SlideShare a Scribd company logo
1 of 38
Copyright © 2014 MobileWorxs
Android can be secure with
SOTI MobiControl
and
Android Plus technology
Mobile Device Management
www.soti.net
Android In the
Enterprise
SOTI Inc. Presents
Is Android Taking Over the World?
Android’s Rise to Platform Dominance
Source: Statista
Android Continues to Gain Momentum
Source: Statista
Is Android Becoming the New Windows?
Source: Statista
Barriers to Android
Entry in the Enterprise
Android in the Enterprise
Top 3 hurdles to enterprise adoption:
1. Fear of OS compromise
2. Perceived lack of protection against data leakage
3. Limited policy controls and management
Perceived Insecurity of Android
According to a recent VDC
Research survey where CIOs were
asked which platform they
perceived as most secure, Android
was rated as the most insecure
mobile platform, especially among
larger organizations (>$1B annual
revenue).
Android Fragmentation:
The Elephant in the Room
Android OS Fragmentation Is Growing
Limited Policy Controls
You can’t protect what you can’t control
• Security risks
• Safeguarding corporate data
• Malware, viruses, and hacking
• Secure remote access
• Compliance and privacy
• Lost or stolen devices
• Parting employee data recovery
Android’s Way Forward
in the Enterprise
Why Android Has a Future in the Enterprise
1. Gartner predicts that Android will top 1 billion shipments this year – 3 times the number of
Apple devices expected to ship
2. The sheer number of Android devices in the hands of BYOD employees will force IT to fold
Android into their enterprise mix
3. Android comes in all shapes - sizes , providing a larger flexibility to get use cases to business
4. Cost advantages enable leveraging low cost devices with faster retire cycles for business
5. Android+
RESULT: Android is starting to win over reluctant IT gatekeepers
What’s Needed for
Android to become a
good corporate citizen
1. Enterprises need to be able to set consistent
management policies across broad range of Android
devices (Management)
2. Enterprises need deep management policies to be
able to customize the device to meet business needs
(Productivity)
3. Deep security policies to allow businesses to trust
Android (Compliance)
4. IT needs tools to provide the same level of end-user
support for mobile (Support)
Google Strikes Back
Google leaning on OEMs to use latest
version of Android on their devices
• If OEMs want to receive access to Google Play Store and
Google Apps, they need to get moving
• Google will not be certifying devices that cross a cut-off
date for each Android firmware release
• Cut-off dates from Android 2.3 Froyo through 4.1 Jelly
Bean have already passed
• Google will no longer certify any device that’s running
firmware version below Android 4.1
• Cut-off date for Android 4.3 Jelly Bean is July 31, 2014
SOTI Changes the Game
SOTI MobiControl:
Android Management Redefined
SOTI’s Solution to Android Fragmentation:
Android+
SOTI Android+ MDM Strategy
MobiControl
Agent
Android APIs
(Protected)
OEM APIs
(Protected)
SOTI APIs
(Protected)
Android
Public APIs
Protected
Public
Full management Management limited
to functions provided by OEM
Other MDM Vendors Strategy
Android APIs
(Protected)
OEM APIs
(Protected)
Android
Public APIs
Other MDM
Agent
Google
APIs
OEM
APIs
SOTI
APIs
SOTI Android+ Technology
Endorsed by 36 OEMs worldwide…and counting
SOTI’s Android+ technology delivers consistent management across all Android devices.
Web Filtering
• Enforce and control web access policies to
ensure secure, safe and authorized access
to web content
• Configure web filtering policies to block
access to specific URLs
• Specify a URL for device redirection
• Create a whitelist of acceptable URLs
Antivirus/Malware Built in
 Monitor device file system and
installed applications for malware and
viruses
 Quarantine infected applications and
files
on devices
 Schedule antivirus scanning, virus
definition updates, and quarantine
management
 Configure antivirus whitelists
Out of Contact
Device Policy
Alert and take action on devices that have
been out-of-contact for a period of time
• Enable out-of-contact policies based on last
connection time and enforce device side actions
• Log events, show messages, wipe device, activate
data connection
• Enable flexible script-based execution for IT
administrators to specify any action currently
supported by MobiControl
Phone Call Policy
Whitelist or blacklist specific phone
number for groups or individuals
• Enforce granular control over incoming and
outgoing calls across device groups or on
specific devices
• Import feature for large whitelists or blacklists
• Group blocking of phone numbers and long
distance exchanges
• Configure device and server notifications for
blocked calls
When Employees Go Rogue
or Devices Are Lost or Stolen
Remotely lock or wipe the entire device
SOTI MobiControl gives enterprises flexibility to take a phased
approach depending on the situation:
a) Lock the device
b) Remotely unlock or reset device passwords for users who
have forgotten them
c) Wipe the entire device; remove all data and settings back
to factory default in real time
Limiting the What & When
of Device Usage
Lockdown / Kiosk Mode
• Create purpose-dedicated mobile devices that allow
enterprises to limit applications, documents and web resources
