Phil Schwan Technical

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Phil Schwan Technical"

Transcription

1 Phil Schwan Technical

2 Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying and managing applications across platforms is difficult. Users need to be productive while maintaining compliance and reducing risk.

3 People-centric IT Enable your end users Allow users to work on the devices of their choice and provide consistent access to corporate resources. Unify your environment Users Devices Apps Data Deliver a unified application and device management onpremises and in the cloud. Management. Access. Protection. Protect your data Help protect corporate information and manage risk.

4 Enable users Challenges Users want to use the device of their choice and have access to both their personal and work-related applications, data, and resources. Users want an easy way to be able to access their corporate applications from anywhere. IT departments want to empower users to work this way, but they also need to control access to sensitive information and remain in compliance with regulatory policies. Solutions Users can register their devices, which makes them known to IT, who can then use device authentication as part of providing access to corporate resources. Users can enroll their devices, which provides them with the company portal for consistent access to applications and data, and to manage their devices. IT can publish access to corporate resources with conditional access based on the user s identity, the device they are using, and their location.

5 Helping IT to enable users Users can work from anywhere on their devices with access to their corporate resources. Users can enroll devices for access to the company portal for easy access to corporate applications. IT can publish desktop virtualization resources for access to centralized resources. Users can register devices for single sign-on and access to corporate data with Workplace Join. Firewall IT can provide seamless corporate access. IT can publish access to resources with the web application proxy based on device awareness and the users identity.

6 People-centric Application Delivery Accessing apps the right way, on the right device Target applications based on user role the best way for each device Windows/Windows RT Windows Phone ios Android MSI App-V (MDOP) Remote App RDS Native App/ App Store OS X Evaluate device capabilities for optimal application delivery Local installation Microsoft Application Virtualization Desktop Virtualization (VDI) Web applications

7 Unify your environment Challenges MDM products are typically delivered as point solutions, which do not integrate with the main PC management solution already in use. Managing multiple identities and keeping the information in sync across environments is a drain on IT resources. Solutions IT has a single pane of glass to view and manage all managed devices, whether on-premises or cloudbased, PCs or mobile devices. Users and IT can leverage their common identity for access to external resources through federation.

8 Unify your environment Deliver comprehensive application and device management Single Admin Console User Unified infrastructure enables IT to manage devices where they live Comprehensive settings management across platforms, including certificates, VPNs, and wireless network profiles IT can manage the device and application lifecycle

9 Providing users with a common identity IT can use Active Directory Federation Services to connect with Windows Azure for a consistent cloud-based identity. Users are more productive by having a single sign-on to all their resources. Users get access through accounts in Windows Azure Active Directory to Windows Azure, Office 365, and third-party applications. IT can provide users with a common identity across on-premises or cloudbased services, leveraging Windows Server Active Directory and Windows Azure Active Directory. Developers can build applications that leverage the common identity model.

10 Registering and Enrolling Devices Users can enroll devices that configure the device for management with Windows Intune; the user can then use the Company Portal for easy access to corporate applications Data from Windows Intune is in sync with Configuration Manager, which provides unified management across both on-premises and in the cloud Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the user s identity.; multi-factor authentication can be used through Windows Azure Active Authentication (formerly PhoneFactor) As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device

11 Protect your data Challenges As users bring their own devices in to use for work, they will also want to access sensitive information and have access to this information locally on the device. A significant amount of corporate data can only be found locally on user devices. IT needs to be able to secure, classify, and protect data based on the content it contains, not just where it resides, including maintaining regulatory compliance. Solutions Users can work on the device of their choice and be able to access all their resources, while IT can identify at-risk devices through jailbreak and root detection IT can enforce a set of central access and audit polices, and be able to protect sensitive information based on the content of the documents. IT can centrally audit and report on information access.

