Zebra Mobile extensions (Mx) Bruce A Willins
|
|
- Justin Jennings
- 6 years ago
- Views:
Transcription
1 Zebra Mobile extensions (Mx) Bruce A Willins Sr Director Technology Solutions
2 Agenda The genesis of Mx - Why? What is Mx and Who Uses Mx How are Mx Features Being used by customers & Application Developers Tools That Enable Access To Mx
3 Mx OS Extensions Is An Enabler Advanced Management & Security Exactly with Mx alone end users get NOTHING!
4 MX Features Are Made Available Via Three Zebra Offerings (1) MDM Toolkit MDM Vendors Software Developer (3) EMDK (2) StageNow IT Administrator
5 Mx Designed To Meet COBO Demands > 1.5B Units (Smartphone & HH Devices) COBO COPE BYOD Personal - Only T&L Healthcare Retail Manufacturing Government CLD ILD Extended Life Cycles To Reduce TCO Hardened Security MDM/EMM To Reduce IT Overhead & Downtime Enterprise accessory ecosystem LoB Missing Critical High Differentiation / Ability To Customize High Customer Touch Short Life Cycles Ease of Use Over Security Consumer WIFI Limited IT Control Partial Wipe COPE/BYDO Focus / Context Limited App Extensibility Assumes Untrusted Apps User Controlled Updates Dual Persona Short Support Cycles Large Volume To Influence HTC/Others BYOD Bring Your Own Device COPE Corporately Owned Personally Enabled COBO Corporate Owned Business Only
6 Mx Need Driven By Mobile OS Inflection Point Driven By Smartphone Consumerization Smart Phones Application Rewrite and/or Re-Architect Microsoft Android HTML5/JS Apple WE8H / Win Enterprise Only OS s Other
7 The Genesis of Mx Value To Zebra Stakeholders Enabling App Developers Meeting IT Needs Leveraging Consumer Scale Zebra Utilities EMDK Enterprise Browser Rx Logger RhoMobile B+ Smartphones >20B App Downloads WinMobile Zebra MX - Enterprise Overlay Android
8 Change Drives Opportunity Enterprise Customers Are Taking This Opportunity To Re-architect Their Applications Improving The UX (keys to touch), Flattening UI s, Leveraging Gestures, Future Proofing (e.g. X-Platforms)
9 Device Admin API (DAAPI) - Necessary But Not Sufficient Policy Description Password enabled Minimum password length Alphanumeric password required Complex password required Minimum letters required in password Minimum lowercase letters required Minimum in non-letter password characters required Minimum in numerical password digits required Minimum in symbols password required in password Minimum uppercase letters required Password in expiration password timeout Password history restriction Maximum failed password attempts Maximum inactivity time lock Require storage encryption Disable camera Requires that devices ask for PIN or passwords. Other features Prompt user to set a new password. Lock device immediately. Wipe the device's data (that is, restore the device to its factory defaults). Set the required number of characters for the password. For example, Requires you that can passwords require have PIN or a combination passwords to of have letters at and least six numbers. Requires that They passwords may include must symbolic contain characters. at least a letter, a numerical The minimum digit, number and a special of letters symbol. required Introduced in the password in Android for all admins The minimum or a particular number of one. lowercase Introduced letters in Android required 3.0. in the password The minimum for all number admins of or non-letter a particular characters one. Introduced required in the password The minimum for all number admins of or numerical a particular digits one. required Introduced in the in password The minimum for all number admins of or symbols a particular required one. in Introduced the password in for all The admins minimum or a number particular of uppercase one. Introduced letters in required Android in 3.0. the password When the for password all admins will or expire, a particular expressed one. as Introduced a delta in in milliseconds This policy prevents from when users a device from reusing admin the sets last the n expiration unique passwords. Specifies how This many policy times is typically a user used can enter in conjunction the wrong password Sets the length before of the time device since wipes the user its data. last touched The Device the screen or Specifies pressed that a button the storage before area the device should locks be encrypted, the screen. if the When device Specifies supports that the it. camera Introduced should in Android be disabled Note that this doesn't have to be a permanent disabling. The camera can be
