Nukona Policy Management

Size: px
Start display at page:

Download "Nukona Policy Management"

Transcription

1 Nukona Policy Management An approach to managing applications and securing corporate data on smart mobile devices Chris Perret CEO Nukona,Inc. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 1

2 Table of Contents Purpose of Document... 3 Overview... 3 Policy Management Basic Concepts... 5 Policies That Can Be Enforced... 7 How the Policy Engine Works... 8 Summary Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 2

3 Purpose of Document In this paper we will describe the basic theory of operations of the Nukona Policy Engine, a critical component of Nukona App Center TM, Enterprise Edition. The paper will outline both the concepts and the process required to deploy secured and managed native and web applications to smart mobile devices, in particular ios and Android devices, and detail the types of policies and security that can be applied to the apps. Overview Nukona s App Center product has been designed from the ground up to allow large enterprises to reliably and at scale deploy apps to their employees that are using either ios or Android devices for work purposes. Unlike competitive products, Nukona s products allow Enterprise IT to set the policies and information assurance they care about without requiring any modifications to the source code of apps. This approach was taken by Nukona to ensure that apps deployed by Enterprise IT are not reliant on internal or third-party app developers to be compliant with the policies and compliance needs of the organization. This approach also allows organizations to apply policy across hundreds, if not thousands of apps, being deployed across multiple geographic regions to thousands of employees. A change in policy, or an update to app logic can be deployed to the entire employee community with a simple push of a button from the management console. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 3

4 In the above diagram, an app is developed, sourced or modified (1). If the app is coming from a developer, the new app is delivered to the appropriate IT administrator with a simple notification. If the app is sourced, the IT administrator can simply upload the app directly. The IT administrator creates sets of policies and selects the appropriate policy set to be applied to the app, based on the target audience and the information that the app accesses (2). A Nukona Policy Container is invoked around the app logic and the app is provisioned in the Enterprise App Store to be accessed by employees and other approved users. When installed on the user s device (3), the wrapped or containerized app is subject to the policy controls set by Enterprise IT, both at launch-time and while it is running. Using this model, all manner of policies can be set, from simple access and authentication policies, to keys management strategies, off-line access policies, re-authentication and refresh policy, and even policies related to single-sign on for related productivity apps. Since the container controlling the policy is delivered with the app and any data written locally on the device is being policy-managed, an enterprise can immediately support BYOD (Bring Your Own Device) using this approach. The corporate policy-managed apps and data can be co-resident on a device with personal apps and data. The remainder of the paper will provide detail on the concepts behind policy management, exactly what policies can be applied and more detail on how the wrapping of apps actually works in order to deliver the full policy management functionality outlined above. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 4

5 Policy Management Basic Concepts There are a few fundamental concepts that are key to understanding the operation, power and benefits of the Nukona Policy Engine: Apps may come from any source Nukona s policy management capability is not limited to internal apps. Any application where the IT department has access to the object code (.IPA file for ios,.apk file for Android) can have policy applied. Additionally, Nukona s Policy Engine can support applying policy to both internal and external web apps. Separation of app logic from policy Fundamental to corporate application governance is the requirement to be able to separate corporate policy from the application logic. The policy sets are created independently and applied on an app-by-app or app group basis. When policies change, the IT Administrator simply updates the apps with the new policy and re-deploys. No SDK or API s required Fundamental to the Nukona approach is the premise that an enterprise s ability to manage apps at scale is impossible if an SDK is required. Therefore the Nukona Policy Engine was designed to sit outside the app and not require any code changes whatsoever. This approach has the added benefit of not requiring application developers to have to learn about the complicated and often arcane world of mobile security, keys management and identity. The Policy Engine takes care of all those critical aspects prior to app deployment. Per-app container When Nukona Policy Engine applies a set of policies to an app, it is wrapped in a container prior to deployment. The container keeps the app completely independent from any other corporate or personal app that may be resident or running on the user s device. Therefore it is entirely feasible to concurrently be running multiple corporate apps that have different security profiles. The same app can also have different policies applied for different roles or groups of users. Policy control through distribution Apps are deployed via Nukona s enterprise app store that may be privatebranded to suit the enterprise or service provider. The enterprise app store provides the capability for full tiered access controls, role/group management and can be easily integrated with an organization s identity infrastructure such as Active Directory. Since the policies are applied statically to the apps before distribution, it is guaranteed that the policies will be in force when the users run the apps. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 5