12 Help protect corporate information and manage risk Users can access corporate data regardless of device or location with Work Folders for data sync and desktop virtualization for centralized applications. IT can provide a secure and familiar solution for users to access sensitive corporate data from anywhere with VDI and RemoteApp technologies. Personal Apps and Data Company Apps and Data Remote App Enrollment Lost Retired or Stolen Identify at-risk devices through jailbreak and root detection Selective wipe removes corporate applications, data, certificates/profiles, and policies based as supported by each platform Company Apps and Data Centralized Data Full wipe as supported by each platform Remote App Can be executed by IT or by user via Company Portal Policies Sensitive data or applications can be Policies kept off device and accessed via Remote Desktop Services Lost or Stolen Retired Personal Apps and Data

13 Full and Selective Wipe Category Windows 8.1 (x86/rt OMA-DM managed) Windows 8 RT Windows Phone ios Android Full Wipe ( through EAS) ( through EAS) Selective Wipe Corporate Apps (from ConfigMgr / Intune) VPN and Wifi Profiles (Uninstalled + sideloading key removed) Sideloading key removed Certificates Revoked on server N/A Revoked on server Revoked on server Revoked on server Settings Policy enforcement is removed Policy enforcement is removed Policy enforcement is removed Policy enforcement is removed Policy enforcement is removed Management Agent Corporate App Data N/A. Built into OS N/A. Built into OS N/A. Built into OS Management profile removed Data remains encrypted if app is EFS aware App container removed during uninstall App container removed during uninstall Device administrator privilege is revoked

14 Unified Device Management Console

15 Platform Support OS Platform Management Agent End User Experience Windows 8.1 PC ConfigMgr Agent Or Management Agent(OMA-DM) Software Center/Application Catalog Windows Company Portal app Windows PC ConfigMgr Agent Software Center/Application Catalog (Win8,Win7,Vista,XP) Windows RT Management agent (OMA-DM) Windows Company Portal app Windows Phone 8 Management agent (OMA-DM) Windows Phone 8 Company Portal app ios Apple MDM Protocol Native ios Company Portal App Android Android MDM agent (OMA-DM) Native Android Company Portal App Mac ConfigMgr Agent Limited self service experience Linux/Unix ConfigMgr Agent N/A

16 What s New in Mobile Device Inventory? Personal vs. Corporate Owned Devices By default, user-enrolled devices are Personal Admin can specify corporateowned devices App inventory Personal devices Inventory of applications installed by ConfigMgr/Intune only Corporate devices Complete inventory of all applications on the device* App Management New global condition to differentiate app installs on corporate versus personal * ios Apple MDM allows only inventory of MDM provisioned apps

17 Mobile Device Settings in ConfigMgr 2012 R2 Category Windows 8.1 PC & RT Windows Phone 8 ios VPN Android Wi-Fi Certificates Password (*) (*) (*) Device restrictions (*) (*) Store access Browsers (*) (*) Content Rating Cloud Synch Encryption (*) (*) (*) Security (*) (*) (*) * Subset of settings Note: Table applicable to direct MDM and not EAS

18 Resource Access Configuration New Features* Configure networking profiles VPN profiles Support for Windows 8.1 Automatic VPN Wi-Fi protocol and authentication settings Management and distribution of certificates Benefits End users get access to company resources with no manual steps for them Platforms Windows 8.1 Windows 8.1 RT ios Android

19 VPN Profile Management Support for major SSL VPN vendors Support for VPN standards Automatic VPN connection SSL VPNs from Cisco, Juniper, Check Point, Microsoft, Dell SonicWALL, F5 Subset of vendors have Windows Windows RT VPN plug-in PPTP,L2TP, IKEv2 DNS name-based initiation support for Windows 8.1 and ios Application ID based initiation support for Windows 8.1

20 Wi-Fi and Certificate Profiles Wi-Fi settings Manage Wi-Fi protocol and authentication settings Provision Wi-Fi networks that device can auto connect Specify certificate to be used for Wi-Fi connection Manage and distribute certificates Deploy trusted root certificates Support for Security Center Endpoint Protection(SCEP) protocol

21 Work Folders Sync files and data across devices New feature in Windows 8.1 client and Windows Server 2012 R2 Configuration Manager and Windows Intune support New settings to help provision the Work Folder discovery settings Company Portals have links to Work Folders

