White paper. April Security
|
|
- Dennis Floyd
- 6 years ago
- Views:
Transcription
1 White paper April 2011 Security
2 This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of technology. This document contains specifications for Sony Ericsson smartphones launched on Android 2.3 or later. Document history Version April 2011 First released version Version 1 Sony Ericsson website For more information about Sony Ericsson business propositions, go to This White paper is published by: Sony Ericsson Mobile Communications AB, SE Lund, Sweden Sony Ericsson Mobile Communications AB, All rights reserved. You are hereby granted a license to download and/or print a copy of this document. Any rights not expressly granted herein are reserved. First released version (April 2011) Publication number: This document is published by Sony Ericsson Mobile Communications AB, without any warranty*. Improvements and changes to this text necessitated by typographical errors, inaccuracies of current information or improvements to programs and/or equipment may be made by Sony Ericsson Mobile Communications AB at any time and without notice. Such changes will, however, be incorporated into new editions of this document. Printed versions are to be regarded as temporary reference copies only. *All implied warranties, including without limitation the implied warranties of merchantability or fitness for a particular purpose, are excluded. In no event shall Sony Ericsson or its licensors be liable for incidental or consequential damages of any nature, including but not limited to lost profits or commercial loss, arising out of the use of the information in this document. 2 April 2011
3 Table of contents Introduction...4 Feature overview Device security...5 IT policies...5 Specifications...5 Setup...5 Enforce password...6 Setup...6 Application download restriction...6 Network security...7 VPN...7 Specifications...7 Setup...7 SSL/TLS...8 Certificates...8 Specifications...8 Setup...8 Information security...9 Remote wipe...9 Specifications...9 Setup...9 Store information safely...10 Specifications...10 Copy contacts to a SIM card or memory card...10 Copy to a computer...10 Synchronise with a web service...11 Synchronise with Microsoft Exchange Server...11 Trademarks and acknowledgements April 2011
4 Introduction A phone for business must be secure since it may contain not only classified information, but also access to your corporate servers and networks. This document shows what features are available in the Sony Ericsson Android smartphones to protect your smartphone and its contents from unauthorised use and to ensure secure access to your corporate resources. For safe network access, the smartphone supports VPN, SSL/TLS encryption and client certificates. Protect the information in your smartphone by enforcing passwords and PIN codes. You can push your corporate IT policies to the smartphones and manage the security settings remotely from the server. If one of your corporate smartphones are stolen or lost, you can remotely wipe the information in the smartphone and reset it. Then restore all the information to a new smartphone by downloading your previously backed up or synchronised information. There are several options for safely storing and synchronising information. In order to meet the evolving threat landscape, Sony Ericsson is continuously working on improving the security of its products. Feature overview Device security IT policies Enforce password Application download restriction Network security VPN SSL/TLS Certificates Information security Remote wipe Store information safely 4 April 2011
5 Device security To protect your Sony Ericsson Android smartphone from unauthorised use, you can push and deploy your corporate IT policies into the smartphone, and manage and administrate the settings remotely from the Exchange server. Depending on your corporate policies and needs, you can select different passcode options for your smartphone. Lower the risk of getting malware into your corporate smartphones by setting them to only accept downloads from Android Market. IT policies IT policies are set by an administrator in the Microsoft Exchange Server and dictate, for example, whether the user must enter a password to activate the smartphone, how long the password should be and rules for the combination of numbers and letters. When the smartphone connects to the Microsoft Exchange Server the user is asked to accept the IT policies. If the user accepts, and the smartphone is compliant to the IT policies, the user is permitted access to the server and its contents. Specifications Supported password/it policies Require password Minimum password length Require alpha-numeric password Allow simple password (Microsoft Exchange Server 2007) Number of failed attempts Timeout without user input Setup Your Microsoft Exchange Server should have the option Allow non-provisioned device active for accessing the IT policies. Establish your preferred IT policies on the Exchange server. You can also use a Mobile Device Management solution to push the IT policies to the smartphone. 5 April 2011