6 App revocation The app container includes logic that will check on launch if the app is still current and also self-destruct code. Therefore the IT Administrator can revoke an app and the next time a user tries to launch the app it will delete all its data and itself. None of the other corporate or personal apps, or their data, is impacted. Policy updates When a policy is updated (e.g. a requirement to enforce encryption on all corporate data), the apps can be updated by the IT Administrator with no requirement to go back to the app developer or third party. If an app has already been distributed with policy management enabled, then the updated app is effectively pushed to the user since one of the features of the container is its ability to version check at launch. The actual mechanism employed is simply that the app is revoked and then redeployed. Future-proofing The design of the Policy Engine is such that the policies enforced can be extended based on changing requirements. Any functions that make system calls to the mobile operating system and any API s used by the apps can be controlled. So it is anticipated that the initial set of policies outlined below will be extended to meet future enterprise requirements. External app store / marketplace apps Nukona s App Center includes a store pointer capability to allow IT Administrators to include external apps from sources such as the itunes store or Android Market in the set of apps that a user can access. Note however that policies cannot be applied to apps downloaded from external stores. In order to apply policy to third party apps, an organization needs to acquire the rights to distribute the app through its own enterprise app store. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 6

7 Policies That Can Be Enforced In Nukona App Center, Enterprise Edition v2.0, the following policies can be enforced on an app-by-app basis: User authentication and re-authentication Before the app launches, the user is required to enter their credentials based on the identity infrastructure (e.g. Active Directory) Re-authentication on a periodic basis (e.g. every 30 minutes) can also be enforced Local storage rules Whether the app is allowed to write data to the local device If so, whether the data is required to be encrypted. If encryption is selected, the device s operating system encryption libraries are used but the keys for decryption are stored by default off the device in the App Center, thus delivering a dramatically improved level of security. Offline access rules Whether the app can be accessed offline If so, whether PIN access is required for authentication before launching the app Document sharing Whether document sharing from within the app is allowed. This is increasingly used by many apps to support file-sharing and collaboration apps such as Dropbox, Box.net, Evernote, etc. All major document sharing API s can be blocked or enabled: inter-app, itunes, icloud API access Whether specific API s are allowed. The initial set is: - copy / cut / paste: prevent user from being able to use editing functions - openurl: prevent app from being able to open any web page Jailbroken devices Whether to allow the app to launch on jailbroken devices or not Restrict Network Connections o Limit the application s ability to connect to only certain IP addresses / servers / ports Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 7

8 How the Policy Engine Works The key to the delivering on the promise of per app policy control is Nukona Policy Engine s ability to wrap or containerize an app. Let s take a closer look at how this works: 1 2 The application is uploaded into the App Center. This may be done by the developer or the IT Administrator. The IT Administrator creates appropriate sets of policies that can be applied to different groups of apps depending on the level of security required. For example: A policy for apps accessing no sensitive data with limited security requirements (e.g. an expense reporting app) o User authentication required? NO o Allow local storage? YES Enforce encryption? NO o Offline access allowed? YES Require PIN? NO o Restrict document sharing? NO o Restrict copy/cut/paste? NO o Restrict openurl? YES o Restrict network connections? YES Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 8