22 Distribution Point for Windows Azure Windows Azure Distribution Point PR1 Policy Content MP Firewall MP Microsoft Update Rich feature set Integrated monitoring In-console content monitoring Ability to monitor storage and traffic out usage Content is fully encrypted DP Corporate Network

23 Phil Schwan Technical

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges 2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium

More information

Course Outline Wood Avenue South Suite 405 Iselin, New Jersey 08830

Course Outline Wood Avenue South Suite 405 Iselin, New Jersey 08830 Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On-Premises Tools Course 20398B: 5 days Instructor Led About this course This course teaches IT professionals how

More information

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools 20398BA - 5 Days - Instructor-led, Hands-on Introduction This five-day course teaches IT professionals

More information

20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools

20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com

More information

Windows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft

Windows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Windows 10 Management Technologies: What s New Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Business needs are evolving. Windows 10 offers to meet those needs. MANAGEMENT CHOICES

More information

Managing Windows 8.1 Devices with XenMobile

Managing Windows 8.1 Devices with XenMobile Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect

More information

Windows 10 Azure AD / EMS

Windows 10 Azure AD / EMS Windows 10 Azure AD / EMS Jörgen Nilsson @ccmexec Jorgen.nilsson@onevinn.se Blog: http://ccmexec.com #win10tour The traditional IT environment is no more Our users have More than one device A large number

More information

Mobile device management at Microsoft

Mobile device management at Microsoft Mobile device management at Microsoft Page 1 Mobile device management at Microsoft Situation As the use of personal devices in the workplace expands, IT is challenged with managing a data environment where

More information

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Bhumik Patel Solutions Architect, Citrix Systems May 21 st 2013 App Complete Enterprise Mobility Business Apps Productivity and Collaboration

More information

Windows 7 Deployment Key Milestones

Windows 7 Deployment Key Milestones Windows 7 Deployment Key Milestones 2012 2013 2014 Client Deployment and Management Tool Windows 7 Deployment Select Tool (3-6 months) Deployment Tool Architecture (1-2 months) Assess Hardware (1-2 months)

More information

Managing and Maintaining Windows 8

Managing and Maintaining Windows 8 70-688 Managing and Maintaining Windows 8 New exam title: Supporting Windows 8.1 The following tables itemize changes to Exam 70-688. These changes will be made in January to include updates that relate

More information

NE Administering System Center Configuration Manager and Intune

NE Administering System Center Configuration Manager and Intune NE-20696 Administering System Center Configuration Manager and Intune Summary Duration 5 Days Audience IT Professionals Level 300 Technology System Center Configuration Manager Delivery Method Instructor-led

More information

Intune Policies Guide

Intune Policies Guide TechReady Are you ready to implement IT solutions? Intune Policies Guide Mobile Device Management with Enterprise Mobility Suite Created for: TechReady 15 September 2016 Version 0.3 Created by: Adrian

More information

COURSE OUTLINE: B Deploying and Managing Windows 10 Using Enterprise Services. Course Name. Course Duration Course Structure Course Overview

COURSE OUTLINE: B Deploying and Managing Windows 10 Using Enterprise Services. Course Name. Course Duration Course Structure Course Overview Course Name Course Duration Course Structure Course Overview Course Outcome Course Details 20697-2B Deploying and Managing Windows 10 Using Enterprise Services 5 Days Instructor-Led This course provides

More information

Windows 8/RT Features Matrix

Windows 8/RT Features Matrix Windows 8/RT Features Matrix The following matrix shows what AirWatch features are available to the Windows 8.0/RT and the Windows 8.1/RT platforms. Feature Windows 8.0/RT Windows 8.1/RT Activation & Enrollment

More information

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Security using IBM Endpoint Manager Mobile Device Management Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?

