec PSK (Pre-shared key based L2TP/IPSec) L2TP/IPSec CRT (Certificate based L2TP/IPSec) Setup Your smartphone supports several standard VPN technologies. If your company supports at least one of them, the VPN setup requires no additional network configuration. But you still need to make sure your smartphone supports your specific corporate VPN protocols and authentication methods. Some corporate VPN networks require users to authenticate themselves with certificates before allowing access. Having set this up on the server side, you then need to enter your corporate VPN settings via the general settings in your smartphone. Schematic overview of how a basic VPN connection works. 7 April 2011

8 SSL/TLS Your smartphone supports HTTPS data encryption over the Internet using the SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols, protecting your information during transmission between your corporate server and your smartphone. SSL should be activated on your corporate server to ensure that the smartphones can be used safely in a corporate environment. Certificates A user certificate is a strong and secure authentication method containing information about the user and the certificate authority. Installed on your smartphone it authenticates you as a valid user towards your corporate network. The Sony Ericsson Android smartphones support certificate authentication for access to VPN and Wi-Fi networks. Note that Microsoft Exchange ActiveSync only supports basic authentication. Specifications Authentication certificates x.509 in.p12 or.crt formats Setup Ensure that you have your public key infrastructure configured to support device- and user-based certificates with the corresponding key distribution process. Push the user certificates from the corporate server to the individual smartphones. The user receives and installs it on the smartphone. Certificates can also be downloaded to smartphones, for example, from your corporate website or from prepared memory cards. Certificate-based VPN connections require certificates to be exported from the VPN server and copied to your smartphone. 8 April 2011

9 Information security Your corporate Sony Ericsson Android smartphone contains a lot of valuable and sometimes sensitive information. Passwords, PIN codes and screen unlock patterns prevent unauthorised use. But to further protect your information the smartphones can have their contents remotely wiped from phone if needed, and you can then use your back up or synchronisation features to restore the information in another smartphone. Remote wipe If a corporate smartphone is stolen or lost, you can initiate a remote wipe from the server and delete the smartphone s contents to make sure important information does not fall into the wrong hands. Consequences of a remote wipe The smartphone is reset with the factory default settings Microsoft Exchange ActiveSync data is erased ( messages, calendar events, contacts) Remote wipe only affects the data in your smartphone. The corresponding data on the Microsoft Exchange Server remains safe and unaffected, as well as data on your memory card. Specifications Remote wipe options Remote wipe tools Remote-initiated data wipe Microsoft Exchange Active Sync Mobile Administration Web Tool Outlook Web Access (Microsoft Exchange Server 2007/2010) Exchange Management Console (Microsoft Exchange Server 2007/2010) Setup Remote wipe is part of the IT policies in your Microsoft Exchange Server. When a connection between your smartphone and your Exchange server is first set up, the IT policies are pushed to the smartphone and implemented if the smartphone is compliant. When the connection is established, you have the possibility to do a remote wipe from the Exchange server. 9 April 2011

10 Store information safely It s a good idea to have the information in your smartphone synchronised with other media or safely stored in another location as well. This way, the existence of your information is not dependent on a specific device. If you lose your smartphone or if you want to use several smartphones you can easily download your contacts, messages and other important information to a new smartphone. Depending on your needs and your company policies for backing up information, you can choose to store your corporate and personal information in different ways and in different media: Copy contacts to a SIM card or memory card Copy to a computer Synchronise with a web service Synchronise with Microsoft Exchange Server Specifications Computer storage Online storage Sony Ericsson PC Companion Requires Microsoft Windows 7, Vista, or XP (service pack 3 +) Microsoft Exchange Server via Microsoft Exchange ActiveSync Sony Ericsson Sync Google account Copy contacts to a SIM card or memory card You can copy your contacts to the SIM card or to the memory card. If you switch to another phone but use the same cards, this is convenient. In your new phone you then select to copy contacts from a SIM card or memory card. Copy to a computer When connecting your smartphone to a computer with a USB cable you will be able to install and use the PC Companion application on your computer. With PC Companion you can access additional applications to transfer and organise contacts, calendar entries, files, media content and more. 10 April 2011

