Zebra Mobile extensions (Mx) Bruce A Willins

Size: px
Start display at page:

Download "Zebra Mobile extensions (Mx) Bruce A Willins"

Transcription

1 Zebra Mobile extensions (Mx) Bruce A Willins Sr Director Technology Solutions

2 Agenda The genesis of Mx - Why? What is Mx and Who Uses Mx How are Mx Features Being used by customers & Application Developers Tools That Enable Access To Mx

3 Mx OS Extensions Is An Enabler Advanced Management & Security Exactly with Mx alone end users get NOTHING!

4 MX Features Are Made Available Via Three Zebra Offerings (1) MDM Toolkit MDM Vendors Software Developer (3) EMDK (2) StageNow IT Administrator

5 Mx Designed To Meet COBO Demands > 1.5B Units (Smartphone & HH Devices) COBO COPE BYOD Personal - Only T&L Healthcare Retail Manufacturing Government CLD ILD Extended Life Cycles To Reduce TCO Hardened Security MDM/EMM To Reduce IT Overhead & Downtime Enterprise accessory ecosystem LoB Missing Critical High Differentiation / Ability To Customize High Customer Touch Short Life Cycles Ease of Use Over Security Consumer WIFI Limited IT Control Partial Wipe COPE/BYDO Focus / Context Limited App Extensibility Assumes Untrusted Apps User Controlled Updates Dual Persona Short Support Cycles Large Volume To Influence HTC/Others BYOD Bring Your Own Device COPE Corporately Owned Personally Enabled COBO Corporate Owned Business Only

6 Mx Need Driven By Mobile OS Inflection Point Driven By Smartphone Consumerization Smart Phones Application Rewrite and/or Re-Architect Microsoft Android HTML5/JS Apple WE8H / Win Enterprise Only OS s Other

7 The Genesis of Mx Value To Zebra Stakeholders Enabling App Developers Meeting IT Needs Leveraging Consumer Scale Zebra Utilities EMDK Enterprise Browser Rx Logger RhoMobile B+ Smartphones >20B App Downloads WinMobile Zebra MX - Enterprise Overlay Android

8 Change Drives Opportunity Enterprise Customers Are Taking This Opportunity To Re-architect Their Applications Improving The UX (keys to touch), Flattening UI s, Leveraging Gestures, Future Proofing (e.g. X-Platforms)

9 Device Admin API (DAAPI) - Necessary But Not Sufficient Policy Description Password enabled Minimum password length Alphanumeric password required Complex password required Minimum letters required in password Minimum lowercase letters required Minimum in non-letter password characters required Minimum in numerical password digits required Minimum in symbols password required in password Minimum uppercase letters required Password in expiration password timeout Password history restriction Maximum failed password attempts Maximum inactivity time lock Require storage encryption Disable camera Requires that devices ask for PIN or passwords. Other features Prompt user to set a new password. Lock device immediately. Wipe the device's data (that is, restore the device to its factory defaults). Set the required number of characters for the password. For example, Requires you that can passwords require have PIN or a combination passwords to of have letters at and least six numbers. Requires that They passwords may include must symbolic contain characters. at least a letter, a numerical The minimum digit, number and a special of letters symbol. required Introduced in the password in Android for all admins The minimum or a particular number of one. lowercase Introduced letters in Android required 3.0. in the password The minimum for all number admins of or non-letter a particular characters one. Introduced required in the password The minimum for all number admins of or numerical a particular digits one. required Introduced in the in password The minimum for all number admins of or symbols a particular required one. in Introduced the password in for all The admins minimum or a number particular of uppercase one. Introduced letters in required Android in 3.0. the password When the for password all admins will or expire, a particular expressed one. as Introduced a delta in in milliseconds This policy prevents from when users a device from reusing admin the sets last the n expiration unique passwords. Specifies how This many policy times is typically a user used can enter in conjunction the wrong password Sets the length before of the time device since wipes the user its data. last touched The Device the screen or Specifies pressed that a button the storage before area the device should locks be encrypted, the screen. if the When device Specifies supports that the it. camera Introduced should in Android be disabled Note that this doesn't have to be a permanent disabling. The camera can be

