Enterprise Mobility Management Buyers Guide

Similar documents
Mobile Security using IBM Endpoint Manager Mobile Device Management

Securing Today s Mobile Workforce

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Quick Heal Mobile Device Management. Available on

XenApp, XenDesktop and XenMobile Integration

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Bring Your Own Device (BYOD) Best Practices & Technologies

The Device Has Left the Building

Enterprise Security Solutions by Quick Heal. Seqrite.

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

MaaS360 Secure Productivity Suite

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

RHM Presentation. Maas 360 Mobile device management

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Secure Access for Microsoft Office 365 & SaaS Applications

A Guide to Closing All Potential VDI Security Gaps

As Enterprise Mobility Usage Escalates, So Does Security Risk

Enterprise Security Solutions by Quick Heal. Seqrite.

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

The Connected Worker and the Enterprise of Things

Enterprise Mobility Management

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Design and deliver cloud-based apps and data for flexible, on-demand IT

Enterprise Mobility Management: completing the EMM story

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Go mobile. Stay in control.

2013 InterWorks, Page 1

PrinterOn Mobile App MDM/MAM. Basic Integration Guide

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

Securing Office 365 with MobileIron

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Crash course in Azure Active Directory

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Mobility, Security Concerns, and Avoidance

Mobile Device Management: A Real Need for the Mobile World

SECURE, CENTRALIZED, SIMPLE

Sophos Mobile Control Administrator guide. Product version: 5.1

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

Managing Windows 8.1 Devices with XenMobile

3-Part Guide to Developing a BYOD Strategy

BYOD: BRING YOUR OWN DEVICE.

Commercial Product Matrix

Deploying Lookout with IBM MaaS360

Symantec Endpoint Protection Cloud (SEPC)

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Google Identity Services for work

Phil Schwan Technical

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Bring Your Own Device

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

WHITEPAPER. How to secure your Post-perimeter world

Cisco Start. IT solutions designed to propel your business

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks

UNCLASSIFIED. Mimecast UK Archiving Service Description

Virtual Machine Encryption Security & Compliance in the Cloud

2016 BITGLASS, INC. mobile. solution brief

Securing Your Most Sensitive Data

Make security part of your client systems refresh

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

McAfee MVISION Mobile Microsoft Intune Integration Guide

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

What Dropbox Can t Do For Your Business

About us. How we help?

McAfee MVISION Mobile epo Extension Product Guide

Managing Devices and Corporate Data on ios

Mobility best practice. Tiered Access at Google

Microsoft IT deploys Work Folders as an enterprise client data management solution

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Exclusive Selling Mobility with Security

IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

Enterprise Mobile Management (EMM) Policies

What is a mobile protection product?

Protecting Health Information

white paper SMS Authentication: 10 Things to Know Before You Buy

McAfee MVISION Mobile Microsoft Intune Integration Guide

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

Mobile Devices prioritize User Experience

Next Generation Privilege Identity Management

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Microsoft 365 Business FAQs

Best Practices to Make BYOD, CYOD and COPE Simple and Secure

Office 365 Buyers Guide: Best Practices for Securing Office 365

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

Android Enterprise Device Management with ZENworks 2017 Update 2

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

How to Secure Your Cloud with...a Cloud?

The security challenge in a mobile world

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Quo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory,

Transcription:

Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business Leaders and users are embracing mobility and enjoying the flexibility and productivity these devices provide. The average knowledge worker carries three devices - which means there's a significant increase in mobile device usage in the workplace. Corporate IT departments are saddled with the responsibility to achieve a balance between corporate data protection and end user productivity, all while managing scarce IT resources.