9 A policy for apps accessing sensitive data with high security requirements (e.g. a client billing app) o User authentication required? YES Re-authentication? Every 15 minutes o Allow local storage? YES Enforce encryption? YES o Offline access allowed? NO o Restrict document sharing? YES o Restrict copy/cut/paste? YES o Restrict openurl? YES o Restrict network connections? YES 3 4 The IT Administrator selects which policy set is appropriate for the app and applies it. Nukona Policy Engine then automatically opens up the app, replaces any of the relevant standard library calls (e.g. file open, file write) with policy-managed versions, creates the container for the app and re-certifies the app with the enterprise certificate. The app is now ready for distribution. The IT Administrator drags and drops the app into the enterprise app store and selects which users or groups of users should get access to the app. The icon for the app is badged to indicate that this a policy managed version. First time users are notified via to download the App Center Client, after which they can download the apps to which they are entitled. After that, a notification that new or updated apps are available will come on their mobile device: Updates to apps which have been policy managed can be pushed automatically (assuming offline access is not enabled or being used). Apps which are not policy managed require the user to choose to update. Web Applications Web apps can be policy managed in the same way that native apps are. When the web app is selected, the container that Nukona Policy Engine wraps around the app is a secure browser that has been specifically enabled to manage policies. The user will download the app in the same way that they do with native apps. Unlike normal web clip apps that launch in the local browser (e.g. Chrome, Safari), the policy-managed web apps launch in the secure browser and so policy integrity is maintained. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 9

10 Mix of Corporate and Personal Apps When the policy-managed apps are running on a user s device, each corporate app is running with its own set of policies and all of the data written locally is under the control of the policy libraries. Thus the co-mingling of business and personal apps and data on any corporate-owned or employee-liable device is fully supported without risk of corporate data loss or compliance issues. Additionally, specific apps may be revoked by the IT Administrator on an app-by-app basis. The data associated with the app is also deleted without having to have the entire device wiped. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 10

11 Summary Enterprises are already increasingly dependent on smart mobile devices to run their business. The combination of new apps being specifically designed to run on devices such as the ipad together with the current wave (which is going to become a tidal wave) of BYOD means that IT needs to be in a position to take control of corporate apps and data as they are deployed on these devices. For that control to scale to support dozens, hundreds and eventually thousands of apps it is essential that corporate policies can be applied to all the apps that are required for the business native and web, in-house, third-party or COTS (commercial-off-the-shelf) apps and that these policies can be updated without recourse to an SDK or the requirement to have access to the source code in any way. This is what the Nukona Policy Engine is set up to deliver. In this model, all manner of policies can be set, from simple access and authentication policies, to keys management strategies, off-line access policies, reauthentication and refresh policy, and even policies related to single-sign on for related productivity apps. And the sound architectural approach of separating policy from application logic means that the ability to scale to thousands of apps and tens of thousands of users is built into the model. Symantec, Inc., 2012 Nukona Policy Management Whitepaper Page 11

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Managing Devices and Corporate Data on ios

Managing Devices and Corporate Data on ios Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Integrating AirWatch and VMware Identity Manager

Integrating AirWatch and VMware Identity Manager Integrating AirWatch and VMware Identity Manager VMware AirWatch 9.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware

More information

AirWatch Container. VMware Workspace ONE UEM

AirWatch Container. VMware Workspace ONE UEM VMware Workspace ONE UEM You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

PrinterOn Mobile App MDM/MAM. Basic Integration Guide

PrinterOn Mobile App MDM/MAM. Basic Integration Guide PrinterOn Mobile App MDM/MAM Basic Integration Guide Contents Chapter 1: Overview... 4 Supported PrinterOn MDM/MAM integrations... 4 Benefits of integrating PrinterOn with MDM/MAM solutions... 5 Chapter

More information

Application / Document Management. MaaS360 e-learning Portal Course 3

Application / Document Management. MaaS360 e-learning Portal Course 3 Application / Document Management MaaS360 e-learning Portal Course 3 Agenda > Application Management Overview MaaS360 Workflows Device Workflows > Document Management Overview MaaS360 Workflows Document

More information

Colligo Briefcase. for Good Technology. Administrator Guide

Colligo Briefcase. for Good Technology. Administrator Guide for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...