10 Android An Enterprise OS Beyond Android s Original Purpose - Consumer Mass Adoption (drive more search for Google) Android Continued Hardening Over 7 Deserts, 7 Years, 22 API Levels, and Billions of Deployments Froyo 2.2 (May 2010) - Device Admin API (DAAPI) ICS 4.0 (Oct 2011) - Turning Point For Enterprise Security Numerous Key Security Additions Strong Password Support EAS Policies VPN Support / Per-User VPNs Full Device Encryption Encrypted Key Store SE-Linux Additions ASLR (Address Space Layout Randomization).. (many more)

11 What Mx Is Not Directly extensible features available to end users via the UI Is not a proprietary version of Android Is not designed to replace Android functionality but to supplement Android functionality Does not cost you anything there are no licensing fees Does not take over you decide if and when to activate features Does not require installation it is pre-installed and ready to go Indiscriminant Access to privileged features/functions/apis

12 Mx Os Extension Basics How is the device configured? A device is configurable via XML constructs How is the XML generated? StageNow, EMDK, or MDM Toolkit, (manual but not recommended) What triggers the consumption of XML.An application binds to the MX framework and passes XML How do I know if the XML was consumed correctly? a response XML is generated

13 Mx Os Extensions Made Available via EMDK & StageNow 67+ Major Operations Some of Which Are Compound Operations Mx OS Extensions Foundation EMDK StageNow

14 Mx Is Available For AOSP & Google Mobile Services (GMS) Platforms GMS Challenges Privacy - relinquishment to Google of significant data rights, inconsistent with enterprise protection of data Google Account Logistics services require a Google account Forced Updates - Google Terms of Service (// When a Service requires or includes downloadable software, this software may update automatically on your device once a new version or feature is available. Malware Exposure - Google Play Riddled with Malware (NIST best practice no access to public app store Hardware Design Constraints all hardware designs must comply with Google CDD, which limits enterprise device choices Application & Customization Restrictions UI constraints Google Maps. Google+ Google Cloud Messaging Mobile Chrome Browser Potential Functional Limitations Must adhere to Compatibility Test Suite AOSP ~ 22.5% of All Smartphone Shipments (4Q 2014) ( GMS Features Google Cloud Platform Google Wallet Instant Buy Google Play Store Google Play Services Google Analytics Google Mail - GMAIL

15 Top 4 Mx FAQ Q: Would/Will you do something like Mx for OS s other than Android? A: We ve provided Mx like functionality for legacy operating systems through an SDK/EMDK. We cannot however extend such functionality in other closed operating systems such as WE8H and IOS. Q: What happens if later versions of Android include an Mx Feature? A: You have the option to use either and if a direct 1:1 mapping exists then the Mx operation will eventually be remapped. Q: Any consideration in making Mx an open standard? A: Yes. We are exploring 3 options to standarize Mx; industry consortium, standards organization, or directly into Android (preferred route). Q: Where do Mx features come from? A: Originally came from our domain knowledge but have now been driven by enterprise customer requests.

16 Privilege Access Functionality Through Mx Basic Android User Applications - Not Adequate For Many Enterprise Android Needs Unprivileged prevent adversely impacting; other applications, the operating system, accessing private data, accessing other application's files, performing network access, keeping the device awake End User Approved Permissions - Required permissions declared in the manifest are approved by end user Typically self-signed with a developer held certificate/private key (simply identifies author), Permission Levels Android apps list permissions in their manifest, Permissions are either (normal, dangerous, same signature, signatureorsystem (platform sign) Privileged Apps with Signature-or-System Protection Level Enterprise Functionality But Not Scalable System Apps - Critical Apps, Protected In read-only /System /app (cannot be uninstalled by user) User Apps that that are platform level signed (OEM Signed Applications) Mx Provides Gated, Controlled Access To Privilege Features, Platform Signing Is Not Necessary To Access Mx Features Some Consumer Offerings Do Not Adequately Protect Privilge APIS