10 Android An Enterprise OS Beyond Android s Original Purpose - Consumer Mass Adoption (drive more search for Google) Android Continued Hardening Over 7 Deserts, 7 Years, 22 API Levels, and Billions of Deployments Froyo 2.2 (May 2010) - Device Admin API (DAAPI) ICS 4.0 (Oct 2011) - Turning Point For Enterprise Security Numerous Key Security Additions Strong Password Support EAS Policies VPN Support / Per-User VPNs Full Device Encryption Encrypted Key Store SE-Linux Additions ASLR (Address Space Layout Randomization).. (many more)
11 What Mx Is Not Directly extensible features available to end users via the UI Is not a proprietary version of Android Is not designed to replace Android functionality but to supplement Android functionality Does not cost you anything there are no licensing fees Does not take over you decide if and when to activate features Does not require installation it is pre-installed and ready to go Indiscriminant Access to privileged features/functions/apis
12 Mx Os Extension Basics How is the device configured? A device is configurable via XML constructs How is the XML generated? StageNow, EMDK, or MDM Toolkit, (manual but not recommended) What triggers the consumption of XML.An application binds to the MX framework and passes XML How do I know if the XML was consumed correctly? a response XML is generated
13 Mx Os Extensions Made Available via EMDK & StageNow 67+ Major Operations Some of Which Are Compound Operations Mx OS Extensions Foundation EMDK StageNow
14 Mx Is Available For AOSP & Google Mobile Services (GMS) Platforms GMS Challenges Privacy - relinquishment to Google of significant data rights, inconsistent with enterprise protection of data Google Account Logistics services require a Google account Forced Updates - Google Terms of Service (// When a Service requires or includes downloadable software, this software may update automatically on your device once a new version or feature is available. Malware Exposure - Google Play Riddled with Malware (NIST best practice no access to public app store Hardware Design Constraints all hardware designs must comply with Google CDD, which limits enterprise device choices Application & Customization Restrictions UI constraints Google Maps. Google+ Google Cloud Messaging Mobile Chrome Browser Potential Functional Limitations Must adhere to Compatibility Test Suite AOSP ~ 22.5% of All Smartphone Shipments (4Q 2014) ( GMS Features Google Cloud Platform Google Wallet Instant Buy Google Play Store Google Play Services Google Analytics Google Mail - GMAIL
15 Top 4 Mx FAQ Q: Would/Will you do something like Mx for OS s other than Android? A: We ve provided Mx like functionality for legacy operating systems through an SDK/EMDK. We cannot however extend such functionality in other closed operating systems such as WE8H and IOS. Q: What happens if later versions of Android include an Mx Feature? A: You have the option to use either and if a direct 1:1 mapping exists then the Mx operation will eventually be remapped. Q: Any consideration in making Mx an open standard? A: Yes. We are exploring 3 options to standarize Mx; industry consortium, standards organization, or directly into Android (preferred route). Q: Where do Mx features come from? A: Originally came from our domain knowledge but have now been driven by enterprise customer requests.
