WHITE PAPER. Good Mobile Intranet Technical Overview

Size: px
Start display at page:

Download "WHITE PAPER. Good Mobile Intranet Technical Overview"

Transcription

1 WHITE PAPER Good Mobile Intranet

2 CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management

3 Introduction Good Mobile Intranet brings the power of your corporate intranet and enterprise information to your mobile personnel when and where they need it 1. By empowering mobile users with interactive access to mission-critical systems intranets and enterprise applications that have been web-formatted for Good Mobile Intranet Good Mobile Intranet increases the ROI of your existing IT investments. Good understands that mobile solution must have more than just features. Mobile solutions must provide a user experience that is easy and productive before they will be adopted and, ideally, embraced. Key features of Good Mobile Intranet include: Intuitive user interface. Users can get started quickly and become as productive while mobile as they are in the office. Online and offline productivity. Users can be kept in the loop whether in or out of coverage, since information can be pushed or broadcasted to mobile handhelds for review at the user s convenience. 1 Good Mobile Intranet is only available for Good Mobile Messaging for Microsoft Exchange. Enterprise class security. Good Mobile Intranet leverages the same security infrastructure as Good Mobile Messaging to connect to systems residing behind the firewall and to transport information securely through the Good Network Operations Center. Good Mobile Intranet also has NTLM authentication. Ease of management. Good Mobile Intranet can be installed and updated using Good Secure OTA (Over-the-Air), completely wirelessly, while day to day management is easy with the Good Mobile Intranet management console. Exchange Domino Good Messaging Server External Web Site Intranet Web-based CRM Other Good Mobile Intranet Server Good Network Operations Center WAN and Wi-Fi networks Handhelds with Good client 1 Good Mobile Intranet

4 GOOD MOBILE INTRANET OVERVIEW Good Mobile Intranet provides wireless access to myriad sources of enterprise information, including intranets and applications like CRM (customer relationship management) that have been specifically web-formatted for use with Good Mobile Intranet. Good Mobile Intranet enables companies to extend valuable data to mobile users through a complete platform, including the Good Mobile Intranet Client and Server, administration tools and support for a broad range of open standards and technologies. Working with your Good Mobile Messaging Server and applications, the Good Mobile Intranet system includes: Good Mobile Intranet Server for handling requests from Good Mobile Intranet Clients and managing interactions with Web sites and Web-enabled backend systems. Good Mobile Intranet Client running on wireless handhelds for requesting and submitting data. Good Mobile Intranet Server Console allowing remote administration of users, policies and pushes. Unlike micro-browsers, Good Mobile Intranet is optimized for accessing data over today s wireless networks and doesn t require a continuous connection. Mobile users can request or submit information quickly and easily by using Good Mobile Intranet applications on a handheld, and receive responses while working on other tasks. Users can also save and later view information offline to maximize productivity. Additionally, unlike browsers, Good Mobile Intranet provides secure connectivity behind the corporate firewall, automatically incorporating your enterprise s security policies. Corporate developers can use standard Web tools to adapt and extend existing applications for use with Good Mobile Intranet, since Good Mobile Intranet is capable of rendering HTML, ASP, JSP, CHTML, XHTML, and WML content. Also, custom or non API-enabled backend systems can be accessed via a number of techniques such as light Visual Studio.NET programming and.asp page creation; and then accessed directly with Good Mobile Intranet. Using Good Mobile Intranet to access enterprise applications is simple and fast users click one URL link to access a Good Mobile Intranet form-based application and they can then begin using it immediately. In addition to user-initiated data access, the Good Mobile Intranet system enables administrators to configure and proactively push messages, Web pages and other documents to users handhelds. 2 Good Mobile Intranet