11 Synchronise with a web service If you want to back up and store your contacts outside the smartphone, you can use the Sony Ericsson Sync service. Your contacts are stored online, hosted by Sony Ericsson, and available on the web. This is convenient if you lose your smartphone, get a new one or if you want to use your contact list with several phones. After signing in to the designated Sony Ericsson website at you can just download your list of contacts to any phone. The same principle is valid if you use the Google services for , contacts and calendar. Then you sign in to your Google account in your smartphone, and the information in your smartphone is synchronised and stored with your Google service. Synchronise with Microsoft Exchange Server The Sony Ericsson Android smartphones use the Microsoft Exchange ActiveSync client to connect with your Microsoft Exchange Server and synchronise with your corporate , calendar and contacts. Since it s a two-way communication, actions and changes that you perform in the smartphone or on the computer are all immediately reflected in the other device. Your smartphone contains the same information as on your Microsoft Exchange Server, and the server is a safe storage for your corporate , calendar and contacts. 11 April 2011

12 Trademarks and acknowledgements The Liquid Identity and Liquid Energy logos and Xperia are trademarks or registered trademarks of Sony Ericsson Mobile Communications AB. Sony, "make.believe" is a trademark or registered trademark of Sony Corporation. Google, Android and Android Market are trademarks or registered trademarks of Google, Inc. Wi-Fi is a trademark or registered trademark of the Wi-Fi Alliance. DLNA is a trademark or registered trademark of the Digital Living Network Alliance. XHTML is a registered trademark of the W3C. Microsoft, Windows, Microsoft Exchange Server, Microsoft Exchange ActiveSync are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks and copyrights are the property of their respective owners. 12 April 2011

White paper. April Messaging

White paper. April Messaging White paper April 2011 Messaging This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of technology.

More information

White paper. April Connectivity

White paper. April Connectivity White paper April 2011 Connectivity This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of

More information

Xperia TM. Read about how Xperia TM devices manage and synchronisation in a corporate IT environment

Xperia TM. Read about how Xperia TM devices manage  and synchronisation in a corporate IT environment Xperia TM in Business Email, Calendar and Contacts Read about how Xperia TM devices manage email and synchronisation in a corporate IT environment Exchange ActiveSync IMAP4 and POP3 The Xperia Email application

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third

More information

ipad in Business Security Overview

ipad in Business Security Overview ipad in Business Security Overview ipad can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods for

More information

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. March 2018

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. March 2018 Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices March 2018 About this document Products covered This document describes Xperia in Business

More information

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices.

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices February 2017 About this document Products covered This document describes Xperia in Business

More information

Sony Xperia Configurator Cloud User Instructions

Sony Xperia Configurator Cloud User Instructions Sony Xperia Configurator Cloud User Instructions This document is published by: Sony Mobile Communications Inc., 1-8-15 Konan, Minato-ku, Tokyo 108-0075, Japan www.sonymobile.com Sony Mobile Communications

More information

Video calls. July Keep in touch using voice and video

Video calls. July Keep in touch using voice and video Video calls July 2007 Keep in touch using voice and video Contents Introduction... 2 Before you start... 2 Making a video call... 3 Answering and ending a video call... 3 Zooming... 4 Sharing pictures

More information

Setting up Java environment for Project Capuchin development with Sony Ericsson phones

Setting up Java environment for Project Capuchin development with Sony Ericsson phones Instructions October 2008 Setting up Java environment for Project Capuchin development with Sony Ericsson phones Preface About this document This document contains a step by step description of how to

More information

Streaming with Project Capuchin for Adobe Flash Lite developers

Streaming with Project Capuchin for Adobe Flash Lite developers Tutorial March 2009 Streaming with Project Capuchin for Adobe Flash Lite developers Preface About this tutorial This Project Capuchin tutorial illustrates how images stored in different locations can be

More information

Project Capuchin Bridging Flash Lite and Java ME in Sony Ericsson phones

Project Capuchin Bridging Flash Lite and Java ME in Sony Ericsson phones Product information August 2008 Project Capuchin Bridging Flash Lite and Java ME in Sony Ericsson phones Document history Change history 2008-05-01 Doc. No. 1212.4799.1 First version 2008-08-18 Doc. No.

More information

Managing files. July Organize your files

Managing files. July Organize your files Managing files July 2007 Organize your files Contents Introduction... 2 Installing the software... 3 Installing the PC Suite from the CD... 4 Downloading the PC Suite from the Web... 4 Installing PC Suite

More information

SmartWatch. February Specification. Developer World sonymobile.com/developer

SmartWatch. February Specification. Developer World sonymobile.com/developer February 2013 SmartWatch Specification *All implied warranties, including without limitation the implied warranties of merchantability or fitness for a particular purpose, are excluded. In no event shall

More information

WORKSHARE MOBILE APPS SECURITY OVERVIEW

WORKSHARE MOBILE APPS SECURITY OVERVIEW WORKSHARE MOBILE APPS SECURITY OVERVIEW June 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc.