An essential part of Bring Your Own Device (BYOD) is allowing users to choose their preferred devices and platforms. According to recent research, the mobile market has quickly become a three-way race with Android and ios commanding more than 80% of market share and Windows 8 Phone gaining momentum (see chart below). Standardising mobile platforms can potentially reduce IT complexity but with this trend, it is not likely to happen in the near future. The platform diversity only exacerbates IT s resource issue. Many IT professionals are evaluating Enterprise Mobility Management (EMM) solutions to help them manage the influx of mobile devices and shield them from the inherent 80 78.1% 70 70.3% 60 50 40 30 20 10 0 52.9% 17.6% 20.9% 23% 14.5% 8.1% 3.2% 0.6% 3.0% 2.6% 1.5% 2.9% 0.7% Android ios Blackberry Windows Phone/ (including Linux) Windows Mobile Q4 2013 MARKET SHARE Q4 2012 MARKET SHARE 2011 MARKET SHARE complexity of BYOD. Figure 1 Mobile OS market share 2011 2013. Source: IDC Worldwide Mobile Phone Tracker, February 12, 2014 This EMM buyers guide will walk you through the process of selecting the right mobile solution to fit your company s Bring Your Own Device (BYOD) objectives. It explains how an effective EMM system can support an organisation s workforce mobility strategy, ensure compliance, protect corporate data and provide centralised management of devices and apps while supporting easy administration. Plus, the guide includes a detailed table to compare features across the major mobile security vendors. Protect Corporate Data An EMM solution is intended to provide centralised security and management of mobile devices in order to protect corporate data stored on the devices, and data that these devices have access to. A comprehensive mobile security strategy must cover all aspects of mobile users and their interaction with corporate data. Many mobile operating systems have built-in security features such as device restrictions (disable camera) and encryption. Your EMM solution should allow you to control these functions to protect data. The ability to handle lost devices is critical and can be found in most EMM solutions. It allows the admin to locate, lock and/or delete corporate data on a device. Ideally, use a solution that allows users to locate, lock and wipe their own devices via a self-service portal. This not only reduces IT s workload but also enhances efficiency. Ultimately, your user will be the first one to know if his or her device is lost or stolen and should take immediate action. Enterprise Mobility Management Buyers Guide 2

In addition, IT needs to be aware of how users store, maintain, and collaborate on corporate content on a mobile device. According to a Sophos study, 46 percent of organisations embrace cloud storage providers as a method of collaborating on corporate content, yet over 60 percent of these organisations fail to encrypt the data that shared within the cloud on these mobile devices. In order to prevent data loss, data protection cannot end at the office door. Content must be protected anywhere and everywhere these devices go, and individual file encryption is essential to ensure that a malicious user cannot get access to sensitive company data. An EMM solution that provides transparent encryption of each file lets you rest assured that your documents and data remain safe not just in the office, but everywhere your users go. Compliance and Policy Enforcement An EMM solution protects corporate data by enforcing compliance with corporate security policies. Compliance checks ensure that only registered devices that meet your policies have full access to corporate data. End users who want to access corporate data using their mobile devices should understand that data access comes with a responsibility to comply with corporate mobility policy. IT professionals can use features of fully-functioned EMM solutions for enforcement and risk mitigation. Before granting data access, mobile devices must be registered. When a registered device connects, the EMM system checks the device against a set of company rules like jailbreaking, password configuration or blacklisted apps. In addition to the standard compliance check, some Enterprise Mobility Management (EMM) solutions allow you to embed corporate mobility policy on a self-service portal to ensure users understand and accept the policy before access is granted. Also, since users may own and use multiple mobile devices to access corporate data, your solution should allow you to set up group and user-based compliance rules. If your organisation has mixed device ownership, you might want to create separate rules for your corporate devices and those owned by your users. Risk Mitigation Smart IT professionals can mitigate risk and put some teeth into the enforcement of their mobility policy with an Enterprise Mobility Management solution. Risk mitigation actions can be set according to the severity of a policy breach. For minor cases, you may want to simply inform the users, or block non-compliant devices from accessing data or receiving corporate email. If your data is at risk, a remote wipe, either for the full device or a selective wipe of the company s data may be the only viable option. Risk mitigation is easier for the IT team if the EMM system has pre-configured and automated responses which are executed in the event of a compliance issue without the need for admin intervention. Examples include blocking email delivery, informing the user and/or the admin, or applying a lockdown profile. Automatic user notification of any compliance issues can significantly reduce IT s workload. Users can self-correct most of the issues without having to call the IT help desk. Enterprise Mobility Management Buyers Guide 3

