WHITE PAPER. Good Mobile Intranet Technical Overview
|
|
- Duane Jacobs
- 5 years ago
- Views:
Transcription
1 WHITE PAPER Good Mobile Intranet
2 CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management
3 Introduction Good Mobile Intranet brings the power of your corporate intranet and enterprise information to your mobile personnel when and where they need it 1. By empowering mobile users with interactive access to mission-critical systems intranets and enterprise applications that have been web-formatted for Good Mobile Intranet Good Mobile Intranet increases the ROI of your existing IT investments. Good understands that mobile solution must have more than just features. Mobile solutions must provide a user experience that is easy and productive before they will be adopted and, ideally, embraced. Key features of Good Mobile Intranet include: Intuitive user interface. Users can get started quickly and become as productive while mobile as they are in the office. Online and offline productivity. Users can be kept in the loop whether in or out of coverage, since information can be pushed or broadcasted to mobile handhelds for review at the user s convenience. 1 Good Mobile Intranet is only available for Good Mobile Messaging for Microsoft Exchange. Enterprise class security. Good Mobile Intranet leverages the same security infrastructure as Good Mobile Messaging to connect to systems residing behind the firewall and to transport information securely through the Good Network Operations Center. Good Mobile Intranet also has NTLM authentication. Ease of management. Good Mobile Intranet can be installed and updated using Good Secure OTA (Over-the-Air), completely wirelessly, while day to day management is easy with the Good Mobile Intranet management console. Exchange Domino Good Messaging Server External Web Site Intranet Web-based CRM Other Good Mobile Intranet Server Good Network Operations Center WAN and Wi-Fi networks Handhelds with Good client 1 Good Mobile Intranet
4 GOOD MOBILE INTRANET OVERVIEW Good Mobile Intranet provides wireless access to myriad sources of enterprise information, including intranets and applications like CRM (customer relationship management) that have been specifically web-formatted for use with Good Mobile Intranet. Good Mobile Intranet enables companies to extend valuable data to mobile users through a complete platform, including the Good Mobile Intranet Client and Server, administration tools and support for a broad range of open standards and technologies. Working with your Good Mobile Messaging Server and applications, the Good Mobile Intranet system includes: Good Mobile Intranet Server for handling requests from Good Mobile Intranet Clients and managing interactions with Web sites and Web-enabled backend systems. Good Mobile Intranet Client running on wireless handhelds for requesting and submitting data. Good Mobile Intranet Server Console allowing remote administration of users, policies and pushes. Unlike micro-browsers, Good Mobile Intranet is optimized for accessing data over today s wireless networks and doesn t require a continuous connection. Mobile users can request or submit information quickly and easily by using Good Mobile Intranet applications on a handheld, and receive responses while working on other tasks. Users can also save and later view information offline to maximize productivity. Additionally, unlike browsers, Good Mobile Intranet provides secure connectivity behind the corporate firewall, automatically incorporating your enterprise s security policies. Corporate developers can use standard Web tools to adapt and extend existing applications for use with Good Mobile Intranet, since Good Mobile Intranet is capable of rendering HTML, ASP, JSP, CHTML, XHTML, and WML content. Also, custom or non API-enabled backend systems can be accessed via a number of techniques such as light Visual Studio.NET programming and.asp page creation; and then accessed directly with Good Mobile Intranet. Using Good Mobile Intranet to access enterprise applications is simple and fast users click one URL link to access a Good Mobile Intranet form-based application and they can then begin using it immediately. In addition to user-initiated data access, the Good Mobile Intranet system enables administrators to configure and proactively push messages, Web pages and other documents to users handhelds. 2 Good Mobile Intranet
5 The Good Mobile Intranet system is built with Java Server technology and it includes the following: Good Mobile Intranet Server Console The server includes an HTTP-based management interface for server administration. You can access the console interface from any host on your network that runs Internet Explorer or from a Good Mobile Intranet handheld (if you have the appropriate access permissions). Push Management The server includes a Push Management system to submit, cancel and view the status of pushed messages. Wireless Network Subsystem This server subsystem controls wireless transmissions between the server and the handheld. This subsystem communicates with the Good Secure Operations Center to ensure continuous, reliable message delivery. Logging Subsystem The server supports an extensive logging facility you can use to view detailed server activity as well as troubleshoot problems that may occur. The server includes an intelligent XSLT transformation engine for conversion of Web page content. You can develop your own applications to take advantage of these built-in transformations or create transformations of your own. 3 Good Mobile Intranet