More information

SECURE, CENTRALIZED, SIMPLE

SECURE, CENTRALIZED, SIMPLE 1 SECURE, CENTRALIZED, SIMPLE Multi-platform Enterprise Mobility Management Whitepaper 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is an end-to-end, multi-platform, device,

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

VMware Workspace ONE UEM Integration with Apple School Manager

VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation

More information

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and  Management SharePoint 2013 and Colligo Apps Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Email Management SharePoint 2013 is the latest release of Microsoft s leading business collaboration

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

Apple ios Enterprise Mobility Management (cloud based)

Apple ios Enterprise Mobility Management (cloud based) Apple ios Enterprise Mobility Management (cloud based) Codeproof ios EMM offers the following enterprise mobility management and BYOD security features. App Restrictions Block the camera, Safari, App Store,

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

An Enterprise Approach to Mobile File Access and Sharing

An Enterprise Approach to Mobile File Access and Sharing White Paper Filr An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Filr Competitive Differentiators...2 Filr High-Level

More information

Kony MobileFabric. Release Notes. On-Premises. Release 6.5. Document Relevance and Accuracy

Kony MobileFabric. Release Notes. On-Premises. Release 6.5. Document Relevance and Accuracy Kony MobileFabric Release Notes On-Premises Release 6.5 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated on

More information

VSP18 Venafi Security Professional

VSP18 Venafi Security Professional VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:

More information

2016 BITGLASS, INC. mobile. solution brief

2016 BITGLASS, INC. mobile. solution brief mobile solution brief BYOD Security has been a constant challenge for many enterprises. Stories of failed MDM deployments are rampant, with firms struggling achieve meaningful adoption. According to the

More information

VMware AirWatch and Office 365 Application Data Loss Prevention Policies

VMware AirWatch and Office 365 Application Data Loss Prevention Policies VMware AirWatch and Office 365 Application Data Loss Prevention Policies Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

VMware AirWatch - Mobile Application Management and Developer Tools

VMware AirWatch - Mobile Application Management and Developer Tools VMware AirWatch - Mobile Application Management and Developer Tools Table of Contents Lab Overview - HOL-1857-05-UEM - VMware AirWatch: Mobile App Management and Developer Tools... 3 Lab Guidance... 4

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

Product Brief. Circles of Trust.

Product Brief. Circles of Trust. Product Brief Circles of Trust www.cryptomill.com product overview Circles of Trust is an enterprise security software system that eliminates the risks associated with data breaches from a hacker attack

More information

Mobilize with Enterprise Security and a Productive User Experience

Mobilize  with Enterprise Security and a Productive User Experience Mobilize Email with Citrix XenMobile Mobilize Email with Enterprise Security and a Productive User Experience People need to be able to work with email productively wherever they go. Citrix.com 1 Email

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

1Y0-371 Q&As. Designing, Deploying and Managing Citrix XenMobile 10 Enterprise Solutions. Pass home 1Y0-371 Exam with 100% Guarantee

1Y0-371 Q&As. Designing, Deploying and Managing Citrix XenMobile 10 Enterprise Solutions. Pass home 1Y0-371 Exam with 100% Guarantee 1Y0371 Q&As Designing, Deploying and Managing Citrix XenMobile 10 Enterprise Solutions Pass home 1Y0371 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing

More information

XenMobile MDX Toolkit 10.x Fixed Issues

XenMobile MDX Toolkit 10.x Fixed Issues XenMobile MDX Toolkit 10.x Fixed Issues MDX Toolkit 10.3.9 If users have WorxWeb open in the background and use an unwrapped app that passes data to WorxWeb, such as Google Chrome, and the device loses

More information

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

VMware AirWatch Mobile Device Management Guide Managing your organization's mobile devices

VMware AirWatch Mobile Device Management Guide Managing your organization's mobile devices VMware AirWatch Mobile Device Management Guide Managing your organization's mobile devices AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

This brief will explain the integration between AirWatch and TeleMessage. TeleMessage AirWatch Integration Brief Page 2 of 5

This brief will explain the integration between AirWatch and TeleMessage. TeleMessage AirWatch Integration Brief Page 2 of 5 Version: 1.0 1. About TeleMessage TeleMessage delivers smart and secure messaging seamlessly over any communication device. Designed specifically for enterprises, our solutions intelligently and seamlessly

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Augmenting security and management of. Office 365 with Citrix XenMobile

Augmenting security and management of. Office 365 with Citrix XenMobile Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com

More information

JUNIPER NETWORKS PRODUCT BULLETIN

JUNIPER NETWORKS PRODUCT BULLETIN PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

This guide illustrates how to set up an Apple device for deployment, and deploy an application. It covers how to:

This guide illustrates how to set up an Apple device for deployment, and deploy an application. It covers how to: Device Provisioning Overview Before you can deploy your application to a device, you need to have an active subscription with the Apple Developer Program. Visit the Apple Developer Portal to get registered.