• Decrease downtime and minimize unauthorized use of
corporate devices
• Detect compromised or rooted Android devices and
immediately force remote security actions to prohibit access to
the corporate network or data
Speed Control
• Eliminate liability to the organization by enabling distracted
driver controls to limit functionality when speed of movement
is exceeded
• Device functionality is restored when no longer in motion.
And What About the Where?
Real-Time Geo-Aware Policies
Beyond Simple Device Tracking Devices Tracked & Access Limited Based on Location
SOTI MobiControl provides accurate geo-location device tracking and user behavior monitoring that can be plotted on
an interactive worldwide map.
Geofencing enables the creation of a virtual boundary around a geographical area to trigger alerts and
pre-defined actions when devices enter or exit the boundary.
Geo-aware content access allows enterprises to restrict access to sensitive corporate content based on location while
still giving employees access to their personal content and applications.
Corporate Content: Protecting Your Assets
Secure Access to Corporate Content
• Securely distribute and manage corporate content to your mobile workforce
• Supporting all major formats, files can be delivered flexibly one-to-one, one-to-many or one-to-all
• Secure Content Library gives you fine-grained control over your content, allowing administrators to set priority
levels, document expiry, and location based delivery.
• Data stored encrypted on device, for enhanced security.
Applications:
It’s Not All Black & White
Application Management
SOTI provides the ability to:
• whitelist and blacklist apps on the device
• silently install approved corporate applications into the
container without user intervention
• geo-awareness helps control usage of device apps (e.g.
camera) when user is in the confines of a restricted work area.
Mobile Email Management
It’s About More Than Just Access
• Access, privacy, sharing, and forwarding don’t have to be taboo.
All can be addressed with SOTI MobiControl management.
• Restrict access to email to allow compliant devices
• Prevent data breaches by allowing, removing or blocking mobile
devices accessing the network
• And for added protection, comprehensive Exchange Access
Controls prevent unmanaged devices from accessing the corporate
Exchange server.
• Integration with Nitrodesk Touchdown Email Client to sandbox
email in a secure container
Enhanced Certificate
Management
• Add, renew, revoke and deliver authentication
certificates from a certificate authority to
managed devices
• MobiControl integrates with Microsoft,
VeriSign and Entrust
• Connects to corporate resources like Wi-Fi,
VPN and email
File Synchronization
Manage device files and
folders over the air
• MobiControl can synchronize files and folders
between devices and servers on an ad hoc or
scheduled basis
• Equip employees with up to date corporate
resources with special read and write to
device storage privileges
Remote Help:
Happy User, Happy Admin
Remote Help Desk Suite for
Real-Time Support
• Fastest and most reliable interactive remote
control of Android devices for optimal Helpdesk
capability and troubleshooting
• Best-in-class remote helpdesk capabilities offer
administrators the ability to support their growing
mobile workforce effortlessly
Put End Users In
the Driver’s Seat
“Manage Your Own Device”
With MobiControl’s “Manage Your Own Device”
End User Self-Service Portal, employees can:
• Enrol
• Lock
• Locate
• Wipe
• Reset password
• Send messages to
their devices…
• And more
Your helpdesk employees will be grateful.
Manage Enterprise Mobile Assets
Collect and store important device info for reporting purposes
• Enroll, provision and configure one or many devices simultaneously over the air
• Manage device inventory individually or by dynamic groups and communicate to
end users proactively
• Access a wealth of live device information such as Device ID, Carrier, Phone
Number, Signal Strength, Battery status, Memory (and many more) for live display,
report, or auditing purposes
• Dashboard provides a quick and interactive overview of mobile asset status and
system health in graphical displays
• Monitor the mobile fleet and communicate effectively using Android's native
messaging system or MobiControl’s built in Messaging Service
• Wireless Device Configuration
Business Visibility & Control
Audit Logs
Full device and network logging providing comprehensive analysis of device activities. Audit logs capture network traffic
and statistics, as well as OS-level activity, to provide military grade auditable tracking.
The system provides Voice and Data overage alerts for administrators and device users, with automatic pre-defined
actions. Also provides the ability to import large whitelists or blacklists, group blocking of phone numbers and long
distance exchanges, and server notifications for blocked calls.
Telecom Expense Management
Full Lifecycle Mobility Management
Copyright © 2014 MobileWorxs
About MobileWorxs
MobileWorxs helps you increase the productivty and effectivess of your
mobile workers by providing them with solutions that let them access
legacy ERP CRM and decision managment systems elminate paper and
provide enhanced customer care or sales tasks
Reach us at:
www.mobileworxs.com