5 The Good Mobile Intranet system is built with Java Server technology and it includes the following: Good Mobile Intranet Server Console The server includes an HTTP-based management interface for server administration. You can access the console interface from any host on your network that runs Internet Explorer or from a Good Mobile Intranet handheld (if you have the appropriate access permissions). Push Management The server includes a Push Management system to submit, cancel and view the status of pushed messages. Wireless Network Subsystem This server subsystem controls wireless transmissions between the server and the handheld. This subsystem communicates with the Good Secure Operations Center to ensure continuous, reliable message delivery. Logging Subsystem The server supports an extensive logging facility you can use to view detailed server activity as well as troubleshoot problems that may occur. The server includes an intelligent XSLT transformation engine for conversion of Web page content. You can develop your own applications to take advantage of these built-in transformations or create transformations of your own. 3 Good Mobile Intranet

6 Security Infrastructure The Good System has been specifically designed to meet the security needs of even the largest, most security-sensitive corporations. It provides an end-to-end system designed to protect corporate information at all times even while it is being transmitted over the wireless network and while it resides on the handheld. The Good System combines industry security standards, such as AES, with Good s own security technologies. Plus, installation of Good applications does not require any modifications to your firewall and allows you to leverage your existing network security infrastructure. Good Mobile Intranet leverages the same infrastructure as Good Mobile Messaging and offers a complete, encrypted, end-to-end secure system. First, a unique encryption key is generated and maintained for each user and stored on the handheld. Good Technology uses advanced encryption technology standards to encrypt and decrypt all messages and transmissions exchanged between the backend enterprise application and the handheld. Second, data flows between Good Mobile Intranet Server and the Good Secure Operations Center over the Internet using the HTTPS protocol. HTTPS provides secure communications through corporate firewalls using SSL. In this communication scheme, the Good Secure Operations Center, which is identified by its URL, can be thought of as the server and Good Mobile Intranet Server as its client in a client/server relationship over the Internet. Through the use of master/session key pairs, the Good System updates keys wirelessly without compromising the security of the system. New session keys are generated every 30 days and encrypted using the master key, then are sent to the handheld wirelessly and automatically installed. Messages that are sent before the new key was deployed are decrypted with the prior key, while all messages that follow the arrival of the new key are decrypted using it. For handheld security, Good provides the ability to centrally set password policies that are enforced on all handhelds connected to the Good Mobile Messaging/Good Mobile Intranet Server. And if a handheld is lost or stolen, IT administrators can remotely erase applications and data on the handheld including Good Mobile Messaging or Good Mobile Intranet data that may have been stored or backed up on a memory or SD card. Please see the Good Security White Paper for additional information about the Good security architecture for Good Mobile Messaging and Good Mobile Intranet. 4 Good Mobile Intranet

7 COOKIES To improve application performance, Good Mobile Intranet manages cookies on the server instead of sending them to destination handhelds. So when a handheld makes a request to a Web site, the server checks to see if there is a cookie associated with that handheld stored for that site or application. If the server has the =cookie for the request, it sends the cookie as part of the handheld s HTTP request. Since no OTA time is used transmitting cookies, server-side cookies improve application performance. In addition, server-managed cookies save time by following all HTTP redirects that include cookies and automatically taking care of Web logins requiring cookies. And since cookie data is stored in the server s database, users can clear cookies stored on the handheld. AUTHENTICATION Good Mobile Intranet also allows mobile users to authenticate to a variety of Web servers, such as HTTP Basic, using NT LAN Manager (NTLM)-based authentication all right from their handhelds. If a user requests information from a Web server and that information has been protected using authentication, the Web server sends an Authentication Required header with the response to the request. This notifies the client that user credentials must be supplied in order for the resource to be returned as requested. Good Mobile Intranet passes the authentication information back to the handheld and then the user is prompted to enter a user name and password. Once the user name and password are entered, the request is sent back with the required credentials to the Web server. This information is kept by the client for future use. Meaning, when the user accesses the same domain, the credentials are retained and the user is not prompted again for authentication for the remainder of the session. However, handheld users can manually clear HTTP basic authentication through the Good Mobile Intranet client interface. 5 Good Mobile Intranet