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

RHM Presentation. Maas 360 Mobile device management

RHM Presentation. Maas 360 Mobile device management RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership

More information

Pulse Workspace Appliance. Administration Guide

Pulse Workspace Appliance. Administration Guide Pulse Workspace Appliance Administration Guide Product Release 2.0, 1743.1 Document Revisions 1.0 Published Date January 2018 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 The Pulse

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

INSTALLATION AND SETUP VMware Workspace ONE

INSTALLATION AND SETUP VMware Workspace ONE GUIDE NOVEMBER 2018 PRINTED 9 JANUARY 2019 VMware Workspace ONE Table of Contents Installation and Setup Introduction Prerequisites Signing Up for a Free Trial Launching the Workspace ONE UEM Console Navigating

More information

VMware AirWatch Mobile Application Management Guide Enable access to public and enterprise apps

VMware AirWatch Mobile Application Management Guide Enable access to public and enterprise apps VMware AirWatch Mobile Application Management Guide Enable access to public and enterprise apps AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support

More information

Securing Enterprise or User Brought mobile devices

Securing Enterprise or User Brought mobile devices Securing Enterprise or User Brought mobile devices Wilfried Baeten Business Line Director Projects&Consulting Econocom Managed Services 20/09/2013 WWW.ECONOCOM.COM Agenda Introduction The mobile security

More information

Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance

Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance Centrally Managing Enterprise Security, Trust & Compliance SSL Certificate Management - PKI With an ever-increasing abundance of web-enabled, collaborative and mobile applications, as well as netaccessible

More information

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018 How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Unified Endpoint Management: Security and productivity for the digital workspace

Unified Endpoint Management: Security and productivity for the digital workspace White Paper Unified Endpoint Management: Security and productivity for the digital workspace Unified Endpoint Management: Security and productivity for the digital workspace The workplace has evolved from

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

High-performance. Enterprise Scale. Global Mobility.

High-performance. Enterprise Scale. Global Mobility. WHAT S NEW NETMOTION MOBILITY 11 High-performance. Enterprise Scale. Global Mobility. Up to Twice as Fast Mobility 11 accelerates throughput and greatly enhances scalability. Enterprises can support more

More information

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1 Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE GUIDE APRIL 2019 PRINTED 17 APRIL 2019 MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Audience Getting Started with Android

More information

Administering Jive Mobile Apps for ios and Android

Administering Jive Mobile Apps for ios and Android Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Engage ios App Administrator s Guide

Engage ios App Administrator s Guide Engage ios App Administrator s Guide Contents Contents... 1 Introduction... 2 Target Audience... 2 Devices Supported... 2 SharePoint Platforms Supported... 2 SharePoint Security & Privileges... 2 Deploying

More information

BOMGAR.COM BOMGAR VS. WEBEX UPDATED: 2/28/2017

BOMGAR.COM BOMGAR VS. WEBEX UPDATED: 2/28/2017 .COM VS. WEBEX UPDATED: 2/28/2017 Bomgar VS. Support Center LICENSING & DEPLOYMENT The proliferation of solutions has undoubtedly provided certain advantages for organizations seeking alternatives to traditional

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

Application management in Nokia: Getting the most from Company Apps

Application management in Nokia: Getting the most from Company Apps Application management in Nokia: Getting the most from Case Study 2 Contents 1 Challenge...3 2...5 2.1 Deployment options...5 2.2 App security and authentication...7 2.3 Nokia...7 3 Company Hub...9 3.1

More information

IBM Bluemix platform as a service (PaaS)