More information

AirWatch for ios Devices

AirWatch for ios Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third

More information

Windows 10. Tech Note. Open the Window to Endless Possibilities. Windows for the Enterprise. Universal App Experience

Windows 10. Tech Note. Open the Window to Endless Possibilities. Windows for the Enterprise. Universal App Experience Windows 10 ENTERPRISE MOBILITY MANAGEMENT Tech Note Open the Window to Endless Possibilities Windows 10 shows a renewed focus on the Enterprise. It successfully harmonizes user experience and device management

More information

Microsoft Deploying and Managing Windows 10 Using Enterprise Services

Microsoft Deploying and Managing Windows 10 Using Enterprise Services 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20697-2 Deploying and Managing Windows 10 Using Enterprise Services Length 5 days Price $4290.00 (inc GST) Version C Overview This course provides administrators

More information

Use EMS to protect your mobile data and mobile app

Use EMS to protect your mobile data and mobile app Use EMS to protect your mobile data and mobile app Peter Daalmans Senior Consultant, Enterprise Mobility MVP CTGlobal. pds@ctglobalservices.com PETER DAALMANS Enterprise Mobility MVP @ CTGlobal Blog: https://peterdaalmans.com

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY

More information

Microsoft IT deploys Work Folders as an enterprise client data management solution

Microsoft IT deploys Work Folders as an enterprise client data management solution Microsoft IT deploys Work Folders as an enterprise client data management solution Published May 2014 The following content may no longer reflect Microsoft s current position or infrastructure. This content

More information

Deploying and Managing Windows 10 Using Enterprise Services

Deploying and Managing Windows 10 Using Enterprise Services Deploying and Managing Windows 10 Using Enterprise Services Course # Exam: Prerequisites Technology: Delivery Method: Length: 20697-2 70-697 20697-1 Windows Instructor-led (classroom) 5 Days Overview About

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

Exam /Course C or B Configuring Windows Devices

Exam /Course C or B Configuring Windows Devices Exam 70-697/Course 20697-1C or 20697-2B Configuring Windows Devices Course 20697-2B Deploying and Managing Windows 10 Using Enterprise Services About this course This course provides administrators with

More information

2016 BITGLASS, INC. mobile. solution brief

2016 BITGLASS, INC. mobile. solution brief mobile solution brief BYOD Security has been a constant challenge for many enterprises. Stories of failed MDM deployments are rampant, with firms struggling achieve meaningful adoption. According to the

More information

MCSE- Windows Server 2012

MCSE- Windows Server 2012 COURSE CONTENT MCSE- Windows Server 2012 Course 20413C: Designing and Implementing a Server Infrastructure 1. Planning Server Upgrade and Migration Considerations for Upgrades and Migrations Creating a

More information

COURSE B: DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES

COURSE B: DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES ABOUT THIS COURSE This course provides administrators with the knowledge and skills necessary to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students

More information

33% 18% 66% President Convergent Computing

33% 18% 66% President Convergent Computing Start Justin President Convergent Computing http://www.cco.com randm@cco.com 66% 33% 18% 66% of employees use personal devices for work purposes. 33% of employees typically work on their employer s premises

More information

AirWatch for Android Devices for Skype for Business

AirWatch for Android Devices for Skype for Business Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Configuration Guide. BlackBerry UEM. Version 12.7 Maintenance Release 2

Configuration Guide. BlackBerry UEM. Version 12.7 Maintenance Release 2 Configuration Guide BlackBerry UEM Version 12.7 Maintenance Release 2 Published: 2017-12-04 SWD-20171130134721747 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the

More information

Go mobile. Stay in control.

Go mobile. Stay in control. Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget

More information

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

Citrix XenMobile and Windows 10

Citrix XenMobile and Windows 10 White Paper Citrix XenMobile and Windows 10 Citrix XenMobile and Windows 10 With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Windows

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

Deploying and Managing Windows 10 Using Enterprise Services

Deploying and Managing Windows 10 Using Enterprise Services Deploying and Managing Windows 10 Using Enterprise Services 20697-2; 5 Days; Instructor-led Course Description This 5-day course provides administrators with the knowledge and skills needed to deploy and

More information

Use Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers Nackers Consulting

Use Microsoft EMS. to Protect your Mobile Data and Mobile Apps. Chris Nackers  Nackers Consulting Use Microsoft EMS to Protect your Mobile Data and Mobile Apps Chris Nackers http://chrisnackers.com chris@nackersconsulting.com Nackers Consulting Peter Daalmans http://configmgrblog.com, peter@daalmans.com