8 Push Sometimes you need to get important information to your mobile users, information that they might not yet know they need. Good Mobile Intranet includes push functionality that enables system administrators to proactively broadcast Web pages and documents to mobile users. Good Mobile Intranet s push capability is useful for distributing company or industry news and alerts; sales information, like new leads or updated price lists; field service information like trouble tickets; or other information like reports or management metrics. URLs and documents can be pushed on a scheduled basis, or administrators that have access rights to the Good Mobile Intranet Server Console can execute one-time, ad-hoc pushes when required. The process flow for Good Mobile Intranet push is: Push Initiator Step 8: Optional delivery notification. Step 1: Push is initiated. Step 2: Server responds. Step 3: Contents stored in database. Good Mobile Step 4: Retrieved for delivery. Database: Pending Push Messages Step 5: Handheld requests content from the server. Step 6: Server delivers content to handheld. Step 7: Handheld acknowledges receipt. Good Mobile Intranet on Handheld 1. Push is initiated by the system administrator. Push documents can be traditional file attachments (such as Word, Excel or PDF documents), HTML Web pages or URL locations that contain intranet links and HTML content and so on. Administrators can deliver push messages as needed or on a pre-defined scheduled basis. 2. Contents of a push are stored in a database on the Good Mobile Intranet Server. 3. Push content is retrieved for delivery. Push documents can be downloaded and received as a background process, so a user s workflow is not interrupted. For important, immediate notification, administrators can send a push alert, which automatically takes priority on a user handheld. 4. When a user attempts to open a pushed page or document, the Good Mobile Intranet Client requests content from server. If the user receiving a push document or alert is out of coverage, the push is queued on the server until coverage is restored. 5. Handheld acknowledges receipt of the push. Server queuing and handheld acknowledgement guarantee and confirm push delivery. 6. Optional delivery notification is sent. 6 Good Mobile Intranet

9 Transformations Most desktop, intranet and Internet applications do not render well or at all on mobile handhelds. Good Mobile Intranet accommodates that problem. Where the target application is accessed via a URL, the Good Mobile Intranet Server includes a set of transformations you can use to integrate applications with Good Mobile Intranet. These transformations enable you to take new or existing Web client architected applications and optimize them for user handhelds. In the following figure, you can see how the same site is rendered on the desktop and through Good Mobile Intranet. Transformations can be used on a specific page, a domain or all pages in a site. They also enable you to filter information before it reaches the handheld so users get the information they need in an attractive display. During transformations, the Good Mobile Intranet Transform Engine parses through HTML to find specific items, remove items or rewrite them according to the logic of the transformation. For example, Good Mobile Intranet can process a Web application to remove graphics or simplify table layouts. The Good Mobile Intranet-defined transformations control the layout of the output documents and where to access data within the input document. This saves on bandwidth, makes applications perform faster and provides a much more usable experience on the handheld. Transformations reside on the server, so all the heavy-duty processing is done by the server instead of the handheld. This enables more efficient downloads and faster application processing on the handheld. Transformations work for most public Web sites as well as your corporate intranets and Web-architected enterprise applications. 7 Good Mobile Intranet

10 Differential Data To reduce transmission time, Good Mobile Intranet Server supports differential-data transmission. If differential-data transmission is enabled, the server maintains a cache of the documents it sends to individual handhelds. When a Good Mobile Intranet browser on the handheld sends an HTTP request for a document, the response comes back to Good Mobile Intranet Server which automatically checks its differential data to see if the document requested is a newer version of a document previously sent to the handheld. If it is, the server compares the two versions and sends only the changes to the handheld. A similar process happens when Good Mobile Intranet Server receives the updated version of a push message. Before sending it to the handheld, the server compares it to the previous version of the push message and sends only the updated portion of the message to the handheld. When the Good Mobile Intranet handheld receives differential data from the server, it updates the document with new content, so both the server and the handheld have the latest versions. So what you save with differential data is the transmission time and not outdated versions of data. Good Mobile Intranet Server Management Good Mobile Intranet Server includes an HTML interface, called the Good Mobile Intranet Server Console, for managing the Good Mobile Intranet Server via a standard Web browser. TRAFFIC The traffic page of the server console displays the amount of HTTP traffic sent between wireless handhelds and Good Mobile Intranet Server. This page is useful for comparing network traffic activity over hourly, daily or weekly periods. LOG FILES Good Mobile Intranet Server includes both production logs and diagnostics logs. With the exception of the Access log, production logs are enabled by default and cannot be disabled, while diagnostic logs are disabled by default and can be enabled if desired. The server also sends logging information to the Event log. By accessing the server console, you can see what logs are currently enabled as well as enable or disable logging for server components. 8 Good Mobile Intranet