6 Enforce password You can enforce passwords or PIN codes upon the users to secure that the smartphone is only used by the person intended. Set the requirements to suit your company security policy and needs. Setup Activate the Enforce password option on the Microsoft Exchange Server or manually in the smartphone. Then select if you want the users to authenticate themselves to the smartphone with a: password PIN code Passwords ensure a higher security than PIN codes. In the smartphone you can also define a screen unlock pattern. Once defined and set, this pattern must be drawn correctly on the screen by a finger to unlock the phone after an inactivity period. Application download restriction Example of screen unlock pattern Certain downloadable applications can contain malware or other harmful components. You can manage this risk by configuring your smartphone to only accept downloads from Android Market. 6 April 2011
7 Network security The Sony Ericsson Android smartphone is an efficient work tool that enables you to access your corporate resources and information at any time and place. The smartphone offers secure connections and protected data transmission. VPN Your smartphone contains a VPN (Virtual Private Network) client that provides a secure remote connection to your corporate servers using industry-standard protocols and user authentication. This connection is Internet based. Specifications VPN PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) L2TP/IPSec PSK (Pre-shared key based L2TP/IPSec) L2TP/IPSec CRT (Certificate based L2TP/IPSec) Setup Your smartphone supports several standard VPN technologies. If your company supports at least one of them, the VPN setup requires no additional network configuration. But you still need to make sure your smartphone supports your specific corporate VPN protocols and authentication methods. Some corporate VPN networks require users to authenticate themselves with certificates before allowing access. Having set this up on the server side, you then need to enter your corporate VPN settings via the general settings in your smartphone. Schematic overview of how a basic VPN connection works. 7 April 2011
8 SSL/TLS Your smartphone supports HTTPS data encryption over the Internet using the SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols, protecting your information during transmission between your corporate server and your smartphone. SSL should be activated on your corporate server to ensure that the smartphones can be used safely in a corporate environment. Certificates A user certificate is a strong and secure authentication method containing information about the user and the certificate authority. Installed on your smartphone it authenticates you as a valid user towards your corporate network. The Sony Ericsson Android smartphones support certificate authentication for access to VPN and Wi-Fi networks. Note that Microsoft Exchange ActiveSync only supports basic authentication. Specifications Authentication certificates x.509 in.p12 or.crt formats Setup Ensure that you have your public key infrastructure configured to support device- and user-based certificates with the corresponding key distribution process. Push the user certificates from the corporate server to the individual smartphones. The user receives and installs it on the smartphone. Certificates can also be downloaded to smartphones, for example, from your corporate website or from prepared memory cards. Certificate-based VPN connections require certificates to be exported from the VPN server and copied to your smartphone. 8 April 2011
9 Information security Your corporate Sony Ericsson Android smartphone contains a lot of valuable and sometimes sensitive information. Passwords, PIN codes and screen unlock patterns prevent unauthorised use. But to further protect your information the smartphones can have their contents remotely wiped from phone if needed, and you can then use your back up or synchronisation features to restore the information in another smartphone. Remote wipe If a corporate smartphone is stolen or lost, you can initiate a remote wipe from the server and delete the smartphone s contents to make sure important information does not fall into the wrong hands. Consequences of a remote wipe The smartphone is reset with the factory default settings Microsoft Exchange ActiveSync data is erased ( messages, calendar events, contacts) Remote wipe only affects the data in your smartphone. The corresponding data on the Microsoft Exchange Server remains safe and unaffected, as well as data on your memory card. Specifications Remote wipe options Remote wipe tools Remote-initiated data wipe Microsoft Exchange Active Sync Mobile Administration Web Tool Outlook Web Access (Microsoft Exchange Server 2007/2010) Exchange Management Console (Microsoft Exchange Server 2007/2010) Setup Remote wipe is part of the IT policies in your Microsoft Exchange Server. When a connection between your smartphone and your Exchange server is first set up, the IT policies are pushed to the smartphone and implemented if the smartphone is compliant. When the connection is established, you have the possibility to do a remote wipe from the Exchange server. 9 April 2011