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Secure & Unified Identity

Secure & Unified Identity Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong

More information

Conditional Access Policies

Conditional Access Policies Conditional Access Policies Microsoft Intune conditional access policies are configured against particular services, helping to ensure that only managed and compliant devices can access the service. They

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Virtru Microsoft Protection

Virtru Microsoft  Protection Virtru Microsoft Email Protection Seamless Experience, Automatic Protection, Persistent Control Encrypt Outlook and OWA on the client-side with the flip of a switch Track and control access to emails and

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and  Management SharePoint 2013 and Colligo Apps Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Email Management SharePoint 2013 is the latest release of Microsoft s leading business collaboration

More information

Six steps to control the uncontrollable

Six steps to control the uncontrollable Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today

More information

ShareFile Technical Presentation

ShareFile Technical Presentation ShareFile Technical Presentation Joerg Vosse Senior Systems Engineer - Citrix ShareFile CEE joerg.vosse@citrix.com ShareFile Enterprise Architecture Overview ShareFile Document Cloud ShareFile.com ShareFile.eu

More information

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4 About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10

More information

Sccm 2012 Automatically Approve Clients In Trusted Domains

Sccm 2012 Automatically Approve Clients In Trusted Domains Sccm 2012 Automatically Approve Clients In Trusted Domains One server and domain. The client is joined to the same domain as the server. Client Approval is set to "automatically approve computers in trusted

More information

Parallels Mac Management for Microsoft SCCM. Deployment Guide and Pre-Install Checklist. v6.1

Parallels Mac Management for Microsoft SCCM. Deployment Guide and Pre-Install Checklist. v6.1 Parallels Mac Management for Microsoft SCCM Deployment Guide and Pre-Install Checklist v6.1 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 parallels.com

More information

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Quick Heal Mobile Device Management. Available on

Quick Heal Mobile Device Management. Available on Available on Infinite Devices. One Unified Solution. Quick Heal A simple yet powerful solution, Quick Heal is a unified platform for managing and monitoring multiple mobile devices within your enterprise

More information

BMC Remedyforce Discovery and Client Management. Frequently asked questions

BMC Remedyforce Discovery and Client Management. Frequently asked questions BMC Remedyforce Discovery and Client Management Frequently asked questions 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce

More information

BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT

BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT WHITE PAPER DECEMBER 2016 BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT Unified endpoint management brings together traditional client management with a modern enterprise mobility management

More information

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

Company Portal. Peter Daalmans, IT Concern Greg Ramsey, Dell, INC

Company Portal. Peter Daalmans, IT Concern  Greg Ramsey, Dell, INC Company Portal Peter Daalmans, IT Concern http://configmgrblog.com/ Greg Ramsey, Dell, INC http://ramseyg.com @pdaalmans @ramseyg Who we are Greg Ramsey, Infrastructure Tools Strategist at Dell, Inc. Titles

More information

Microsoft Administering System Center Configuration Manager and Intune

Microsoft Administering System Center Configuration Manager and Intune 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20696 - Administering System Center Configuration Manager and Intune Length 5 days Price $4290.00 (inc GST) Version C Overview Please note: Microsoft have

More information

BYOD Business year of decision!

BYOD Business year of decision! Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco

More information

Microsoft licensing for the Consumerization of IT

Microsoft licensing for the Consumerization of IT Volume Licensing brief Microsoft licensing for the Consumerization of IT Table of Contents This brief applies to all Microsoft Volume Licensing programs. Summary... 1 What s New in This Brief... 1 Introduction...