16 Privilege Access Functionality Through Mx Basic Android User Applications - Not Adequate For Many Enterprise Android Needs Unprivileged prevent adversely impacting; other applications, the operating system, accessing private data, accessing other application's files, performing network access, keeping the device awake End User Approved Permissions - Required permissions declared in the manifest are approved by end user Typically self-signed with a developer held certificate/private key (simply identifies author), Permission Levels Android apps list permissions in their manifest, Permissions are either (normal, dangerous, same signature, signatureorsystem (platform sign) Privileged Apps with Signature-or-System Protection Level Enterprise Functionality But Not Scalable System Apps - Critical Apps, Protected In read-only /System /app (cannot be uninstalled by user) User Apps that that are platform level signed (OEM Signed Applications) Mx Provides Gated, Controlled Access To Privilege Features, Platform Signing Is Not Necessary To Access Mx Features Some Consumer Offerings Do Not Adequately Protect Privilge APIS
17 Mx - Facilitating Rapid Response Feature Requests Working on Adoption Before Mx All Three Major Components Must Be Updated Under The Mx Paradigm Only A CSP Is Updated Code Changes Android Operating System MDM Agent 1). OS Update Zebra Rewrite, Test, & Release 2). MDM Agent Update MDM Rewrite, Test & Release Edit Zebra XML & DSD Documents CSP Update Sync MDM Management Console Software 3). MDM Console Software Update Rewrite, Test, & Release Console Software & UI MDM Compiles DSD For UI Update MDM Agent Use Existing MDM Sync To Bring To Device Existing MDM Agent Triggers XML Consumption
18 Mobile OS Mass Adoption Has Its Downside Worldwide Device Shipments (thousands of units, Gartner Oct 2013) Mobile Phones To Out-ship PC s By ~ 7:1 WW SMARTPHONE MARKET (UNITS) Mobile Phone Tablet/Ultramobile PC (Desk-based and Notebook)
19 REGULATORY COMPLIANCE IS FUNDAMENTAL TO ZEBRA CUSTOMERS DIRECTIVES/MANDATES/EDICTS Retail PCI DSS (Payment Card Industry Data Security Std) for mobile payment (MPoS) QSA (Qualified Security Assessor) Audits Critical Infrastructure Healthcare NERC CIP (North America Electric Reliability Corp Critical Infrastructure Protection) HIPAA, Health Insurance Portability & Accounting, HITECH, Omnibus Controlled Substances Financial Government DEA CSOS Controlled Substance Ordering System Sarbanes-Oxley, Gramm-Leach Bliley Act (GLBA), Basel II NIST FIPS Federal Information Processing Standards Gov t PED (portable electronic devices) Requirements STIGS (Security Technical Implementation Guide) DoD Directive (commercial wireless devices in DoD Gov t Info Grid (GIG) Federal Information Security Management Act (FISMA) / NIST Info Categorization Guidelines Legislation Requiring Breach Notification 46 States Have Enacted Breach Notification for Personal Information Federal Legislation In Discussion, But Pending
20 Mx-Osx Enables comprehensive Lockdown Principle of least privilege On/Off-Enable/Disable/Filter Interfaces ON /Off / Discovery Off Android Debug Bridge (ADB) Device File Access All USB Activity Cellular SD Access Proxy Sensors Recording Imager Camera GPS Speaker Display Brightness Software URL Filters Application White List Devices Settings & Capture User Settings Comprehensive Lockdown and Monitoring Enabling Only the Functionality Needed to Perform the Operation and No More
21 How Are Customers & Developers Using Mx I wonder what happens when I do this? UI Controls - My associates are invoking unnecessary settings which generates an IT service call and results in lost productivity.. Mx allows Black Listing of System Applications, black listing the settings apk limits the end user settings to; Sound, Display, & About. Limited Settings Enterprise Reset I want to programmatically reset the device but I also want to persist some applications, settings, and data Mx enables users to issue an enterprise reset, anything stored in the Zebra enterprise folder will persist over the reset. Certificate Management I need to install/revoke certs & enable staging on a secured network Silently Install/Remove A CA Root Cert Silently Install/Remove client certs / private key Auto-Clock Adjustment - device needs cert to get time update but cert cannot be installed due to invalid time set