11 SITE ACCESS Sometimes it is necessary to limit your users access to sites. With the Site Access of the Good Mobile Intranet Server console, you can: Set the default home page for handhelds. Map the host name received in a URL to a different host name (Host substitution). Map the path following the host name in a URL to a different path (URL substitution). URL substitution in combination with host substitution makes it possible to fully change the URL that a wireless handheld requests without reconfiguring the handheld. This can be useful, for example, if you want to change the server host. Proxy and per-user proxy management. PUSH ADMINISTRATION The Good Mobile Intranet Server Console provides a graphical user interface for sending and managing push messages. You can use the console to view the status of push messages, send new messages, generate push reports and set push administration options. USER MANAGEMENT Once users have been enabled on the Good Mobile Messaging Management Console, they will be displayed on the Users page in the Good Mobile Intranet Server Console. With the console tool, you will be able to add, delete and manage Good Mobile Intranet users centrally and easily. Good Technology, Inc. All rights reserved. Good, Good Technology, the Good logo, Good Mobile Messaging, Good Mobile Intranet, and Powered by Good are trademarks of Good Technology, Inc. MOTOROLA and the Stylized M Logo are registered in the U.S. Patent and Trademark Office. All other trademarks are the property of their respective owners. Screen image simulated. Rev Good Mobile Intranet

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

BlackBerry 101: An Introduction to the BlackBerry Wireless Solution

BlackBerry 101: An Introduction to the BlackBerry Wireless Solution BlackBerry 101: An Introduction to the BlackBerry Wireless Solution BlackBerry 101 Agenda What is the BlackBerry Enterprise Solution? Tracing a Message Security, Security, Security Enabling the User Extensibility:

More information

Developer Case Study. BlackBerry Streamlines IT Change Request Approval Process. Industry Healthcare

Developer Case Study. BlackBerry Streamlines IT Change Request Approval Process. Industry Healthcare Developer Case Study BlackBerry Streamlines IT Change Request Approval Process Situation In 2005, the Baylor IT department reviewed their change management policy and updated their web-based change control

More information

BlackBerry Integration With IBM WebSphere Everyplace Access 4.3

BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 Integration Note Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Integration overview... 3 Related resources...

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

VMware AirWatch tvos Platform Guide Deploying and managing tvos devices

VMware AirWatch tvos Platform Guide Deploying and managing tvos devices VMware AirWatch tvos Platform Guide Deploying and managing tvos devices AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Application Security for Java-based BlackBerry Handhelds

Application Security for Java-based BlackBerry Handhelds Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity

More information

DeltaV Mobile. Introduction. Product Data Sheet September DeltaV Distributed Control System

DeltaV Mobile. Introduction. Product Data Sheet September DeltaV Distributed Control System DeltaV Distributed Control System Product Data Sheet September 2017 DeltaV Mobile Make faster and better decisions with secure, read-only access to your critical operational data, whenever and wherever

More information

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

Developing Custom Solutions to Extend your Data Wirelessly

Developing Custom Solutions to Extend your Data Wirelessly An IT Briefing produced by Developing Custom Solutions to Extend your Data Wirelessly 2003 TechTarget This reference document is based on a Research In Motion/TechTarget Webcast, "." To view the Webcast