More information

Releasing an Application for mobile applications in Sony Ericsson phones

Releasing an Application for mobile applications in Sony Ericsson phones Tutorial May 2007 Releasing an Application for mobile applications in Sony Ericsson phones Preface About this tutorial This tutorial has been written by Simon Judge, a freelance mobile developer who develops

More information

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have

More information

Application Security for Java-based BlackBerry Handhelds

Application Security for Java-based BlackBerry Handhelds Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Deployment Scenarios June Microsoft Exchange ActiveSync. Standards-based Servers. Virtual Private Networks. Digital Certificates

Deployment Scenarios June Microsoft Exchange ActiveSync. Standards-based Servers. Virtual Private Networks. Digital Certificates iphone in Business Deployment Scenarios June 2010 Learn how iphone integrates seamlessly into enterprise environments with these deployment scenarios. Microsoft Exchange ActiveSync Standards-based Servers

More information

ipad in Business Deployment Scenarios November 2010 Microsoft Exchange ActiveSync Standards-Based Services Virtual Private Networks

ipad in Business Deployment Scenarios November 2010 Microsoft Exchange ActiveSync Standards-Based Services Virtual Private Networks ipad in Business Deployment Scenarios November 2010 Learn how ipad integrates seamlessly into enterprise environments with these deployment scenarios. Microsoft Exchange ActiveSync Standards-Based Services

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

SafeNet MobilePASS+ for Android. User Guide

SafeNet MobilePASS+ for Android. User Guide SafeNet MobilePASS+ for Android User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Blend Version 1.2 Published: 2015-07-06 SWD-20150706173035792 Contents About BlackBerry Blend... 4 BlackBerry Blend architecture... 4 Security... 5 IT policy

More information

One Identity Defender 5.9. Product Overview

One Identity Defender 5.9. Product Overview One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

StoneGate IPsec VPN Client Release Notes for Version 4.2.0

StoneGate IPsec VPN Client Release Notes for Version 4.2.0 StoneGate IPsec VPN Client Release Notes for Version 4.2.0 Created: July 24, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Compatibility... 4 IPsec Compliance... 4

More information

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile

More information

1 About this document Getting started Text input Network connection Network sharing (Certain models only)...

1 About this document Getting started Text input Network connection Network sharing (Certain models only)... User Guide EMUI 3.1 1 About this document... 1 2 Getting started... 2 Locking and unlocking the screen... 2 Notification and status icons... 2 Common keys... 2 Shortcut operations... 3 Dual windows gestures...

More information

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Compliance Manager ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Stonesoft IPsec VPN Client. Release Notes for Version 5.4.1

Stonesoft IPsec VPN Client. Release Notes for Version 5.4.1 Stonesoft IPsec VPN Client Release Notes for Version 5.4.1 Updated: April 14, 2014 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 System Requirements... 3 General Requirements... 3 Operating

More information

StoneGate SSL VPN Release Notes for Version 1.2.1

StoneGate SSL VPN Release Notes for Version 1.2.1 StoneGate SSL VPN Release Notes for Version 1.2.1 Created: February 25, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

ipad in Business Deployment Scenarios and Device Configuration Overview April 2010 Microsoft Exchange IMAP, CalDAV, and LDAP

ipad in Business Deployment Scenarios and Device Configuration Overview April 2010 Microsoft Exchange IMAP, CalDAV, and LDAP ipad in Business Deployment Scenarios and Device Configuration Overview April 00 Learn how ipad integrates seamlessly into enterprise environments with these deployment scenarios and the device configuration

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

HUAWEI H30-U10. Quick Start Guide

HUAWEI H30-U10. Quick Start Guide HUAWEI H30-U10 Quick Start Guide Dual card dual standby single pass Your phone supports only dual card dual standby single pass, which means you cannot use both SIM cards for calls or data services simultaneously.

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Secure & Seamless Remote Device Management

Secure & Seamless Remote Device Management White Paper Secure & Seamless Remote Device Management Table of Contents 1. The purpose of this document 2 2. What is a SiteManager? 2 3. Typical Installation 3 4. How is Security ensured in the Production

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

StoneGate SSL VPN Release Notes for Version 1.2.0

StoneGate SSL VPN Release Notes for Version 1.2.0 StoneGate SSL VPN Release Notes for Version 1.2.0 Created: November 6, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

StoneGate SSL VPN. Release Notes for Version 1.4.5

StoneGate SSL VPN. Release Notes for Version 1.4.5 StoneGate SSL VPN Release Notes for Version 1.4.5 Created: March 3, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 System Requirements... 4 StoneGate Appliances... 4 Build Version...