17 Mx - Facilitating Rapid Response Feature Requests Working on Adoption Before Mx All Three Major Components Must Be Updated Under The Mx Paradigm Only A CSP Is Updated Code Changes Android Operating System MDM Agent 1). OS Update Zebra Rewrite, Test, & Release 2). MDM Agent Update MDM Rewrite, Test & Release Edit Zebra XML & DSD Documents CSP Update Sync MDM Management Console Software 3). MDM Console Software Update Rewrite, Test, & Release Console Software & UI MDM Compiles DSD For UI Update MDM Agent Use Existing MDM Sync To Bring To Device Existing MDM Agent Triggers XML Consumption

18 Mobile OS Mass Adoption Has Its Downside Worldwide Device Shipments (thousands of units, Gartner Oct 2013) Mobile Phones To Out-ship PC s By ~ 7:1 WW SMARTPHONE MARKET (UNITS) Mobile Phone Tablet/Ultramobile PC (Desk-based and Notebook)

19 REGULATORY COMPLIANCE IS FUNDAMENTAL TO ZEBRA CUSTOMERS DIRECTIVES/MANDATES/EDICTS Retail PCI DSS (Payment Card Industry Data Security Std) for mobile payment (MPoS) QSA (Qualified Security Assessor) Audits Critical Infrastructure Healthcare NERC CIP (North America Electric Reliability Corp Critical Infrastructure Protection) HIPAA, Health Insurance Portability & Accounting, HITECH, Omnibus Controlled Substances Financial Government DEA CSOS Controlled Substance Ordering System Sarbanes-Oxley, Gramm-Leach Bliley Act (GLBA), Basel II NIST FIPS Federal Information Processing Standards Gov t PED (portable electronic devices) Requirements STIGS (Security Technical Implementation Guide) DoD Directive (commercial wireless devices in DoD Gov t Info Grid (GIG) Federal Information Security Management Act (FISMA) / NIST Info Categorization Guidelines Legislation Requiring Breach Notification 46 States Have Enacted Breach Notification for Personal Information Federal Legislation In Discussion, But Pending

20 Mx-Osx Enables comprehensive Lockdown Principle of least privilege On/Off-Enable/Disable/Filter Interfaces ON /Off / Discovery Off Android Debug Bridge (ADB) Device File Access All USB Activity Cellular SD Access Proxy Sensors Recording Imager Camera GPS Speaker Display Brightness Software URL Filters Application White List Devices Settings & Capture User Settings Comprehensive Lockdown and Monitoring Enabling Only the Functionality Needed to Perform the Operation and No More

21 How Are Customers & Developers Using Mx I wonder what happens when I do this? UI Controls - My associates are invoking unnecessary settings which generates an IT service call and results in lost productivity.. Mx allows Black Listing of System Applications, black listing the settings apk limits the end user settings to; Sound, Display, & About. Limited Settings Enterprise Reset I want to programmatically reset the device but I also want to persist some applications, settings, and data Mx enables users to issue an enterprise reset, anything stored in the Zebra enterprise folder will persist over the reset. Certificate Management I need to install/revoke certs & enable staging on a secured network Silently Install/Remove A CA Root Cert Silently Install/Remove client certs / private key Auto-Clock Adjustment - device needs cert to get time update but cert cannot be installed due to invalid time set

22 How Are Customers & Developers Using Mx White Listing - My associates should only run approved applications.. Mx provides active (not just removal of icons) application white listing, limiting applications that can be loaded and/or executed to those explicitly approved Circle of Trust Submit To Mx White Listing Privilege Extensions My application wants to be able to submit XML and wants to designate other trusted applications to do the same... White Listed Approved applications can designate other trusted applications to enable Mx XML submissions Cannot Submit To Mx Mobile Application Management (MAM) I need to manage all applications on the device... Mx to install, remove, update, applications unattended. Launcher Control (Enterprise Home Screen) - I want an application specific device or I have part time workers that should not have full Android access... Mx allows you to control the launcher, with enterprise home screen the device can be locked to a limited set of capabilities