Integrated Security: Anti-malware and Web Protection Mobile devices are simply tiny computers travelling everywhere with users; hence, mobile devices need the same level of robust, integrated antivirus protection, which includes both protection against mobile malware & web filtering for Android devices. In addition, since the web is the main infection vector, mobile security with web protection for Android users is highly recommended. Below is a short list of recommended functions in an EMM solution to protect against mobile malware: Automatically scan all newly installed apps for malware Quarantine infected devices Protect users from accessing malicious websites and block web pages by category Network Access Control In order to reduce the risk of data breaches, an EMM solution should constantly monitor device health and control network access accordingly. An EMM solution should constantly detect jailbreaks, blacklisted apps or insecure settings and assess device health, integrating with network security providers to revoke access to WiFi and/or VPN should a device be rendered non-compliant. Ideally, both the network security and EMM solution would come from a single vendor to provide a complete security portfolio. Enterprise Mobility Management Buyers Guide 4

Security Features at a Glance Security Solution Providers with EMM = YES X = NO Feature Sophos Symantec M c A f e e Kaspersky T r end DATA PROTECTION AND MOBILE ENCRYPTION COMPLIANCE AND POLICY ENFORCEMENT RISK MITIGATION ANTI-MALWARE AND WEB PROTECTION NEWORK ACCESS CONTROL Network Access Control X X X Complete security vendor X Mobile Suite, but no complete EP+Mobile Suite Via EPO Enterprise Mobility Management Buyers Guide

Security Features at a Glance Pure EMM Solution Providers = YES X = NO Feature S o p h o s Airwatch MobileIron IBM (Fiberlink) DATA PROTECTION AND MOBILE ENCRYPTION Locate, lock and wipe Corporate wipe Individual File Encryption COMPLIANCE AND POLICY ENFORCEMENT Allow or disallow jailbreaks / rooted devices Check for side-loading Enforce minimum allowed OS version Enforce device encryption Whitelist or Blacklist apps Enforce mandatory apps RISK MITIGATION Ability to block email access based on compliance status Notify administrator Ability to control network admission Automatically execute mitigation actions ANTI MALWARE AND WEB CONTROL Scan apps on install Ability to remotely trigger anti malware scan Block malicious apps (malware) Categorical Web Filtering Secure web browsing NEWORK ACCESS CONTROL Network Access Control Complete security vendor Enterprise Mobility Management Buyers Guide 6

Central Management of Mobile Devices, Content, E-Mail and Applications The BYOD reality is that end users are willing to give up some level of control of their personal mobile devices in order to gain flexibility, efficiency and productivity. At the same time, company IT professionals need to maintain a level of control in order to properly manage BYOD and ensure security. This may include having the ability to enforce company policy, maintain visibility on which devices are brought into the company network, what applications are installed on the device, and how content is accessed and shared. Mobile Device Management (MDM) Whether you deploy mobile devices or your employees bring their own, it is important to keep track of all the devices on your network. Select the EMM solution that provides an easy way to manage the mobile devices in your environment throughout their full lifecycle, from the initial setup and enrollment, right through to decommissioning. In addition, you will also need tools to help you with device inventory and reporting. Clear dashboards that provide device information at a glance, with structured tables or pie charts, show you all the devices and their status, such as their ownership, platform and compliance status. Mobile Content Management (MCM) Ensure your data protection does not end at the office door. Mobile Encryption on the devices brought into your organisation helps ensure that each document remains secure while allowing users to remain productive and collaborate safely. By extending a robust encryption solution onto your mobile devices, you ensure that IT has control over the way in which content is maintained and shared within the cloud; for example, if a malicious user gets access to an employee's dropbox account, having individual file encryption allows you to rest assured that the malicious user cannot access any of the company content without key access. Mobile Email Management (MEM) Secure company email access is essential, especially in a BYOD environment. MEM enables comprehensive security for your corporate email infrastructure by distributing email settings, getting your users productive in minutes, and by controlling access to email via a secure email gateway based on the device health. Moreover, it is important to be able to selectively wipe all company emails once a user leaves the company. Mobile Application Management (MAM) Giving your employees the tools to do their jobs makes good business sense, but in the BYOD world, this may result in the proliferation of a variety of mobile applications. The mobile application (MAM) module included in your EMM solution should help you manage them all, and enable you to push the required enterprise mobile apps, whitelist acceptable apps, and blacklist the risky ones. Integrated Security Android devices are particularly susceptible to malware, and it is important to protect the devices -- and your network -- with an EMM solution that offers integrated anti-malware, web protection, and network access control. These solutions can help protect Android users from data-stealing malware, and from accessing malicious websites. Enterprise Mobility Management Buyers Guide 7