10 Store information safely It s a good idea to have the information in your smartphone synchronised with other media or safely stored in another location as well. This way, the existence of your information is not dependent on a specific device. If you lose your smartphone or if you want to use several smartphones you can easily download your contacts, messages and other important information to a new smartphone. Depending on your needs and your company policies for backing up information, you can choose to store your corporate and personal information in different ways and in different media: Copy contacts to a SIM card or memory card Copy to a computer Synchronise with a web service Synchronise with Microsoft Exchange Server Specifications Computer storage Online storage Sony Ericsson PC Companion Requires Microsoft Windows 7, Vista, or XP (service pack 3 +) Microsoft Exchange Server via Microsoft Exchange ActiveSync Sony Ericsson Sync Google account Copy contacts to a SIM card or memory card You can copy your contacts to the SIM card or to the memory card. If you switch to another phone but use the same cards, this is convenient. In your new phone you then select to copy contacts from a SIM card or memory card. Copy to a computer When connecting your smartphone to a computer with a USB cable you will be able to install and use the PC Companion application on your computer. With PC Companion you can access additional applications to transfer and organise contacts, calendar entries, files, media content and more. 10 April 2011
11 Synchronise with a web service If you want to back up and store your contacts outside the smartphone, you can use the Sony Ericsson Sync service. Your contacts are stored online, hosted by Sony Ericsson, and available on the web. This is convenient if you lose your smartphone, get a new one or if you want to use your contact list with several phones. After signing in to the designated Sony Ericsson website at you can just download your list of contacts to any phone. The same principle is valid if you use the Google services for , contacts and calendar. Then you sign in to your Google account in your smartphone, and the information in your smartphone is synchronised and stored with your Google service. Synchronise with Microsoft Exchange Server The Sony Ericsson Android smartphones use the Microsoft Exchange ActiveSync client to connect with your Microsoft Exchange Server and synchronise with your corporate , calendar and contacts. Since it s a two-way communication, actions and changes that you perform in the smartphone or on the computer are all immediately reflected in the other device. Your smartphone contains the same information as on your Microsoft Exchange Server, and the server is a safe storage for your corporate , calendar and contacts. 11 April 2011
12 Trademarks and acknowledgements The Liquid Identity and Liquid Energy logos and Xperia are trademarks or registered trademarks of Sony Ericsson Mobile Communications AB. Sony, "make.believe" is a trademark or registered trademark of Sony Corporation. Google, Android and Android Market are trademarks or registered trademarks of Google, Inc. Wi-Fi is a trademark or registered trademark of the Wi-Fi Alliance. DLNA is a trademark or registered trademark of the Digital Living Network Alliance. XHTML is a registered trademark of the W3C. Microsoft, Windows, Microsoft Exchange Server, Microsoft Exchange ActiveSync are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks and copyrights are the property of their respective owners. 12 April 2011
White paper. April Messaging
White paper April 2011 Messaging This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of technology.
More informationWhite paper. April Connectivity
White paper April 2011 Connectivity This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of
More informationXperia TM. Read about how Xperia TM devices manage and synchronisation in a corporate IT environment
Xperia TM in Business Email, Calendar and Contacts Read about how Xperia TM devices manage email and synchronisation in a corporate IT environment Exchange ActiveSync IMAP4 and POP3 The Xperia Email application
More informationXperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third
More informationipad in Business Security Overview
ipad in Business Security Overview ipad can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods for
More informationXperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. March 2018
Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices March 2018 About this document Products covered This document describes Xperia in Business
More informationXperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices.
Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices February 2017 About this document Products covered This document describes Xperia in Business
More informationSony Xperia Configurator Cloud User Instructions
Sony Xperia Configurator Cloud User Instructions This document is published by: Sony Mobile Communications Inc., 1-8-15 Konan, Minato-ku, Tokyo 108-0075, Japan www.sonymobile.com Sony Mobile Communications
More informationVideo calls. July Keep in touch using voice and video
Video calls July 2007 Keep in touch using voice and video Contents Introduction... 2 Before you start... 2 Making a video call... 3 Answering and ending a video call... 3 Zooming... 4 Sharing pictures
More informationSetting up Java environment for Project Capuchin development with Sony Ericsson phones
Instructions October 2008 Setting up Java environment for Project Capuchin development with Sony Ericsson phones Preface About this document This document contains a step by step description of how to
More informationStreaming with Project Capuchin for Adobe Flash Lite developers
Tutorial March 2009 Streaming with Project Capuchin for Adobe Flash Lite developers Preface About this tutorial This Project Capuchin tutorial illustrates how images stored in different locations can be
More informationProject Capuchin Bridging Flash Lite and Java ME in Sony Ericsson phones
Product information August 2008 Project Capuchin Bridging Flash Lite and Java ME in Sony Ericsson phones Document history Change history 2008-05-01 Doc. No. 1212.4799.1 First version 2008-08-18 Doc. No.