23 Sample Upcoming Mx Capabilities Mobile alerts are distracting our drivers, creating a safety hazard. Mx: Programmatic Control to Enable/Disable Mobile Alerts I have screens in my application that contain sensitive data which I do not want in a snapshot.or.the QSA for my MPOS application requires disabling screen shots. Mx: Programmatic control to prevent Screen snapshots I do not want sensitive information copied to the clipboard. Mx: Programmatic control to enable/disable the clipboard Notification Bar is allowing access to settings & applications Mx: Programmatic control to enable/disable pulling down of the notification bar

24 Mx New Real World Issues Escalated Lost/Stolen Devices Enterprise IDC 70% of enterprise data now resides on mobile devices ~4.3% of employee issued smartphones are lost or stolen (Ponemon Institute) 57% were unprotected 60% believed to have sensitive data Industries with the highest loss rate; healthcare & pharmaceuticals, education & research,public sector organizations Symantec Study Human Nature 50 lost Phones 43% Clicked Online Banking 53% Clicked HR Salaries 57% Opened saved passwords 72% Checked private photos

25 Mx - Dealing With Lost/Stolen Devices Autonomous Countermeasure Matrix For Android Mx Countermeasures Threats Wipe SD card Factory reset Wipe Secure Storage Keys Password Reset All Users Password Reset Specific User Lock Device Uninstall Specific Application Send Alert to Application via Intent Maximum password limit X MDM Client Removal Force through XML X X X Exchange ActiveSync (EAS) password limit x x x x x X X Device is Rooted X Exceeding a Configured Threshold Results in One or More Countermeasures Runs Autonomously on Device Negating Dependency on Network Connectivity Configured by Enterprise Administrator & Pushed to the Device

26 Mx => Numerous Features & Functions To Enhance Programmatic Device Control, Management & Security E.g. Profile Settings Zebra Technologies Confidential Restricted

27 MX Programmatic Configuration Extensible Configuration MX uses a standards based XML schema (OMA-CP PROV / MSPROV) New features can be developed and immediately plugged-in and used by all solutions (MDM, Staging, EMDK) Concurrent use by multiple applications with sync & async options on transient & persistent operations XML generated by Eclipse Pug-in (EMDK), StageNow workstation or MDM Console Developer EMDK Admin Staging / MDM XML File XML File MX Management System XML Object XML Object XML Object XML Object CSP CSP CSP CSP

28 THANK YOU

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

StageNow Eilbron Meghdies

StageNow Eilbron Meghdies StageNow Eilbron Meghdies Product Manager Agenda Introduction How it works Features Q & A WIIFM What s in it for me? Grow your business Accelerate the adoption of your Application Save Money StageNow saved

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Security using IBM Endpoint Manager Mobile Device Management Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?

More information

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. March 2018

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. March 2018 Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices March 2018 About this document Products covered This document describes Xperia in Business

More information

Pulse Workspace Appliance. Administration Guide

Pulse Workspace Appliance. Administration Guide Pulse Workspace Appliance Administration Guide Product Release 2.0, 1743.1 Document Revisions 1.0 Published Date January 2018 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 The Pulse

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third

More information

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices.

Xperia TM. in Business. Product overview. Read about the enterprise policies and features supported in Xperia devices. Xperia TM in Business Product overview Read about the enterprise policies and features supported in Xperia devices February 2017 About this document Products covered This document describes Xperia in Business

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016 Cybersecurity Conference Presentation North Bay Business Journal September 27, 2016 1 PRESENTER Francis Tam, CPA, CISM, CISA, CITP, CRISC, PCI QSA Partner Information Security and Infrastructure Practice

More information

Windows 8/RT Features Matrix

Windows 8/RT Features Matrix Windows 8/RT Features Matrix The following matrix shows what AirWatch features are available to the Windows 8.0/RT and the Windows 8.1/RT platforms. Feature Windows 8.0/RT Windows 8.1/RT Activation & Enrollment

More information

Enterprise Mobile Management (EMM) Policies

Enterprise Mobile Management (EMM) Policies Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software

More information

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview PCI DSS stands for Payment Card Industry Data Security Standard. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card

More information

Phil Schwan Technical

Phil Schwan Technical Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.