More information

SAS and F5 integration at F5 Networks. Updates for Version 11.6

SAS and F5 integration at F5 Networks. Updates for Version 11.6 SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager and Intune Course 20696: Administering System Center Configuration Manager and Intune Page 1 of 10 Administering System Center Configuration Manager and Intune Course 20696: 4 days; Instructor-Led Introduction Get

More information

Expressway for Mobile and Remote Access Deployments, page 1 Cisco AnyConnect Deployments, page 9 Survivable Remote Site Telephony, page 17

Expressway for Mobile and Remote Access Deployments, page 1 Cisco AnyConnect Deployments, page 9 Survivable Remote Site Telephony, page 17 Expressway for Mobile and Deployments, page 1 Cisco AnyConnect Deployments, page 9 Survivable Remote Site Telephony, page 17 Expressway for Mobile and Deployments Expressway for Mobile and for Cisco Unified

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme UEM2205BE Get Up to Speed on Innovations in the Mobile Ecosystem: ios, macos, Android, and Chrome OS VMworld 2017 Content: Not for publication Sascha Warno #Vmworld #UEM2205BE Disclaimer This presentation

More information

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Maximize your investment in Microsoft Office 365 with Citrix Workspace White Paper Maximize your investment in Microsoft Office 365 with Citrix Workspace Maximize your investment in Microsoft Office 365 with Citrix Workspace Accelerate migration, simplify maintenance, and

More information

Enterprise Security Solutions by Quick Heal. Seqrite.

Enterprise Security Solutions by Quick Heal. Seqrite. Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices

More information

VMware AirWatch - Mobile Application Management and Developer Tools

VMware AirWatch - Mobile Application Management and Developer Tools VMware AirWatch - Mobile Application Management and Developer Tools Table of Contents Lab Overview - HOL-1857-05-UEM - VMware AirWatch: Mobile App Management and Developer Tools... 3 Lab Guidance... 4

More information

Application / Document Management. MaaS360 e-learning Portal Course 3

Application / Document Management. MaaS360 e-learning Portal Course 3 Application / Document Management MaaS360 e-learning Portal Course 3 Agenda > Application Management Overview MaaS360 Workflows Device Workflows > Document Management Overview MaaS360 Workflows Document

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

CONDITIONAL ACCESS FROM A TO Z

CONDITIONAL ACCESS FROM A TO Z CONDITIONAL ACCESS FROM A TO Z Peter Daalmans PeterDaalmans.com, pds@ctglobalservices.com, Senior Consultant CTGlobal Jörgen Nilsson Ccmexec.com, jorgen.nilsson@onevinn.se, Principal Consultant Onevinn

More information

20416B: Implementing Desktop Application Environments

20416B: Implementing Desktop Application Environments 20416B: Implementing Desktop Application Environments Course Details Course Code: Duration: Notes: 20416B 5 days This course syllabus should be used to determine whether the course is appropriate for the

More information

Six Myths of Windows RT Revealed!

Six Myths of Windows RT Revealed! Si Myths of Windows RT Revealed! Si Myths of Windows RT Revealed! There has been a lot of (mis)information being circulated about capabilities of Windows RT, the new Microsoft tablet operating system for

More information

Exam

Exam Exam 70-697 Number: 70-697 Passing Score: 800 Time Limit: 120 min File Version: 8.0 Exam Microsoft Exam 70-697 Configuring Windows Devices Exam A QUESTION 1 You are setting up a Windows 10 Enterprise computer.

More information

GET YOUR HOUSE IN ORDER. Patching and Imaging Creation Strategies

GET YOUR HOUSE IN ORDER. Patching and Imaging Creation Strategies GET YOUR HOUSE IN ORDER Patching and Imaging Creation Strategies SPEAKERS Phil Schwan Solution Architect Netrix, LLC Agenda Windows Image Management Windows Servicing Patch Management Build and Capture?

More information

VMware AirWatch Windows 7 Platform Guide Deploying and managing Windows 7 devices. Workspace ONE UEM v9.4

VMware AirWatch Windows 7 Platform Guide Deploying and managing Windows 7 devices. Workspace ONE UEM v9.4 VMware AirWatch Windows 7 Platform Guide Deploying and managing Windows 7 devices. Workspace ONE UEM v9.4 H a v e d o c u m e n t a t io n f e e d b a c k? S u b m it a D o c u m e n t a t io n F e e d

More information

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Citrix XenApp 6 on Remote Desktop Services Extending the Microsoft platform New features in XenApp