22 How Are Customers & Developers Using Mx White Listing - My associates should only run approved applications.. Mx provides active (not just removal of icons) application white listing, limiting applications that can be loaded and/or executed to those explicitly approved Circle of Trust Submit To Mx White Listing Privilege Extensions My application wants to be able to submit XML and wants to designate other trusted applications to do the same... White Listed Approved applications can designate other trusted applications to enable Mx XML submissions Cannot Submit To Mx Mobile Application Management (MAM) I need to manage all applications on the device... Mx to install, remove, update, applications unattended. Launcher Control (Enterprise Home Screen) - I want an application specific device or I have part time workers that should not have full Android access... Mx allows you to control the launcher, with enterprise home screen the device can be locked to a limited set of capabilities
23 Sample Upcoming Mx Capabilities Mobile alerts are distracting our drivers, creating a safety hazard. Mx: Programmatic Control to Enable/Disable Mobile Alerts I have screens in my application that contain sensitive data which I do not want in a snapshot.or.the QSA for my MPOS application requires disabling screen shots. Mx: Programmatic control to prevent Screen snapshots I do not want sensitive information copied to the clipboard. Mx: Programmatic control to enable/disable the clipboard Notification Bar is allowing access to settings & applications Mx: Programmatic control to enable/disable pulling down of the notification bar
24 Mx New Real World Issues Escalated Lost/Stolen Devices Enterprise IDC 70% of enterprise data now resides on mobile devices ~4.3% of employee issued smartphones are lost or stolen (Ponemon Institute) 57% were unprotected 60% believed to have sensitive data Industries with the highest loss rate; healthcare & pharmaceuticals, education & research,public sector organizations Symantec Study Human Nature 50 lost Phones 43% Clicked Online Banking 53% Clicked HR Salaries 57% Opened saved passwords 72% Checked private photos
25 Mx - Dealing With Lost/Stolen Devices Autonomous Countermeasure Matrix For Android Mx Countermeasures Threats Wipe SD card Factory reset Wipe Secure Storage Keys Password Reset All Users Password Reset Specific User Lock Device Uninstall Specific Application Send Alert to Application via Intent Maximum password limit X MDM Client Removal Force through XML X X X Exchange ActiveSync (EAS) password limit x x x x x X X Device is Rooted X Exceeding a Configured Threshold Results in One or More Countermeasures Runs Autonomously on Device Negating Dependency on Network Connectivity Configured by Enterprise Administrator & Pushed to the Device
26 Mx => Numerous Features & Functions To Enhance Programmatic Device Control, Management & Security E.g. Profile Settings Zebra Technologies Confidential Restricted
27 MX Programmatic Configuration Extensible Configuration MX uses a standards based XML schema (OMA-CP PROV / MSPROV) New features can be developed and immediately plugged-in and used by all solutions (MDM, Staging, EMDK) Concurrent use by multiple applications with sync & async options on transient & persistent operations XML generated by Eclipse Pug-in (EMDK), StageNow workstation or MDM Console Developer EMDK Admin Staging / MDM XML File XML File MX Management System XML Object XML Object XML Object XML Object CSP CSP CSP CSP
28 THANK YOU
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationStageNow Eilbron Meghdies
StageNow Eilbron Meghdies Product Manager Agenda Introduction How it works Features Q & A WIIFM What s in it for me? Grow your business Accelerate the adoption of your Application Save Money StageNow saved
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationXperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. March 2018
Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices March 2018 About this document Products covered This document describes Xperia in Business
More informationPulse Workspace Appliance. Administration Guide
Pulse Workspace Appliance Administration Guide Product Release 2.0, 1743.1 Document Revisions 1.0 Published Date January 2018 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 The Pulse
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationXperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third
More informationXperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices.
Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices February 2017 About this document Products covered This document describes Xperia in Business
More information3CX Mobile Device Manager
3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples
More informationCybersecurity Conference Presentation North Bay Business Journal. September 27, 2016
Cybersecurity Conference Presentation North Bay Business Journal September 27, 2016 1 PRESENTER Francis Tam, CPA, CISM, CISA, CITP, CRISC, PCI QSA Partner Information Security and Infrastructure Practice
More informationWindows 8/RT Features Matrix
Windows 8/RT Features Matrix The following matrix shows what AirWatch features are available to the Windows 8.0/RT and the Windows 8.1/RT platforms. Feature Windows 8.0/RT Windows 8.1/RT Activation & Enrollment
More informationEnterprise Mobile Management (EMM) Policies
Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software
More informationOverview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview
PCI DSS stands for Payment Card Industry Data Security Standard. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card
More informationPhil Schwan Technical
Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.
More informationProtecting Health Information
Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationThe Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions
The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationThomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017
Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than
More informationMobile Device policy Frequently Asked Questions April 2016
Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration
More informationAirWatch for Android Devices for AirWatch InBox
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.
More informationImplementing Your BYOD Mobility Strategy An IT Checklist and Guide
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...
More informationA Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper
A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today White Paper As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices.
More informationThe Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls
The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction.... 3 Positive versus Negative Application Security....
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More informationRelease Notes Zebra MC33x NN- 00-A Release for Non-GMS
Release Notes Zebra MC33x 01-01-48-NN- 00-A Release for Non-GMS Introduction Description Zebra Value Adds Feature List Device Compatibility Component Contents Installation Requirements Installation Instructions
More informationThe Convergence of Security and Compliance
ebook The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction....3 Positive versus Negative Application Security....3
More informationSalesforce Mobile App Security Guide
Salesforce Mobile App Security Guide Version 3, 0 @salesforcedocs Last updated: October 11, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationWeighing in on the Benefits of a SAS 70 Audit for Third Party Administrators
Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener
More informationVMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices
VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices AirWatch v8.1 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationTrend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012
Trend Micro Guide and solution to help embrace Consumerization and BYOD James Walker EMEA Product Marketing Manager 26 September 2012 Agenda Consumerization What is it? What should I do? Mobile Security
More informationComplete document security
DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important
More informationInformation Security BYOD Procedure
Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,
More informationVMware AirWatch Android Platform Guide
VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationAirWatch Container. VMware Workspace ONE UEM
VMware Workspace ONE UEM You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback
More informationIntroduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationAre You Flirting with Risk?
Are You Flirting with Risk? RSA Live Webcast October 15, 2013 Jessica Stanford Sr. Product Marketing Manager, RSA Authentication 1 2 3 4 5 RSA AUTHENTICATION MANAGER 8.0 Agenda Password Problem Market
More informationAndroid Enterprise Device Management with ZENworks 2017 Update 2
Android Enterprise Device Management with ZENworks 2017 Update 2 Article IT Operations Management Article Android Enterprise Device Management with ZENworks 2017 Update 2 Introduction With the release
More informationWorkplace Online Using a standard web browser, simply login at us.awp.autotask.net using the credentials you ve been given.
Quick Start Guide WELCOME Thank you for taking the time to evaluate Autotask Workplace. This guide will help you quickly see how Workplace can benefit your business, especially for collaboration and working
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationEnsuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard
Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationThe Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
More informationMcAfee Database Security
McAfee Database Security Sagena Security Day 6 September 2012 September 20, 2012 Franz Hüll Senior Security Consultant Agenda Overview database security DB security from McAfee (Sentrigo) VMD McAfee Vulnerability
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationManaging Windows 8.1 Devices with XenMobile
Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect
More informationSQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY
SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.
More informationRelease Notes Zebra VC80x NN-00-A Release for AOSP. Introduction. Introduction. Description. Zebra Value Adds Feature List
Release Notes Zebra VC80x 01-01-48-NN-00-A Release for AOSP Introduction Description Zebra Value Adds Feature List Device Compatibility Component Contents Installation Requirements Installation Instructions
More informationSymantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes
Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes This document includes the following topics: About
More informationAugmenting security and management of. Office 365 with Citrix XenMobile
Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com
More informationSecure Messaging is far more than traditional encryption.