More information

Protecting Health Information

Protecting Health Information Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017 Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than

More information

Mobile Device policy Frequently Asked Questions April 2016

Mobile Device policy Frequently Asked Questions April 2016 Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration

More information

AirWatch for Android Devices for AirWatch InBox

AirWatch for Android Devices for AirWatch InBox Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...

More information

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today White Paper As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices.

More information

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction.... 3 Positive versus Negative Application Security....

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

Release Notes Zebra MC33x NN- 00-A Release for Non-GMS

Release Notes Zebra MC33x NN- 00-A Release for Non-GMS Release Notes Zebra MC33x 01-01-48-NN- 00-A Release for Non-GMS Introduction Description Zebra Value Adds Feature List Device Compatibility Component Contents Installation Requirements Installation Instructions

More information

The Convergence of Security and Compliance

The Convergence of Security and Compliance ebook The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction....3 Positive versus Negative Application Security....3

More information

Salesforce Mobile App Security Guide

Salesforce Mobile App Security Guide Salesforce Mobile App Security Guide Version 3, 0 @salesforcedocs Last updated: October 11, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener

More information

VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices

VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices AirWatch v8.1 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012 Trend Micro Guide and solution to help embrace Consumerization and BYOD James Walker EMEA Product Marketing Manager 26 September 2012 Agenda Consumerization What is it? What should I do? Mobile Security

More information

Complete document security

Complete document security DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

VMware AirWatch Android Platform Guide

VMware AirWatch Android Platform Guide VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

AirWatch Container. VMware Workspace ONE UEM

AirWatch Container. VMware Workspace ONE UEM VMware Workspace ONE UEM You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback

More information

Introduction to AWS GoldBase

Introduction to AWS GoldBase Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document

More information

Are You Flirting with Risk?

Are You Flirting with Risk? Are You Flirting with Risk? RSA Live Webcast October 15, 2013 Jessica Stanford Sr. Product Marketing Manager, RSA Authentication 1 2 3 4 5 RSA AUTHENTICATION MANAGER 8.0 Agenda Password Problem Market

More information

Android Enterprise Device Management with ZENworks 2017 Update 2

Android Enterprise Device Management with ZENworks 2017 Update 2 Android Enterprise Device Management with ZENworks 2017 Update 2 Article IT Operations Management Article Android Enterprise Device Management with ZENworks 2017 Update 2 Introduction With the release

More information

Workplace Online Using a standard web browser, simply login at us.awp.autotask.net using the credentials you ve been given.

Workplace Online Using a standard web browser, simply login at us.awp.autotask.net using the credentials you ve been given. Quick Start Guide WELCOME Thank you for taking the time to evaluate Autotask Workplace. This guide will help you quickly see how Workplace can benefit your business, especially for collaboration and working

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

McAfee Database Security

McAfee Database Security McAfee Database Security Sagena Security Day 6 September 2012 September 20, 2012 Franz Hüll Senior Security Consultant Agenda Overview database security DB security from McAfee (Sentrigo) VMD McAfee Vulnerability

More information

CipherCloud CASB+ Connector for ServiceNow

CipherCloud CASB+ Connector for ServiceNow ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level

More information

Managing Windows 8.1 Devices with XenMobile

Managing Windows 8.1 Devices with XenMobile Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect

More information

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.

More information

Release Notes Zebra VC80x NN-00-A Release for AOSP. Introduction. Introduction. Description. Zebra Value Adds Feature List

Release Notes Zebra VC80x NN-00-A Release for AOSP. Introduction. Introduction. Description. Zebra Value Adds Feature List Release Notes Zebra VC80x 01-01-48-NN-00-A Release for AOSP Introduction Description Zebra Value Adds Feature List Device Compatibility Component Contents Installation Requirements Installation Instructions

More information

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes This document includes the following topics: About

More information

Augmenting security and management of. Office 365 with Citrix XenMobile

Augmenting security and management of. Office 365 with Citrix XenMobile Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com

More information

Secure Messaging is far more than traditional encryption.