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL

More information

WAM!NET Direct! SM. Service Description

WAM!NET Direct! SM. Service Description WAM!NET Direct! SM Service Description INTRODUCTION The Direct! Service is a subscription based content delivery service that provides customers with the ability to send, receive, and track digital files

More information

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

BlackBerry Enterprise Server Express for IBM Lotus Domino

BlackBerry Enterprise Server Express for IBM Lotus Domino BlackBerry Enterprise Server Express for IBM Lotus Domino Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411011002-001 Contents 1 Overview: BlackBerry

More information

BlackBerry Enterprise Server Express for Microsoft Exchange

BlackBerry Enterprise Server Express for Microsoft Exchange BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411010819-001 Contents 1 Overview: BlackBerry

More information

Architecture and Governance with SharePoint for Internet Sites. Ashish Bahuguna Kartik Shah

Architecture and Governance with SharePoint for Internet Sites. Ashish Bahuguna Kartik Shah Architecture and Governance with SharePoint for Internet Sites Ashish Bahuguna ashish.bauguna@bitscape.com Kartik Shah kartik.shah@bitscape.com Agenda Web Content Management Architecture Information Architecture

More information

1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood

1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood TM 1100 Dexter Avenue N Seattle, WA 98109 206.691.5555 www.netmotionwireless.com NetMotion Mobility Architecture A Look Under the Hood NetMotion Mobility Architecture A Look Under the Hood Wireless networking

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

VMware Workspace ONE UEM Apple tvos Device Management. VMware Workspace ONE UEM 1811 VMware AirWatch

VMware Workspace ONE UEM Apple tvos Device Management. VMware Workspace ONE UEM 1811 VMware AirWatch VMware Workspace ONE UEM Apple tvos Device Management VMware Workspace ONE UEM 1811 VMware AirWatch You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

BlackBerry Java Development Environment (JDE)

BlackBerry Java Development Environment (JDE) 1 BlackBerry Java Applications for Accessing SAP Applications BlackBerry Java Development Environment The BlackBerry Java Development Environment (JDE) is a fully integrated development and simulation

More information

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout

More information

DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com

DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com By Bill Appleton, CTO, DreamFactory Software billappleton@dreamfactory.com Introduction DreamFactory

More information

BlackBerry Mobile Data System

BlackBerry Mobile Data System BlackBerry Mobile Data System TM BlackBerry Mobile Data System dramatically reduces the amount of time and resources required to develop and deploy wireless applications for mobile workers. BlackBerry

More information

Application Notes for Integrating Vitel Software s Ivize Reporting Package with Avaya Communication Manager - Issue 1.0

Application Notes for Integrating Vitel Software s Ivize Reporting Package with Avaya Communication Manager - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Integrating Vitel Software s Ivize Reporting Package with Avaya Communication Manager - Issue 1.0 Abstract These Application Notes describe

More information

JUNIPER NETWORKS PRODUCT BULLETIN

JUNIPER NETWORKS PRODUCT BULLETIN PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable

More information

Aventail WorkPlace. User s Guide Version 8.7.0

Aventail WorkPlace. User s Guide Version 8.7.0 Aventail WorkPlace User s Guide Version 8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile, Aventail Connect Tunnel,

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

Control-M and Payment Card Industry Data Security Standard (PCI DSS) Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M

More information

Top Reasons to Upgrade

Top Reasons to Upgrade version 5.0 Top Reasons to Upgrade With the latest release of the BlackBerry Enterprise Server software, your organization gains new administrative features, built-in high availability to maximize system

More information

Application Notes for Integrating Vitel Ivize with Avaya Modular Messaging - Issue 1.0

Application Notes for Integrating Vitel Ivize with Avaya Modular Messaging - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Integrating Vitel Ivize with Avaya Modular Messaging - Issue 1.0 Abstract These Application Notes describe the configuration steps for integrating