More Related Content

What's hot

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Microsoft Volume Licensing Basics
Microsoft Volume Licensing BasicsMicrosoft Volume Licensing Basics
Microsoft Volume Licensing BasicsFlorisKlaver1
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...
Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...
Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...MinfinDocs
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxScenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxtodd331
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An IntroductionForgeRock
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptxFIDO Alliance
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
DIGITAL Transformation - Telecom Companies
DIGITAL Transformation - Telecom CompaniesDIGITAL Transformation - Telecom Companies
DIGITAL Transformation - Telecom CompaniesShankar Mandapaka
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingIftikhar Ali Iqbal
 

What's hot (20)

MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
IT Service Desk Software RFP Template
IT Service Desk Software RFP TemplateIT Service Desk Software RFP Template
IT Service Desk Software RFP Template
 
Microsoft Volume Licensing Basics
Microsoft Volume Licensing BasicsMicrosoft Volume Licensing Basics
Microsoft Volume Licensing Basics
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
VMware Horizon - news
VMware Horizon - newsVMware Horizon - news
VMware Horizon - news
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...
Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...
Зразок заповнення Звіту про використання доходів (прибутків) неприбуткової ор...
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxScenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docx
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
DIGITAL Transformation - Telecom Companies
DIGITAL Transformation - Telecom CompaniesDIGITAL Transformation - Telecom Companies
DIGITAL Transformation - Telecom Companies
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - Whitelisting
 

Similar to Secure Android Mobile Device: SOTI MobiControl and Android Plus technology

LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILouis-Martin Landry
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGuilherme Maia
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 

Similar to Secure Android Mobile Device: SOTI MobiControl and Android Plus technology (20)

LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Mobi manager mdm
Mobi manager mdmMobi manager mdm
Mobi manager mdm
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 

More from MobileWorxs

What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
MobileDemand xTablet Flex 8 Tablet PC
MobileDemand xTablet Flex 8 Tablet PCMobileDemand xTablet Flex 8 Tablet PC
MobileDemand xTablet Flex 8 Tablet PCMobileWorxs
 
MobileDemand xtablet Flex 10
MobileDemand xtablet Flex 10MobileDemand xtablet Flex 10
MobileDemand xtablet Flex 10MobileWorxs
 
MobileDemand T1400. Thin, lightweight, 10" rugged tablet PC
MobileDemand T1400. Thin, lightweight, 10" rugged tablet PCMobileDemand T1400. Thin, lightweight, 10" rugged tablet PC
MobileDemand T1400. Thin, lightweight, 10" rugged tablet PCMobileWorxs
 
SOTI MobiControl
SOTI MobiControlSOTI MobiControl
SOTI MobiControlMobileWorxs
 
Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0MobileWorxs
 
Mobile frame healthcare suite datasheet
Mobile frame healthcare suite datasheetMobile frame healthcare suite datasheet
Mobile frame healthcare suite datasheetMobileWorxs
 
Mobile frame implementation methodology
Mobile frame implementation methodologyMobile frame implementation methodology
Mobile frame implementation methodologyMobileWorxs
 
Mobile frame deployment guide
Mobile frame deployment guideMobile frame deployment guide
Mobile frame deployment guideMobileWorxs
 
Mobile frame data sheet
Mobile frame data sheetMobile frame data sheet
Mobile frame data sheetMobileWorxs
 
Mobile frame asset management in depth
Mobile frame asset management in depthMobile frame asset management in depth
Mobile frame asset management in depthMobileWorxs
 
Unified Mobility III
Unified Mobility IIIUnified Mobility III
Unified Mobility IIIMobileWorxs
 