Secure Messaging is far more than traditional encryption. Resellers Secure Messaging TM Secure Messaging Secure Messaging is far more than traditional encryption. It s an easy-to-use encryption and message control platform that empowers greater communication,

More information

Device commands. Device Command. Compliance

Device commands. Device Command. Compliance Device commands Compliance Apply the latest Device mgmt. Profile & app info Apply the latest Device mgmt. Profile Apply the latest app mgmt. profile Apply the latest internal app info Apply customized

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

Managing Devices and Corporate Data on ios

Managing Devices and Corporate Data on ios Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible

More information

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges 2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium

More information

Are You Flirting with Risk?

Are You Flirting with Risk? Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}

More information

Make security part of your client systems refresh

Make security part of your client systems refresh Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Compliance and Privileged Password Management

Compliance and Privileged Password Management Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Citrix XenMobile and Windows 10

Citrix XenMobile and Windows 10 White Paper Citrix XenMobile and Windows 10 Citrix XenMobile and Windows 10 With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Windows

More information

Apple OS Deployment Guide for the Enterprise

Apple OS Deployment Guide for the Enterprise Apple OS Deployment Guide for the Enterprise So your organization is about to deploy Mac, iphone, ipad and/or Apple TV to your users and you re not sure where to start? That s where the Apple management

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

Enterprise Security Solutions by Quick Heal. Seqrite.

Enterprise Security Solutions by Quick Heal. Seqrite. Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices

More information

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card 10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'

More information

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media FAQ for KULT Basic 1. What do the Icons mean that can be found in notifications bar at the top of my screen? 2. How can I move an item on the home screen? 3. How can I switch between home screens? 4. How

More information

device management solution

device management solution MSP4: the COmprehensive mobile device management solution built FOR a BYOD world Motorola Solutions Services Get all the information you need to troubleshoot the mobile devices your enterprise owns as

More information

AirWatch for Android Devices for Skype for Business

AirWatch for Android Devices for Skype for Business Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

GlobalPlatform Trusted Execution Environment (TEE) for Mobile

GlobalPlatform Trusted Execution Environment (TEE) for Mobile GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Securing Institutional Data in a Mobile World

Securing Institutional Data in a Mobile World University of Wisconsin Madison Securing Institutional Data in a Mobile World July 13, 2017 Securing Institutional Data in a Mobile World / Agenda 01 What is a mobile device? 02 Protecting institutional

More information

Sales Training for DataMotion Products. March, 2014

Sales Training for DataMotion Products. March, 2014 Sales Training for DataMotion Products March, 2014 Outline Market Overview Product Overviews Competitive Overview Solution Examples 2 Market Overview Compliance is Complicated Financial Payment Card Industry

More information

Security Compliance and Data Governance: Dual problems, single solution CON8015

Security Compliance and Data Governance: Dual problems, single solution CON8015 Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

DoD Wireless Smartphone Security Requirements Matrix Version January 2011 DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Securing Mainframe File Transfers and TN3270

Securing Mainframe File Transfers and TN3270 Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme UEM2205BE Get Up to Speed on Innovations in the Mobile Ecosystem: ios, macos, Android, and Chrome OS VMworld 2017 Content: Not for publication Sascha Warno #Vmworld #UEM2205BE Disclaimer This presentation

More information

Release Notes ZebraTC20 Android N Rev A NN-00-M1 (Non-GMS)

Release Notes ZebraTC20 Android N Rev A NN-00-M1 (Non-GMS) Release Notes ZebraTC20 Android N Rev A 02-10-07-0-NN-00-M1 (Non-GMS) Contents Introduction Description Device Compatibility Component Contents Installation Requirements Installation Instructions Downloadable

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Release Notes Zebra VC80x Android N Update 003 based on NG-00-A (GMS)

Release Notes Zebra VC80x Android N Update 003 based on NG-00-A (GMS) Release Notes Zebra VC80x Android N Update 003 based on 01-01-48-NG-00-A (GMS) Introduction Description Device Compatibility Component Contents Installation Requirements Installation Instructions Special

More information