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA   White Paper Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Enhancing VMware Horizon View with F5 Solutions

Enhancing VMware Horizon View with F5 Solutions Enhancing VMware Horizon View with F5 Solutions VMware Horizon View is the leading virtualization solution for delivering desktops as a managed service to a wide range of devices. F5 BIG-IP devices optimize

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

AppSpider Enterprise. Getting Started Guide

AppSpider Enterprise. Getting Started Guide AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account

More information

Xerox Mobile Print Solution

Xerox Mobile Print Solution Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright

More information

McAfee Security Management Center

McAfee Security Management Center Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

PROService REMOTE SERVICE APPLICATION. Frequently asked questions

PROService REMOTE SERVICE APPLICATION. Frequently asked questions PROService REMOTE SERVICE APPLICATION Frequently asked questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman Coulter s remote

More information

Dell SonicWALL Aventail Connect Tunnel User s Guide

Dell SonicWALL Aventail Connect Tunnel User s Guide Dell SonicWALL Aventail 10.6.2 Connect Tunnel User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Deploying ipad to Patients

Deploying ipad to Patients Deploying ipad to Patients Setup Guide Contents Overview Getting Prepared Evaluate your infrastructure Create a configuration Automate device setup Distribute apps In-Room Storage Initial setup Reset your

More information

Cisco Content Transformation Engine (CTE) 1400 Series Configuration Note

Cisco Content Transformation Engine (CTE) 1400 Series Configuration Note Cisco Content Transformation Engine (CTE) 1400 Series Configuration Note Product Number: CTE-1400 This publication contains the procedures for configuring the Cisco Content Transformation Engine (CTE)

More information

IIS Installation for.net Application. Md. Saifullah Al Azad

IIS Installation for.net Application. Md. Saifullah Al Azad IIS Installation for.net Application Md. Saifullah Al Azad Contents 1 Mimimal... 2 1.1 Common HTTP Features... 2 1.1.1 Static Content... 2 1.1.2 Default Document... 2 1.2 Application Development... 2 1.2.1

More information

Kodiak Broadband PTT

Kodiak Broadband PTT Kodiak Broadband PTT Re-defining PTT Communications MOTOROLA SOLUTIONS and KODIAK are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. This document is not an offer, commitment,

More information

Solutions Business Manager Web Application Security Assessment

Solutions Business Manager Web Application Security Assessment White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security

More information

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access

More information

Entrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014

Entrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014 Entrust Discovery 2.4 Administration Guide Document issue: 3.0 Date of issue: June 2014 Copyright 2010-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust, Inc.

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Dell OpenManage Mobile Version 1.0 User s Guide

Dell OpenManage Mobile Version 1.0 User s Guide Dell OpenManage Mobile Version 1.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Connectware Manager Getting Started Guide

Connectware Manager Getting Started Guide Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi

More information

The Challenge. The Solution. The Modern Approach to Remote Access

The Challenge. The Solution. The Modern Approach to Remote Access Datasheet BlackBerry Access: Windows 10 and macos The Challenge Modern businesses consist of not only full-time employees, but users such as contractors, seasonal workers, remote workers, and partners.

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

GoToMyPC Corporate Product Guide

GoToMyPC Corporate Product Guide GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center

More information

Deploying ipad to Patients Setup Guide

Deploying ipad to Patients Setup Guide Deploying ipad to Patients Setup Guide Contents Overview Getting Prepared Evaluate your infrastructure Create a configuration Automate device setup Distribute apps In-Room Storage Initial setup Reset your

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Workspace Secure Container for Mobile Devices

Workspace Secure Container for Mobile Devices Workspace Secure Container for Mobile Devices Version 1.1 Last Updated: April 24, 2014 2014 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon

More information

DeltaV Mobile. Introduction. Product Data Sheet November DeltaV Distributed Control System