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of

More information

StoneGate SSL VPN Release Notes for Version 1.3.1

StoneGate SSL VPN Release Notes for Version 1.3.1 StoneGate SSL VPN Release Notes for Version 1.3.1 Created: July 29, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility... 5 Upgrade

More information

StoneGate IPsec VPN Client Release Notes for Version 5.0.0

StoneGate IPsec VPN Client Release Notes for Version 5.0.0 StoneGate IPsec VPN Client Release Notes for Version 5.0.0 Created: April 30, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Terms of Use. Changes. General Use.

Terms of Use. Changes. General Use. Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

KACE GO Mobile App 5.0. Release Notes

KACE GO Mobile App 5.0. Release Notes KACE GO Mobile App 5.0 Release Notes Table of Contents Quest KACE GO 5.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...

More information

SECURE, CENTRALIZED, SIMPLE

SECURE, CENTRALIZED, SIMPLE 1 SECURE, CENTRALIZED, SIMPLE Multi-platform Enterprise Mobility Management Whitepaper 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is an end-to-end, multi-platform, device,

More information

StoneGate IPsec VPN Client Release Notes for Version 4.3.1

StoneGate IPsec VPN Client Release Notes for Version 4.3.1 StoneGate IPsec VPN Client Release Notes for Version 4.3.1 Created: October 13, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,

More information

Endpoint Protection with DigitalPersona Pro

Endpoint Protection with DigitalPersona Pro DigitalPersona Product Brief Endpoint Protection with DigitalPersona Pro An introductory technical overview to DigitalPersona s suite for Access Management, Data Protection and Secure Communication. April

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep

More information

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.1

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.1 Stonesoft Firewall/VPN Express Release Notes for Version 5.5.1 Created: July 26, 2013 Table of Contents What s New... 3 Enhancements in Firewall/VPN Express... 3 Fixes... 3 System Requirements... 5 Stonesoft

More information

User Guide EMUI / 3.1

User Guide EMUI / 3.1 User Guide EMUI 3.0.5 / 3.1 1 About this document... 1 2 Getting started... 2 Locking and unlocking the screen... 2 Notification and status icons... 2 Common keys... 2 Home screen operations... 3 3 Text

More information

HG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

HG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway V100R001 User Guide Issue 01 Date 2013-07-23 Part Number 202633 Huawei Technologies Co., Ltd. provides customers with comprehensive

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

Startup guide. Xperia C2305. Sony Mobile Communications AB SE Lund, Sweden

Startup guide. Xperia C2305. Sony Mobile Communications AB SE Lund, Sweden Startup guide Xperia C2305 Sony Mobile Communications AB SE-221 88 Lund, Sweden www.sonymobile.com 1271-4312.1 Welcome Important Information Before you use your device, please read the Important Information

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

StoneGate IPsec VPN Client Release Notes for Version 5.0.1

StoneGate IPsec VPN Client Release Notes for Version 5.0.1 StoneGate IPsec VPN Client Release Notes for Version 5.0.1 Created: July 2, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

StoneGate Firewall/VPN How-To Installing and Activating StoneGate FW/VPN in VMware ESX Server

StoneGate Firewall/VPN How-To Installing and Activating StoneGate FW/VPN in VMware ESX Server StoneGate Firewall/VPN How-To Installing and Activating StoneGate FW/VPN in VMware ESX Server Created: June 11, 2008 Table of Contents Introduction to Installing and Activating StoneGate FW/VPN in VMware

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide Using RADIUS Protocol for F5 BIG-IP Access Policy Manager All information herein is either public information or is the property of and owned solely by

More information

Compliance Manager ZENworks Mobile Management 3.0.x January 2015

Compliance Manager ZENworks Mobile Management 3.0.x January 2015 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 3.0.x January 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Compatibility Guide All information herein is either public information or is the property of and owned solely by Gemalto. and/or its subsidiaries who shall have and keep

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from

More information

KACE GO Mobile App 3.1. Release Notes

KACE GO Mobile App 3.1. Release Notes KACE GO Mobile App 3.1 Release Notes Table of Contents Quest KACE GO 3.1 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance (K1000) administrators...