More informationManaging files. July Organize your files
Managing files July 2007 Organize your files Contents Introduction... 2 Installing the software... 3 Installing the PC Suite from the CD... 4 Downloading the PC Suite from the Web... 4 Installing PC Suite
More informationSmartWatch. February Specification. Developer World sonymobile.com/developer
February 2013 SmartWatch Specification *All implied warranties, including without limitation the implied warranties of merchantability or fitness for a particular purpose, are excluded. In no event shall
More informationWORKSHARE MOBILE APPS SECURITY OVERVIEW
WORKSHARE MOBILE APPS SECURITY OVERVIEW June 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc.
More informationReleasing an Application for mobile applications in Sony Ericsson phones
Tutorial May 2007 Releasing an Application for mobile applications in Sony Ericsson phones Preface About this tutorial This tutorial has been written by Simon Judge, a freelance mobile developer who develops
More informationSafeNet MobilePKI for BlackBerry V1.2. Administration Guide
SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have
More informationApplication Security for Java-based BlackBerry Handhelds
Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity
More informationipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationMcAfee Enterprise Mobility Management 12.0 Software
Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationDeployment Scenarios June Microsoft Exchange ActiveSync. Standards-based Servers. Virtual Private Networks. Digital Certificates
iphone in Business Deployment Scenarios June 2010 Learn how iphone integrates seamlessly into enterprise environments with these deployment scenarios. Microsoft Exchange ActiveSync Standards-based Servers
More informationipad in Business Deployment Scenarios November 2010 Microsoft Exchange ActiveSync Standards-Based Services Virtual Private Networks
ipad in Business Deployment Scenarios November 2010 Learn how ipad integrates seamlessly into enterprise environments with these deployment scenarios. Microsoft Exchange ActiveSync Standards-Based Services
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationJunos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
More informationSafeNet MobilePASS+ for Android. User Guide
SafeNet MobilePASS+ for Android User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationInstallation and Configuration Guide
Installation and Configuration Guide BlackBerry Blend Version 1.2 Published: 2015-07-06 SWD-20150706173035792 Contents About BlackBerry Blend... 4 BlackBerry Blend architecture... 4 Security... 5 IT policy
More informationOne Identity Defender 5.9. Product Overview
One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationStoneGate IPsec VPN Client Release Notes for Version 4.2.0
StoneGate IPsec VPN Client Release Notes for Version 4.2.0 Created: July 24, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Compatibility... 4 IPsec Compliance... 4
More informationQuick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile
More information1 About this document Getting started Text input Network connection Network sharing (Certain models only)...
User Guide EMUI 3.1 1 About this document... 1 2 Getting started... 2 Locking and unlocking the screen... 2 Notification and status icons... 2 Common keys... 2 Shortcut operations... 3 Dual windows gestures...
More informationCompliance Manager ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationStonesoft IPsec VPN Client. Release Notes for Version 5.4.1
Stonesoft IPsec VPN Client Release Notes for Version 5.4.1 Updated: April 14, 2014 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 System Requirements... 3 General Requirements... 3 Operating
More informationStoneGate SSL VPN Release Notes for Version 1.2.1
StoneGate SSL VPN Release Notes for Version 1.2.1 Created: February 25, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationipad in Business Deployment Scenarios and Device Configuration Overview April 2010 Microsoft Exchange IMAP, CalDAV, and LDAP
ipad in Business Deployment Scenarios and Device Configuration Overview April 00 Learn how ipad integrates seamlessly into enterprise environments with these deployment scenarios and the device configuration
More informationStonesoft Management Center. Release Notes for Version 5.6.1
Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More informationHUAWEI H30-U10. Quick Start Guide
HUAWEI H30-U10 Quick Start Guide Dual card dual standby single pass Your phone supports only dual card dual standby single pass, which means you cannot use both SIM cards for calls or data services simultaneously.