6 Security Infrastructure The Good System has been specifically designed to meet the security needs of even the largest, most security-sensitive corporations. It provides an end-to-end system designed to protect corporate information at all times even while it is being transmitted over the wireless network and while it resides on the handheld. The Good System combines industry security standards, such as AES, with Good s own security technologies. Plus, installation of Good applications does not require any modifications to your firewall and allows you to leverage your existing network security infrastructure. Good Mobile Intranet leverages the same infrastructure as Good Mobile Messaging and offers a complete, encrypted, end-to-end secure system. First, a unique encryption key is generated and maintained for each user and stored on the handheld. Good Technology uses advanced encryption technology standards to encrypt and decrypt all messages and transmissions exchanged between the backend enterprise application and the handheld. Second, data flows between Good Mobile Intranet Server and the Good Secure Operations Center over the Internet using the HTTPS protocol. HTTPS provides secure communications through corporate firewalls using SSL. In this communication scheme, the Good Secure Operations Center, which is identified by its URL, can be thought of as the server and Good Mobile Intranet Server as its client in a client/server relationship over the Internet. Through the use of master/session key pairs, the Good System updates keys wirelessly without compromising the security of the system. New session keys are generated every 30 days and encrypted using the master key, then are sent to the handheld wirelessly and automatically installed. Messages that are sent before the new key was deployed are decrypted with the prior key, while all messages that follow the arrival of the new key are decrypted using it. For handheld security, Good provides the ability to centrally set password policies that are enforced on all handhelds connected to the Good Mobile Messaging/Good Mobile Intranet Server. And if a handheld is lost or stolen, IT administrators can remotely erase applications and data on the handheld including Good Mobile Messaging or Good Mobile Intranet data that may have been stored or backed up on a memory or SD card. Please see the Good Security White Paper for additional information about the Good security architecture for Good Mobile Messaging and Good Mobile Intranet. 4 Good Mobile Intranet
7 COOKIES To improve application performance, Good Mobile Intranet manages cookies on the server instead of sending them to destination handhelds. So when a handheld makes a request to a Web site, the server checks to see if there is a cookie associated with that handheld stored for that site or application. If the server has the =cookie for the request, it sends the cookie as part of the handheld s HTTP request. Since no OTA time is used transmitting cookies, server-side cookies improve application performance. In addition, server-managed cookies save time by following all HTTP redirects that include cookies and automatically taking care of Web logins requiring cookies. And since cookie data is stored in the server s database, users can clear cookies stored on the handheld. AUTHENTICATION Good Mobile Intranet also allows mobile users to authenticate to a variety of Web servers, such as HTTP Basic, using NT LAN Manager (NTLM)-based authentication all right from their handhelds. If a user requests information from a Web server and that information has been protected using authentication, the Web server sends an Authentication Required header with the response to the request. This notifies the client that user credentials must be supplied in order for the resource to be returned as requested. Good Mobile Intranet passes the authentication information back to the handheld and then the user is prompted to enter a user name and password. Once the user name and password are entered, the request is sent back with the required credentials to the Web server. This information is kept by the client for future use. Meaning, when the user accesses the same domain, the credentials are retained and the user is not prompted again for authentication for the remainder of the session. However, handheld users can manually clear HTTP basic authentication through the Good Mobile Intranet client interface. 5 Good Mobile Intranet
8 Push Sometimes you need to get important information to your mobile users, information that they might not yet know they need. Good Mobile Intranet includes push functionality that enables system administrators to proactively broadcast Web pages and documents to mobile users. Good Mobile Intranet s push capability is useful for distributing company or industry news and alerts; sales information, like new leads or updated price lists; field service information like trouble tickets; or other information like reports or management metrics. URLs and documents can be pushed on a scheduled basis, or administrators that have access rights to the Good Mobile Intranet Server Console can execute one-time, ad-hoc pushes when required. The process flow for Good Mobile Intranet push is: Push Initiator Step 8: Optional delivery notification. Step 1: Push is initiated. Step 2: Server responds. Step 3: Contents stored in database. Good Mobile Step 4: Retrieved for delivery. Database: Pending Push Messages Step 5: Handheld requests content from the server. Step 6: Server delivers content to handheld. Step 7: Handheld acknowledges receipt. Good Mobile Intranet on Handheld 1. Push is initiated by the system administrator. Push documents can be traditional file attachments (such as Word, Excel or PDF documents), HTML Web pages or URL locations that contain intranet links and HTML content and so on. Administrators can deliver push messages as needed or on a pre-defined scheduled basis. 