Resellers Secure Messaging TM Secure Messaging Secure Messaging is far more than traditional encryption. It s an easy-to-use encryption and message control platform that empowers greater communication,
More informationDevice commands. Device Command. Compliance
Device commands Compliance Apply the latest Device mgmt. Profile & app info Apply the latest Device mgmt. Profile Apply the latest app mgmt. profile Apply the latest internal app info Apply customized
More informationSingle Sign-On. Introduction
Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More informationhidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL
Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
More informationManaging Devices and Corporate Data on ios
Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible
More informationHow Microsoft s Enterprise Mobility Suite Provides helps with those challenges
2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium
More informationAre You Flirting with Risk?
Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationTable of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1
Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle
More informationGoogle Sync Integration Guide. VMware Workspace ONE UEM 1902
Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,
More informationCompliance and Privileged Password Management
Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationCitrix XenMobile and Windows 10
White Paper Citrix XenMobile and Windows 10 Citrix XenMobile and Windows 10 With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Windows
More informationApple OS Deployment Guide for the Enterprise
Apple OS Deployment Guide for the Enterprise So your organization is about to deploy Mac, iphone, ipad and/or Apple TV to your users and you re not sure where to start? That s where the Apple management
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationCirius Secure Messaging Single Sign-On
Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationBalancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld
Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationEnterprise Security Solutions by Quick Heal. Seqrite.
Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices
More informationThe following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card
10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'
More informationDeploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE
Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationFAQ for KULT Basic. Connections. Settings. Calls. Apps. Media
FAQ for KULT Basic 1. What do the Icons mean that can be found in notifications bar at the top of my screen? 2. How can I move an item on the home screen? 3. How can I switch between home screens? 4. How
More informationdevice management solution
MSP4: the COmprehensive mobile device management solution built FOR a BYOD world Motorola Solutions Services Get all the information you need to troubleshoot the mobile devices your enterprise owns as
More informationAirWatch for Android Devices for Skype for Business
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationGlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationVodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
More informationSecuring Institutional Data in a Mobile World
University of Wisconsin Madison Securing Institutional Data in a Mobile World July 13, 2017 Securing Institutional Data in a Mobile World / Agenda 01 What is a mobile device? 02 Protecting institutional
More informationSales Training for DataMotion Products. March, 2014
Sales Training for DataMotion Products March, 2014 Outline Market Overview Product Overviews Competitive Overview Solution Examples 2 Market Overview Compliance is Complicated Financial Payment Card Industry
More informationSecurity Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
More informationVMware AirWatch Google Sync Integration Guide Securing Your Infrastructure
VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationDoD Wireless Smartphone Security Requirements Matrix Version January 2011
DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation
More informationTable of Contents. VMware AirWatch: Technology Partner Integration
Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationSecuring Mainframe File Transfers and TN3270
Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
UEM2205BE Get Up to Speed on Innovations in the Mobile Ecosystem: ios, macos, Android, and Chrome OS VMworld 2017 Content: Not for publication Sascha Warno #Vmworld #UEM2205BE Disclaimer This presentation
More informationRelease Notes ZebraTC20 Android N Rev A NN-00-M1 (Non-GMS)
Release Notes ZebraTC20 Android N Rev A 02-10-07-0-NN-00-M1 (Non-GMS) Contents Introduction Description Device Compatibility Component Contents Installation Requirements Installation Instructions Downloadable
More informationTable of Contents HOL-1757-MBL-6
Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...
More informationVMware AirWatch Google Sync Integration Guide Securing Your Infrastructure
VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationRelease Notes Zebra VC80x Android N Update 003 based on NG-00-A (GMS)
Release Notes Zebra VC80x Android N Update 003 based on 01-01-48-NG-00-A (GMS) Introduction Description Device Compatibility Component Contents Installation Requirements Installation Instructions Special
More information