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationSecure & Seamless Remote Device Management
White Paper Secure & Seamless Remote Device Management Table of Contents 1. The purpose of this document 2 2. What is a SiteManager? 2 3. Typical Installation 3 4. How is Security ensured in the Production
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationStoneGate SSL VPN Release Notes for Version 1.2.0
StoneGate SSL VPN Release Notes for Version 1.2.0 Created: November 6, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...
More informationStoneGate SSL VPN. Release Notes for Version 1.4.5
StoneGate SSL VPN Release Notes for Version 1.4.5 Created: March 3, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 System Requirements... 4 StoneGate Appliances... 4 Build Version...
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationBring Your Own Device
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of
More informationStoneGate SSL VPN Release Notes for Version 1.3.1
StoneGate SSL VPN Release Notes for Version 1.3.1 Created: July 29, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility... 5 Upgrade
More informationStoneGate IPsec VPN Client Release Notes for Version 5.0.0
StoneGate IPsec VPN Client Release Notes for Version 5.0.0 Created: April 30, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationTerms of Use. Changes. General Use.
Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationKACE GO Mobile App 5.0. Release Notes
KACE GO Mobile App 5.0 Release Notes Table of Contents Quest KACE GO 5.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...
More informationSECURE, CENTRALIZED, SIMPLE
1 SECURE, CENTRALIZED, SIMPLE Multi-platform Enterprise Mobility Management Whitepaper 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is an end-to-end, multi-platform, device,
More informationStoneGate IPsec VPN Client Release Notes for Version 4.3.1
StoneGate IPsec VPN Client Release Notes for Version 4.3.1 Created: October 13, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationBRING YOUR OWN DEVICE: POLICY CONSIDERATIONS
WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,
More informationEndpoint Protection with DigitalPersona Pro
DigitalPersona Product Brief Endpoint Protection with DigitalPersona Pro An introductory technical overview to DigitalPersona s suite for Access Management, Data Protection and Secure Communication. April
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep
More informationStonesoft Firewall/VPN Express. Release Notes for Version 5.5.1
Stonesoft Firewall/VPN Express Release Notes for Version 5.5.1 Created: July 26, 2013 Table of Contents What s New... 3 Enhancements in Firewall/VPN Express... 3 Fixes... 3 System Requirements... 5 Stonesoft
More informationUser Guide EMUI / 3.1
User Guide EMUI 3.0.5 / 3.1 1 About this document... 1 2 Getting started... 2 Locking and unlocking the screen... 2 Notification and status icons... 2 Common keys... 2 Home screen operations... 3 3 Text
More informationHG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.
HG658d Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway V100R001 User Guide Issue 01 Date 2013-07-23 Part Number 202633 Huawei Technologies Co., Ltd. provides customers with comprehensive
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More informationStartup guide. Xperia C2305. Sony Mobile Communications AB SE Lund, Sweden
Startup guide Xperia C2305 Sony Mobile Communications AB SE-221 88 Lund, Sweden www.sonymobile.com 1271-4312.1 Welcome Important Information Before you use your device, please read the Important Information
More informationSophos Mobile in Central
startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationStoneGate IPsec VPN Client Release Notes for Version 5.0.1
StoneGate IPsec VPN Client Release Notes for Version 5.0.1 Created: July 2, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...
More informationStoneGate Firewall/VPN How-To Installing and Activating StoneGate FW/VPN in VMware ESX Server
StoneGate Firewall/VPN How-To Installing and Activating StoneGate FW/VPN in VMware ESX Server Created: June 11, 2008 Table of Contents Introduction to Installing and Activating StoneGate FW/VPN in VMware
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide Using RADIUS Protocol for F5 BIG-IP Access Policy Manager All information herein is either public information or is the property of and owned solely by
More informationCompliance Manager ZENworks Mobile Management 3.0.x January 2015
www.novell.com/documentation Compliance Manager ZENworks Mobile Management 3.0.x January 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationSafeNet Authentication Client
SafeNet Authentication Client Compatibility Guide All information herein is either public information or is the property of and owned solely by Gemalto. and/or its subsidiaries who shall have and keep
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationNotifyMDM Device Application User Guide Installation and Configuration for Android
NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from
More informationKACE GO Mobile App 3.1. Release Notes
KACE GO Mobile App 3.1 Release Notes Table of Contents Quest KACE GO 3.1 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance (K1000) administrators...