2. Contents of a push are stored in a database on the Good Mobile Intranet Server. 3. Push content is retrieved for delivery. Push documents can be downloaded and received as a background process, so a user s workflow is not interrupted. For important, immediate notification, administrators can send a push alert, which automatically takes priority on a user handheld. 4. When a user attempts to open a pushed page or document, the Good Mobile Intranet Client requests content from server. If the user receiving a push document or alert is out of coverage, the push is queued on the server until coverage is restored. 5. Handheld acknowledges receipt of the push. Server queuing and handheld acknowledgement guarantee and confirm push delivery. 6. Optional delivery notification is sent. 6 Good Mobile Intranet
9 Transformations Most desktop, intranet and Internet applications do not render well or at all on mobile handhelds. Good Mobile Intranet accommodates that problem. Where the target application is accessed via a URL, the Good Mobile Intranet Server includes a set of transformations you can use to integrate applications with Good Mobile Intranet. These transformations enable you to take new or existing Web client architected applications and optimize them for user handhelds. In the following figure, you can see how the same site is rendered on the desktop and through Good Mobile Intranet. Transformations can be used on a specific page, a domain or all pages in a site. They also enable you to filter information before it reaches the handheld so users get the information they need in an attractive display. During transformations, the Good Mobile Intranet Transform Engine parses through HTML to find specific items, remove items or rewrite them according to the logic of the transformation. For example, Good Mobile Intranet can process a Web application to remove graphics or simplify table layouts. The Good Mobile Intranet-defined transformations control the layout of the output documents and where to access data within the input document. This saves on bandwidth, makes applications perform faster and provides a much more usable experience on the handheld. Transformations reside on the server, so all the heavy-duty processing is done by the server instead of the handheld. This enables more efficient downloads and faster application processing on the handheld. Transformations work for most public Web sites as well as your corporate intranets and Web-architected enterprise applications. 7 Good Mobile Intranet
10 Differential Data To reduce transmission time, Good Mobile Intranet Server supports differential-data transmission. If differential-data transmission is enabled, the server maintains a cache of the documents it sends to individual handhelds. When a Good Mobile Intranet browser on the handheld sends an HTTP request for a document, the response comes back to Good Mobile Intranet Server which automatically checks its differential data to see if the document requested is a newer version of a document previously sent to the handheld. If it is, the server compares the two versions and sends only the changes to the handheld. A similar process happens when Good Mobile Intranet Server receives the updated version of a push message. Before sending it to the handheld, the server compares it to the previous version of the push message and sends only the updated portion of the message to the handheld. When the Good Mobile Intranet handheld receives differential data from the server, it updates the document with new content, so both the server and the handheld have the latest versions. So what you save with differential data is the transmission time and not outdated versions of data. Good Mobile Intranet Server Management Good Mobile Intranet Server includes an HTML interface, called the Good Mobile Intranet Server Console, for managing the Good Mobile Intranet Server via a standard Web browser. TRAFFIC The traffic page of the server console displays the amount of HTTP traffic sent between wireless handhelds and Good Mobile Intranet Server. This page is useful for comparing network traffic activity over hourly, daily or weekly periods. LOG FILES Good Mobile Intranet Server includes both production logs and diagnostics logs. With the exception of the Access log, production logs are enabled by default and cannot be disabled, while diagnostic logs are disabled by default and can be enabled if desired. The server also sends logging information to the Event log. By accessing the server console, you can see what logs are currently enabled as well as enable or disable logging for server components. 8 Good Mobile Intranet