More information

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.4

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.4 Stonesoft Firewall/VPN Express Release Notes for Version 5.5.4 Created: December 17, 2013 Table of Contents What s New... 3 Fixes... 3 System Requirements... 4 Stonesoft Firewall/VPN Appliances... 4 Build

More information

Enterprise solution comparison chart

Enterprise solution comparison chart Enterprise solution comparison chart This quick reference compares supported and features across, Enterprise Service,, and. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs

More information

Intune Policies Guide

Intune Policies Guide TechReady Are you ready to implement IT solutions? Intune Policies Guide Mobile Device Management with Enterprise Mobility Suite Created for: TechReady 15 September 2016 Version 0.3 Created by: Adrian

More information

Release Notes Version 4.1 BlackBerry 7100g BlackBerry 7290 Wireless Handheld

Release Notes Version 4.1 BlackBerry 7100g BlackBerry 7290 Wireless Handheld f Release Notes Version 4.1 BlackBerry 7100g BlackBerry 7290 Wireless Handheld NOTE This document is provided for informational purposes only, and does not constitute a binding legal document unless specifically

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly

More information

KACE GO Mobile App 5.0. Getting Started Guide

KACE GO Mobile App 5.0. Getting Started Guide KACE GO Mobile App 5.0 Getting Started Guide Table of Contents Using the KACE GO Mobile App...3 Getting Started...3 What features are included in this version of the KACE GO Mobile App?...3 How do I access

More information

RealPresence CloudAXIS Suite Release Notes

RealPresence CloudAXIS Suite Release Notes RELEASE NOTES Software 1.1 April 2013 3725-03317-001 Rev A RealPresence CloudAXIS Suite Release Notes Trademarks 2013, Polycom, Inc. All rights reserved. POLYCOM, the Polycom logo and the names and marks

More information

What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services

What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services September 2017 Introduction This document is a summary of what s new in ios 11, macos

More information

Xperia TM. in Business. Xperia Configurator Cloud. The management tool by Sony Mobile Communications for swift and secure deployment of mobile devices

Xperia TM. in Business. Xperia Configurator Cloud. The management tool by Sony Mobile Communications for swift and secure deployment of mobile devices Xperia TM in Business Xperia Configurator Cloud The management tool by Sony Mobile Communications for swift and secure deployment of mobile devices April 2018 ABOUT THIS DOCUMENT Products covered This

More information

LiveView micro display Extended User guide

LiveView micro display Extended User guide LiveView micro display Extended User guide Contents Introduction...3 LiveWare manager...4 Before you download applications from Android Market...5 Barcode...6 LiveView application...7 LiveView overview...8

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Linksys EA-Series Routers

Linksys EA-Series Routers Routers Table of Contents Table of Contents Product overview EA2700/EA3500 Back view Bottom view EA4500 Top view Back view Setting Up Your EA-Series Router Where to find more help How to set up your router

More information

Stonesoft SSL VPN. Release Notes for Version 1.5.3

Stonesoft SSL VPN. Release Notes for Version 1.5.3 Stonesoft SSL VPN Release Notes for Version 1.5.3 Created: December 1, 2011 Table of Contents What s New... 3 New Features... 3 Enhancements... 3 Fixes... 3 System Requirements... 4 Stonesoft Appliances...

More information

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.2

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.2 Stonesoft Firewall/VPN Express Release Notes for Version 5.5.2 Created: September 24, 2013 Table of Contents What s New... 3 Fixes... 3 System Requirements... 4 Stonesoft Firewall/VPN Appliances... 4 Build

More information

StoneGate SSL VPN. Release Notes for Version 1.5.0

StoneGate SSL VPN. Release Notes for Version 1.5.0 StoneGate SSL VPN Release Notes for Version 1.5.0 Created: August 10, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 System Requirements... 4 StoneGate Appliances... 4 Build Version...

More information

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT

More information

OneBridge Mobile Groupware 5.0

OneBridge Mobile Groupware 5.0 OneBridge Mobile Groupware 5.0 release overview Extended Systems 5777 North Meeker Avenue Boise, ID 83713 Tel: (800) 235-7576 (208) 322-7800 Fax: (208) 327-5004 Web: www.extendedsystems.com Rev. 1005 Legal

More information

VMware Boxer Comparison Matrix for IBM Notes Traveler Compare the features supported by VMware Boxer and AirWatch Inbox

VMware Boxer Comparison Matrix for IBM Notes Traveler Compare the features supported by VMware Boxer and AirWatch Inbox VMware Boxer Comparison Matrix for IBM Notes Traveler Compare the features supported by VMware Boxer and AirWatch Inbox Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback

More information