More informationStonesoft Firewall/VPN Express. Release Notes for Version 5.5.4
Stonesoft Firewall/VPN Express Release Notes for Version 5.5.4 Created: December 17, 2013 Table of Contents What s New... 3 Fixes... 3 System Requirements... 4 Stonesoft Firewall/VPN Appliances... 4 Build
More informationEnterprise solution comparison chart
Enterprise solution comparison chart This quick reference compares supported and features across, Enterprise Service,, and. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs
More informationIntune Policies Guide
TechReady Are you ready to implement IT solutions? Intune Policies Guide Mobile Device Management with Enterprise Mobility Suite Created for: TechReady 15 September 2016 Version 0.3 Created by: Adrian
More informationRelease Notes Version 4.1 BlackBerry 7100g BlackBerry 7290 Wireless Handheld
f Release Notes Version 4.1 BlackBerry 7100g BlackBerry 7290 Wireless Handheld NOTE This document is provided for informational purposes only, and does not constitute a binding legal document unless specifically
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly
More informationKACE GO Mobile App 5.0. Getting Started Guide
KACE GO Mobile App 5.0 Getting Started Guide Table of Contents Using the KACE GO Mobile App...3 Getting Started...3 What features are included in this version of the KACE GO Mobile App?...3 How do I access
More informationRealPresence CloudAXIS Suite Release Notes
RELEASE NOTES Software 1.1 April 2013 3725-03317-001 Rev A RealPresence CloudAXIS Suite Release Notes Trademarks 2013, Polycom, Inc. All rights reserved. POLYCOM, the Polycom logo and the names and marks
More informationWhat s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services
What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services September 2017 Introduction This document is a summary of what s new in ios 11, macos
More informationXperia TM. in Business. Xperia Configurator Cloud. The management tool by Sony Mobile Communications for swift and secure deployment of mobile devices
Xperia TM in Business Xperia Configurator Cloud The management tool by Sony Mobile Communications for swift and secure deployment of mobile devices April 2018 ABOUT THIS DOCUMENT Products covered This
More informationLiveView micro display Extended User guide
LiveView micro display Extended User guide Contents Introduction...3 LiveWare manager...4 Before you download applications from Android Market...5 Barcode...6 LiveView application...7 LiveView overview...8
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationLinksys EA-Series Routers
Routers Table of Contents Table of Contents Product overview EA2700/EA3500 Back view Bottom view EA4500 Top view Back view Setting Up Your EA-Series Router Where to find more help How to set up your router
More informationStonesoft SSL VPN. Release Notes for Version 1.5.3
Stonesoft SSL VPN Release Notes for Version 1.5.3 Created: December 1, 2011 Table of Contents What s New... 3 New Features... 3 Enhancements... 3 Fixes... 3 System Requirements... 4 Stonesoft Appliances...
More informationStonesoft Firewall/VPN Express. Release Notes for Version 5.5.2
Stonesoft Firewall/VPN Express Release Notes for Version 5.5.2 Created: September 24, 2013 Table of Contents What s New... 3 Fixes... 3 System Requirements... 4 Stonesoft Firewall/VPN Appliances... 4 Build
More informationStoneGate SSL VPN. Release Notes for Version 1.5.0
StoneGate SSL VPN Release Notes for Version 1.5.0 Created: August 10, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 System Requirements... 4 StoneGate Appliances... 4 Build Version...
More informationVMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments
VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback
More informationSophos Mobile in Central
startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT
More informationOneBridge Mobile Groupware 5.0
OneBridge Mobile Groupware 5.0 release overview Extended Systems 5777 North Meeker Avenue Boise, ID 83713 Tel: (800) 235-7576 (208) 322-7800 Fax: (208) 327-5004 Web: www.extendedsystems.com Rev. 1005 Legal
More informationVMware Boxer Comparison Matrix for IBM Notes Traveler Compare the features supported by VMware Boxer and AirWatch Inbox
VMware Boxer Comparison Matrix for IBM Notes Traveler Compare the features supported by VMware Boxer and AirWatch Inbox Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback
More information