11 SITE ACCESS Sometimes it is necessary to limit your users access to sites. With the Site Access of the Good Mobile Intranet Server console, you can: Set the default home page for handhelds. Map the host name received in a URL to a different host name (Host substitution). Map the path following the host name in a URL to a different path (URL substitution). URL substitution in combination with host substitution makes it possible to fully change the URL that a wireless handheld requests without reconfiguring the handheld. This can be useful, for example, if you want to change the server host. Proxy and per-user proxy management. PUSH ADMINISTRATION The Good Mobile Intranet Server Console provides a graphical user interface for sending and managing push messages. You can use the console to view the status of push messages, send new messages, generate push reports and set push administration options. USER MANAGEMENT Once users have been enabled on the Good Mobile Messaging Management Console, they will be displayed on the Users page in the Good Mobile Intranet Server Console. With the console tool, you will be able to add, delete and manage Good Mobile Intranet users centrally and easily. Good Technology, Inc. All rights reserved. Good, Good Technology, the Good logo, Good Mobile Messaging, Good Mobile Intranet, and Powered by Good are trademarks of Good Technology, Inc. MOTOROLA and the Stylized M Logo are registered in the U.S. Patent and Trademark Office. All other trademarks are the property of their respective owners. Screen image simulated. Rev Good Mobile Intranet
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationBlackBerry 101: An Introduction to the BlackBerry Wireless Solution
BlackBerry 101: An Introduction to the BlackBerry Wireless Solution BlackBerry 101 Agenda What is the BlackBerry Enterprise Solution? Tracing a Message Security, Security, Security Enabling the User Extensibility:
More informationDeveloper Case Study. BlackBerry Streamlines IT Change Request Approval Process. Industry Healthcare
Developer Case Study BlackBerry Streamlines IT Change Request Approval Process Situation In 2005, the Baylor IT department reviewed their change management policy and updated their web-based change control
More informationBlackBerry Integration With IBM WebSphere Everyplace Access 4.3
BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 Integration Note Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Integration overview... 3 Related resources...
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased
More informationThinAir Server Platform White Paper June 2000
ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part
More informationVMware AirWatch tvos Platform Guide Deploying and managing tvos devices
VMware AirWatch tvos Platform Guide Deploying and managing tvos devices AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationApplication Security for Java-based BlackBerry Handhelds
Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity
More informationDeltaV Mobile. Introduction. Product Data Sheet September DeltaV Distributed Control System
DeltaV Distributed Control System Product Data Sheet September 2017 DeltaV Mobile Make faster and better decisions with secure, read-only access to your critical operational data, whenever and wherever
More informationData Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION
Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationXceedium Xio Framework: Securing Remote Out-of-band Access
Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationDeveloping Custom Solutions to Extend your Data Wirelessly
An IT Briefing produced by Developing Custom Solutions to Extend your Data Wirelessly 2003 TechTarget This reference document is based on a Research In Motion/TechTarget Webcast, "." To view the Webcast
More informationPMS 138 C Moto Black spine width spine width 100% 100%
Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of
More informationHow to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL
More informationWAM!NET Direct! SM. Service Description
WAM!NET Direct! SM Service Description INTRODUCTION The Direct! Service is a subscription based content delivery service that provides customers with the ability to send, receive, and track digital files
More informationTECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple
APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and
More informationVMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources
VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback
More informationBlackBerry Enterprise Server Express for IBM Lotus Domino
BlackBerry Enterprise Server Express for IBM Lotus Domino Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411011002-001 Contents 1 Overview: BlackBerry
More informationBlackBerry Enterprise Server Express for Microsoft Exchange
BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411010819-001 Contents 1 Overview: BlackBerry
More informationArchitecture and Governance with SharePoint for Internet Sites. Ashish Bahuguna Kartik Shah
Architecture and Governance with SharePoint for Internet Sites Ashish Bahuguna ashish.bauguna@bitscape.com Kartik Shah kartik.shah@bitscape.com Agenda Web Content Management Architecture Information Architecture
More information1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood
TM 1100 Dexter Avenue N Seattle, WA 98109 206.691.5555 www.netmotionwireless.com NetMotion Mobility Architecture A Look Under the Hood NetMotion Mobility Architecture A Look Under the Hood Wireless networking
More informationVMware AirWatch Cloud Connector Guide ACC Installation and Integration
VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationVMware Workspace ONE UEM Apple tvos Device Management. VMware Workspace ONE UEM 1811 VMware AirWatch
VMware Workspace ONE UEM Apple tvos Device Management VMware Workspace ONE UEM 1811 VMware AirWatch You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationBlackBerry Java Development Environment (JDE)
1 BlackBerry Java Applications for Accessing SAP Applications BlackBerry Java Development Environment The BlackBerry Java Development Environment (JDE) is a fully integrated development and simulation
More informationRSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief
Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout
More informationDreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com
DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com By Bill Appleton, CTO, DreamFactory Software billappleton@dreamfactory.com Introduction DreamFactory
More informationBlackBerry Mobile Data System
BlackBerry Mobile Data System TM BlackBerry Mobile Data System dramatically reduces the amount of time and resources required to develop and deploy wireless applications for mobile workers. BlackBerry
More informationApplication Notes for Integrating Vitel Software s Ivize Reporting Package with Avaya Communication Manager - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Integrating Vitel Software s Ivize Reporting Package with Avaya Communication Manager - Issue 1.0 Abstract These Application Notes describe
More informationJUNIPER NETWORKS PRODUCT BULLETIN
PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable
More informationAventail WorkPlace. User s Guide Version 8.7.0
Aventail WorkPlace User s Guide Version 8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile, Aventail Connect Tunnel,
More informationZENworks for Desktops Preboot Services
3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationControl-M and Payment Card Industry Data Security Standard (PCI DSS)
Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M
More informationTop Reasons to Upgrade
version 5.0 Top Reasons to Upgrade With the latest release of the BlackBerry Enterprise Server software, your organization gains new administrative features, built-in high availability to maximize system
More informationApplication Notes for Integrating Vitel Ivize with Avaya Modular Messaging - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Integrating Vitel Ivize with Avaya Modular Messaging - Issue 1.0 Abstract These Application Notes describe the configuration steps for integrating
More informationCopyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper
Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationEnhancing VMware Horizon View with F5 Solutions
Enhancing VMware Horizon View with F5 Solutions VMware Horizon View is the leading virtualization solution for delivering desktops as a managed service to a wide range of devices. F5 BIG-IP devices optimize
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationAppSpider Enterprise. Getting Started Guide
AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account
More informationXerox Mobile Print Solution
Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright
More informationMcAfee Security Management Center
Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability
More informationWebthority can provide single sign-on to web applications using one of the following authentication methods:
Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER
DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration
More informationPROService REMOTE SERVICE APPLICATION. Frequently asked questions
PROService REMOTE SERVICE APPLICATION Frequently asked questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman Coulter s remote
More informationDell SonicWALL Aventail Connect Tunnel User s Guide
Dell SonicWALL Aventail 10.6.2 Connect Tunnel User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationDeploying ipad to Patients
Deploying ipad to Patients Setup Guide Contents Overview Getting Prepared Evaluate your infrastructure Create a configuration Automate device setup Distribute apps In-Room Storage Initial setup Reset your
More informationCisco Content Transformation Engine (CTE) 1400 Series Configuration Note
Cisco Content Transformation Engine (CTE) 1400 Series Configuration Note Product Number: CTE-1400 This publication contains the procedures for configuring the Cisco Content Transformation Engine (CTE)
More informationIIS Installation for.net Application. Md. Saifullah Al Azad
IIS Installation for.net Application Md. Saifullah Al Azad Contents 1 Mimimal... 2 1.1 Common HTTP Features... 2 1.1.1 Static Content... 2 1.1.2 Default Document... 2 1.2 Application Development... 2 1.2.1
More informationKodiak Broadband PTT
Kodiak Broadband PTT Re-defining PTT Communications MOTOROLA SOLUTIONS and KODIAK are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. This document is not an offer, commitment,
More informationSolutions Business Manager Web Application Security Assessment
White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security
More informationCitrix SD-WAN for Optimal Office 365 Connectivity and Performance
Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access
More informationEntrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014
Entrust Discovery 2.4 Administration Guide Document issue: 3.0 Date of issue: June 2014 Copyright 2010-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust, Inc.
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationDell OpenManage Mobile Version 1.0 User s Guide
Dell OpenManage Mobile Version 1.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationConnectware Manager Getting Started Guide
Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi
More informationThe Challenge. The Solution. The Modern Approach to Remote Access
Datasheet BlackBerry Access: Windows 10 and macos The Challenge Modern businesses consist of not only full-time employees, but users such as contractors, seasonal workers, remote workers, and partners.