IBM Bluemix platform as a service (PaaS) Cloud Developer Certification Preparation IBM Bluemix platform as a service (PaaS) After you complete this unit, you should understand: Use cases for IBM Bluemix PaaS applications Key infrastructure components

More information

THE MOBILE HELIX DATA SECURITY PLATFORM

THE MOBILE HELIX DATA SECURITY PLATFORM SECURE ENTERPRISE HTML5 THE MOBILE HELIX DATA SECURITY PLATFORM A MOBILE HELIX WHITEPAPER THE MOBILE HELIX DATA SECURITY PLATFORM The innovation in mobility has created an incredible opportunity to innovate

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

IBM. Configuration Guide. IBM MobileFirst Protect On-Premise. Version 2 Release 4

IBM. Configuration Guide. IBM MobileFirst Protect On-Premise. Version 2 Release 4 IBM MobileFirst Protect On-Premise IBM Configuration Guide Version 2 Release 4 IBM MobileFirst Protect On-Premise IBM Configuration Guide Version 2 Release 4 Note Before using this information and the

More information

Table of Contents HOL-1757-MBL-5

Table of Contents HOL-1757-MBL-5 Table of Contents Lab Overview - - VMware AirWatch: Mobile App Management and App Development... 2 Lab Guidance... 3 Module 1 - Introduction to AppConfig (30 minutes)... 8 Login to the AirWatch Console...

More information

Overcoming Objections to Smartphones as Your Credential

Overcoming Objections to Smartphones as Your Credential Overcoming Objections to Smartphones as Your Credential Security Industry Association By Suzi Abell, 3xLOGIC on September 14, 2018 Could the phone replace your access control card or fob? Moore s Law notwithstanding,

More information

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Android Enterprise Device Management with ZENworks 2017 Update 2

Android Enterprise Device Management with ZENworks 2017 Update 2 Android Enterprise Device Management with ZENworks 2017 Update 2 Article IT Operations Management Article Android Enterprise Device Management with ZENworks 2017 Update 2 Introduction With the release

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme UEM2205BE Get Up to Speed on Innovations in the Mobile Ecosystem: ios, macos, Android, and Chrome OS VMworld 2017 Content: Not for publication Sascha Warno #Vmworld #UEM2205BE Disclaimer This presentation

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Update on new Microsoft Cloud Technology

Update on new Microsoft Cloud Technology Update on new Microsoft Cloud Technology Azure Rights Management Services Thomas Collier Technical Pre-Sales D E V I C E S O F F I C E 3 6 5 C L O U D S E R V I C E S, S A A S A P P S & O N - P R E M I

More information

VMware AirWatch Books Deployment Guide Distribute and deploy books

VMware AirWatch Books Deployment Guide Distribute and deploy books VMware AirWatch Books Deployment Guide Distribute and deploy books AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges 2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium

More information

PULSE CONNECT SECURE APPCONNECT

PULSE CONNECT SECURE APPCONNECT PULSE CONNECT SECURE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Product Release 8.1 Document Revision 1.0 Published:

More information

Six steps to control the uncontrollable

Six steps to control the uncontrollable Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today

More information

CounterACT Afaria MDM Plugin

CounterACT Afaria MDM Plugin Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...

More information

VMware AirWatch Android Platform Guide

VMware AirWatch Android Platform Guide VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Enterprise Mobility Management: completing the EMM story

Enterprise Mobility Management: completing the EMM story Enterprise Mobility Management: completing the EMM story Contents BYOD & EMM 3 Enterprise Mobility Management what is it? 4 Accessing corporate systems, apps 5 and data with EMM Apps in the container 6

More information

Enterprise Mobile Management (EMM) Policies

Enterprise Mobile Management (EMM) Policies Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software

More information

To the Designer Where We Need Your Help

To the Designer Where We Need Your Help To the Designer Where We Need Your Help Slide 7 Can you provide a similar high-res image? Slide 15 Can you polish up the content so it s not an eye chart? Slide 21, 22, 23 Can you polish up the content

More information

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3. Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware

More information