DeltaV Mobile. Introduction. Product Data Sheet November DeltaV Distributed Control System DeltaV Distributed Control System Product Data Sheet November 2018 DeltaV Mobile Make faster and better decisions with secure, read-only access to your critical operational data, whenever and wherever

More information

AT&T Connect Communications Center (ACC) User Guide Enterprise Edition Version 8.9 May 2010

AT&T Connect Communications Center (ACC) User Guide Enterprise Edition Version 8.9 May 2010 AT&T Connect Communications Center (ACC) User Guide Enterprise Edition Version 8.9 May 2010 2009 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained

More information

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS

Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS We are the only company to integrate disk, tape, and replication in a single solution set for better near-term

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

MSM320, MSM410, MSM422, MSM430,

MSM320, MSM410, MSM422, MSM430, Polycom VIEW Certified Configuration Guide Hewlett-Packard MSM710/720/760/765 Wireless LAN Controller With MSM310, MSM320, MSM410, MSM422, MSM430, MSM46x APs September 2012 1725-36068-001 Rev H Trademarks

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

device management solution

device management solution MSP4: the COmprehensive mobile device management solution built FOR a BYOD world Motorola Solutions Services Get all the information you need to troubleshoot the mobile devices your enterprise owns as

More information

VMware AirWatch Tizen Guide

VMware AirWatch Tizen Guide VMware AirWatch Tizen Guide AirWatch v8.4 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected

More information

Quick Install & Troubleshooting Guide. WAP223NC Cloud Managed Wireless N Access Point

Quick Install & Troubleshooting Guide. WAP223NC Cloud Managed Wireless N Access Point Quick Install & Troubleshooting Guide WAP223NC Cloud Managed Wireless N Access Point Package Contents 1 x WAP223NC Indoor access point powered by CloudCommand 1 x wall and ceiling mounts 1 x 24V PoE power

More information

An Oracle Technical White Paper May Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications

An Oracle Technical White Paper May Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications An Oracle Technical White Paper May 2010 Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications Introduction... 2 Solution Overview... 3 BlackBerry Infrastructure... 4 BlackBerry

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER Deploying the BIG-IP LTM system for BEA WebLogic Server F5 Networks and BEA systems have created a highly effective way to direct traffic

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Increase user productivity and security by integrating identity management and enterprise single sign-on solutions.

Increase user productivity and security by integrating identity management and enterprise single sign-on solutions. Security management solutions White paper Increase user productivity and security by integrating identity management and enterprise single sign-on solutions. April 2006 2 Contents 2 Overview 3 Rely on

More information

Welcome to First Security Mobile

Welcome to First Security Mobile Welcome to First Security Mobile Frequently Asked Questions Questions General How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a data plan? I'm not enrolled

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

BlackBerry Mobile Voice System

BlackBerry Mobile Voice System BlackBerry Mobile Voice System BlackBerry Mobile Voice System Mobile Unified Communications Mobile Voice System ( MVS) is designed to unify desk phone features on smartphones and Wi-Fi networks to optimize

More information

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access)

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource

More information

MigrationWiz Security Overview

MigrationWiz Security Overview MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

WX CENTRAL MANAGEMENT SYSTEM

WX CENTRAL MANAGEMENT SYSTEM DATASHEET WX CENTRAL MANAGEMENT SYSTEM Product Overview When it comes to WAN optimization, visibility into the distributed enterprise is absolutely critical to understand how applications are performing,

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Cisco Prime Home 5.1 Technical

Cisco Prime Home 5.1 Technical Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new

More information

USER GUIDE Summer 2015

USER GUIDE Summer 2015 USER GUIDE Summer 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may be used

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

BlackBerry Enterprise Server for Microsoft Exchange

BlackBerry Enterprise Server for Microsoft Exchange BlackBerry Enterprise Server for Microsoft Exchange Version 3.5 Service Pack 1 Hotfix 2 December 2002 PLEASE READ THE LEGAL NOTICES SET OUT AT THE END OF THIS DOCUMENT. This document provides information

More information