Administration With so many different mobile devices to manage, you need a simple solution to keep your users working without increasing IT s burden. Self-Service Portal We advise you to select an EMM solution that comes with a comprehensive self-service portal. This reduces IT workload and empowers your users to do many common tasks themselves. After all, they would be the first to know if they bought a new device and wish to use it for work, or if a device is lost or stolen. Your self-service portal should provide end users with a simple step-by-step process for common tasks. A self-service portal allows users to: Register their own devices and agree to the company s mobility policy See their compliance status in the self-service portal and on their devices Receive guidance to help them become compliant Remotely locate, lock or wipe their devices and reset their passcode Decommission their device Configuration and Maintenance The ease of installation, configuration and maintenance should also be evaluated during your selection. A system with over-the-air setup and configuration from a web console can speed up deployment and reduce IT workload. Here is a quick checklist to gauge the simplicity of configuration, management and maintenance of your EMM. How quickly can the systems be set up and running? Can the system automatically assign profiles and policies to users or groups based upon their AD group membership? Does your EMM solution have the ability to automatically render a device compliant and have control over whether a user is permitted to access/receive corporate email? Can you configure all your devices including ios, Android and Samsung SAFE devices directly in the EMM system? Or are you required to use the separate iphone Configuration Utility? Is the workflow optimized, and how easily can you find the data you need to manage devices and policies? Can you manage your mobile devices anytime, anywhere? How is the interface design? Does it display information in a way that allows you to find the data quickly and mitigate problems in a few clicks? Enterprise Mobility Management Buyers Guide 8

Deployment Options We encourage users to select an EMM solution that offers a variety of deployment options to suit their needs, including: On-premise: software you install and manage on your own servers on-site. This version allows you to keep all data in-house. SaaS: allows you to do all administration via the web-based console without the need to install or update software. For those organisations seeking a simple, integrated web-based console and robust security for Mobile, please call 0800 160 1920 or visit www.classsnetworks.com/it Security. Can Your EMM Provider Do This? You should consider other factors when selecting your EMM providers. Ask these questions: 1. Flexibility of deployment. Does your EMM provider offer both onpremise management and a cloud-managed option? 2. User-based licensing. With each user bringing multiple mobile devices (smartphone, tablet) to work, licensing costs can easily get out of control. Does your EMM provider charge per device (per-node), or offer a user-centric pricing concept? 3. Support. Does your EMM solution provider offer 24/7 support? 4. Data Protection. With content increasingly shared and maintained on mobile devices, it is important to ensure that the EMM provider you choose offers mobile encryption to secure the corporate data. 5. Long-term viability. EMM is still relatively new with a lot of smaller, start up solution providers. You want to check if your provider is viable for the long run or likely to be acquired by other players. 6. Additional security for Android devices. You want to ensure your EMM provider offers additional anti-malware and web protection capabilities to protect Android devices. 7. Ability to innovate. Evaluate your EMM solution provider on their speed of innovation and adoption. Mobile device manufacturers are innovating at an incredible pace. Is your EMM provider agile enough to take advantage of what the latest OS has to offer? For example, Windows Phone 8, Samsung SAFE, or KNOX by SAFE? 8. Complete IT Security. Does your EMM provider provide complete IT security? And can it provide adjacent and integrated IT security solutions for your overall company IT security? Enterprise Mobility Management Buyers Guide 9

Enterprise Mobility Management Buyers Guide Class Networks are Certified Architects of Sophos Threat Management Systems. Sophos products help secure the networks used by 100 million people in 150 countries and 100,000 businesses, including Pixar, Under Armour, Northrop Grumman, Xerox, Ford, Avis, and Toshiba. Class Networks works with over 1,000 organisations in the voluntary sector providing business technology communications solutions. We have been the Trusted Supplier Partner for the NCVO, SCVO and WCVA for nearly twenty years. Please call 0800 160 1920 or email visit www.classnetworks.com or email contacts@classsnetworks.com. Class Networks Mobile Control Copyright 2014. Sophos Ltd. All rights reserved. Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names are trademarks or registered trademarks of their respective owners. Class Networks, Givon s House, Givon s Grove, Leatherhead, Surrey, KT22 8LY