More information

Verizon MDM UEM Unified Endpoint Management

Verizon MDM UEM Unified Endpoint Management Verizon MDM UEM Unified Endpoint Management Version: 1.0 Last Updated: 3/29/18 Table of Contents Unified Endpoint Management (UEM) Overview... 4 Account Dashboard... 4 Unified Endpoint Management (UEM)

More information

Mobilize with Enterprise Security and a Productive User Experience

Mobilize  with Enterprise Security and a Productive User Experience Mobilize Email with Citrix XenMobile Mobilize Email with Enterprise Security and a Productive User Experience People need to be able to work with email productively wherever they go. Citrix.com 1 Email

More information

Deploying ipad to Patients Setup Guide

Deploying ipad to Patients Setup Guide Deploying ipad to Patients Setup Guide Contents Overview Getting Prepared Evaluate your infrastructure Create a configuration Automate device setup Distribute apps In-Room Storage Initial setup Reset your

More information

Technical Evaluation Best Practices Guide

Technical Evaluation Best Practices Guide Technical Evaluation Best Practices Guide How to test enterprise mobile security deployment, device monitoring, threat detection, and support TABLE OF CONTENTS STEP 1 Testing app deployment STEP 2 Testing

More information

An Enterprise Approach to Mobile File Access and Sharing

An Enterprise Approach to Mobile File Access and Sharing White Paper Filr An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Filr Competitive Differentiators...2 Filr High-Level

More information

Certificate Management

Certificate Management Certificate Management This guide provides information on...... Configuring the NotifyMDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...

More information

Exam : Implementing Microsoft Azure Infrastructure Solutions

Exam : Implementing Microsoft Azure Infrastructure Solutions Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service

More information

M20696 Administering System Center Configuration Manager and Intune

M20696 Administering System Center Configuration Manager and Intune M20696 Administering System Center Configuration Manager and Intune Course Number: M20696 Category: Technical Microsoft Duration: 5 days Certification: 70-696 Overview Get expert instruction and hands-on

More information

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager Description Get expert instruction and hands-on practice configuring and managing clients and devices using Microsoft

More information

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director Webinar: Mitigating the risks of uncontrolled content access from mobile devices Presented By: Brian Ulmer, Product Management Director 2013 1 Employees are going mobile Mobile devices are being used for

More information

What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services

What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services September 2017 Introduction This document is a summary of what s new in ios 11, macos

More information

Course : Installing and Configuring Windows 10

Course : Installing and Configuring Windows 10 Course 20697-1: Installing and Configuring Windows 10 Course details Module 1: Overview of Windows 10 This module introduces the Windows 10 operating system. It describes the new features in Windows 10,

More information

Partner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014

Partner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014 Partner Webinar AnyConnect 4.0 Rene Straube Cisco Germany December 2014 Agenda Introduction to AnyConnect 4.0 New Licensing Scheme for AnyConnect 4.0 How to migrate to the new Licensing? Ordering & Migration

More information

ConfigMgr 2012 R2 & Intune

ConfigMgr 2012 R2 & Intune ConfigMgr 2012 R2 & Intune Step by Step explained from setting it up, to identity control (ADFS, DRS and Workplace Join) Tim De Keukelaere Kenny Buntinx #MMSMinnesota #MMSCMIntune About Kenny @KennyBuntinx

More information

Enable Modern Work Styles with Microsoft VDI. Jeff Chin Windows Client Solutions Specialist

Enable Modern Work Styles with Microsoft VDI. Jeff Chin Windows Client Solutions Specialist Enable Modern Work Styles with Microsoft VDI Jeff Chin Windows Client Solutions Specialist Empowering People-centric IT User and Device Management Access and Information Protection Microsoft Virtual Desktop

More information

Unified Endpoint Management: Security and productivity for the digital workspace

Unified Endpoint Management: Security and productivity for the digital workspace White Paper Unified Endpoint Management: Security and productivity for the digital workspace Unified Endpoint Management: Security and productivity for the digital workspace The workplace has evolved from

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Dec 10, 2013 VERSION: 5.0R1 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform...

More information