More informationVMware Workspace ONE UEM VMware AirWatch Cloud Connector
VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationSophos Mobile Control startup guide. Product version: 7
Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses
More informationGoToMyPC Corporate Product Guide
GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center
More informationDeploying ipad to Patients Setup Guide
Deploying ipad to Patients Setup Guide Contents Overview Getting Prepared Evaluate your infrastructure Create a configuration Automate device setup Distribute apps In-Room Storage Initial setup Reset your
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationWorkspace Secure Container for Mobile Devices
Workspace Secure Container for Mobile Devices Version 1.1 Last Updated: April 24, 2014 2014 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon
More informationDeltaV Mobile. Introduction. Product Data Sheet November DeltaV Distributed Control System
DeltaV Distributed Control System Product Data Sheet November 2018 DeltaV Mobile Make faster and better decisions with secure, read-only access to your critical operational data, whenever and wherever
More informationAT&T Connect Communications Center (ACC) User Guide Enterprise Edition Version 8.9 May 2010
AT&T Connect Communications Center (ACC) User Guide Enterprise Edition Version 8.9 May 2010 2009 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained
More informationCounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance
CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationPreserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS
Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS We are the only company to integrate disk, tape, and replication in a single solution set for better near-term
More informationDolby Conference Phone 3.1 configuration guide for West
Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San
More informationMSM320, MSM410, MSM422, MSM430,
Polycom VIEW Certified Configuration Guide Hewlett-Packard MSM710/720/760/765 Wireless LAN Controller With MSM310, MSM320, MSM410, MSM422, MSM430, MSM46x APs September 2012 1725-36068-001 Rev H Trademarks
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationdevice management solution
MSP4: the COmprehensive mobile device management solution built FOR a BYOD world Motorola Solutions Services Get all the information you need to troubleshoot the mobile devices your enterprise owns as
More informationVMware AirWatch Tizen Guide
VMware AirWatch Tizen Guide AirWatch v8.4 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected
More informationQuick Install & Troubleshooting Guide. WAP223NC Cloud Managed Wireless N Access Point
Quick Install & Troubleshooting Guide WAP223NC Cloud Managed Wireless N Access Point Package Contents 1 x WAP223NC Indoor access point powered by CloudCommand 1 x wall and ceiling mounts 1 x 24V PoE power
More informationAn Oracle Technical White Paper May Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications
An Oracle Technical White Paper May 2010 Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications Introduction... 2 Solution Overview... 3 BlackBerry Infrastructure... 4 BlackBerry
More informationDEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER Deploying the BIG-IP LTM system for BEA WebLogic Server F5 Networks and BEA systems have created a highly effective way to direct traffic
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationManaging NCS User Accounts
7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and
More informationVMware Mirage Getting Started Guide
Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationIncrease user productivity and security by integrating identity management and enterprise single sign-on solutions.
Security management solutions White paper Increase user productivity and security by integrating identity management and enterprise single sign-on solutions. April 2006 2 Contents 2 Overview 3 Rely on
More informationWelcome to First Security Mobile
Welcome to First Security Mobile Frequently Asked Questions Questions General How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a data plan? I'm not enrolled
More informationEkran System v Program Overview
Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation
More informationBlackBerry Mobile Voice System
BlackBerry Mobile Voice System BlackBerry Mobile Voice System Mobile Unified Communications Mobile Voice System ( MVS) is designed to unify desk phone features on smartphones and Wi-Fi networks to optimize
More informationSecure Access Troubleshooting Rewrite related issues (Core/Web Based Access)
Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource
More informationMigrationWiz Security Overview
MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationSophos Mobile. startup guide. Product Version: 8.1
Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationWX CENTRAL MANAGEMENT SYSTEM
DATASHEET WX CENTRAL MANAGEMENT SYSTEM Product Overview When it comes to WAN optimization, visibility into the distributed enterprise is absolutely critical to understand how applications are performing,
More informationEnsuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard
Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure
More informationCisco Prime Home 5.1 Technical
Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new
More informationUSER GUIDE Summer 2015
USER GUIDE Summer 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may be used
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationBlackBerry Enterprise Server for Microsoft Exchange
BlackBerry Enterprise Server for Microsoft Exchange Version 3.5 Service Pack 1 Hotfix 2 December 2002 PLEASE READ THE LEGAL NOTICES SET OUT AT THE END OF THIS DOCUMENT. This document provides information
More information