MobileWorxs Turn by Turn Enterprise Navigation Q2 2011
MobileWorxs Turn by Turn Enterprise Navigation Q2 2011MobileWorxs Turn by Turn Enterprise Navigation Q2 2011
MobileWorxs Turn by Turn Enterprise Navigation Q2 2011MobileWorxs
 
MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011
MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011
MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011MobileWorxs
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 

More from MobileWorxs (20)

What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
MobileDemand xTablet Flex 8 Tablet PC
MobileDemand xTablet Flex 8 Tablet PCMobileDemand xTablet Flex 8 Tablet PC
MobileDemand xTablet Flex 8 Tablet PC
 
MobileDemand xtablet Flex 10
MobileDemand xtablet Flex 10MobileDemand xtablet Flex 10
MobileDemand xtablet Flex 10
 
MobileDemand T1400. Thin, lightweight, 10" rugged tablet PC
MobileDemand T1400. Thin, lightweight, 10" rugged tablet PCMobileDemand T1400. Thin, lightweight, 10" rugged tablet PC
MobileDemand T1400. Thin, lightweight, 10" rugged tablet PC
 
SOTI MobiControl
SOTI MobiControlSOTI MobiControl
SOTI MobiControl
 
PestWorxs app
PestWorxs appPestWorxs app
PestWorxs app
 
Panasonic FZ-M1
Panasonic FZ-M1Panasonic FZ-M1
Panasonic FZ-M1
 
Panasonic JT-B1
Panasonic JT-B1Panasonic JT-B1
Panasonic JT-B1
 
Panasonic FZ-A1
Panasonic FZ-A1Panasonic FZ-A1
Panasonic FZ-A1
 
Panasonic CF-53
Panasonic CF-53Panasonic CF-53
Panasonic CF-53
 
Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0
 
Mobile frame healthcare suite datasheet
Mobile frame healthcare suite datasheetMobile frame healthcare suite datasheet
Mobile frame healthcare suite datasheet
 
Mobile frame implementation methodology
Mobile frame implementation methodologyMobile frame implementation methodology
Mobile frame implementation methodology
 
Mobile frame deployment guide
Mobile frame deployment guideMobile frame deployment guide
Mobile frame deployment guide
 
Mobile frame data sheet
Mobile frame data sheetMobile frame data sheet
Mobile frame data sheet
 
Mobile frame asset management in depth
Mobile frame asset management in depthMobile frame asset management in depth
Mobile frame asset management in depth
 
Unified Mobility III
Unified Mobility IIIUnified Mobility III
Unified Mobility III
 
MobileWorxs Turn by Turn Enterprise Navigation Q2 2011
MobileWorxs Turn by Turn Enterprise Navigation Q2 2011MobileWorxs Turn by Turn Enterprise Navigation Q2 2011
MobileWorxs Turn by Turn Enterprise Navigation Q2 2011
 
MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011
MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011
MobileWorxs Enterprise Mobility Applications Local Government GQ2 2011
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Secure Android Mobile Device: SOTI MobiControl and Android Plus technology

  • 1. Copyright © 2014 MobileWorxs Android can be secure with SOTI MobiControl and Android Plus technology Mobile Device Management
  • 3. Is Android Taking Over the World?
  • 4. Android’s Rise to Platform Dominance Source: Statista
  • 5. Android Continues to Gain Momentum Source: Statista
  • 6. Is Android Becoming the New Windows? Source: Statista
  • 7. Barriers to Android Entry in the Enterprise
  • 8. Android in the Enterprise Top 3 hurdles to enterprise adoption: 1. Fear of OS compromise 2. Perceived lack of protection against data leakage 3. Limited policy controls and management
  • 9. Perceived Insecurity of Android According to a recent VDC Research survey where CIOs were asked which platform they perceived as most secure, Android was rated as the most insecure mobile platform, especially among larger organizations (>$1B annual revenue).
  • 12. Limited Policy Controls You can’t protect what you can’t control • Security risks • Safeguarding corporate data • Malware, viruses, and hacking • Secure remote access • Compliance and privacy • Lost or stolen devices • Parting employee data recovery
  • 13. Android’s Way Forward in the Enterprise
  • 14. Why Android Has a Future in the Enterprise 1. Gartner predicts that Android will top 1 billion shipments this year – 3 times the number of Apple devices expected to ship 2. The sheer number of Android devices in the hands of BYOD employees will force IT to fold Android into their enterprise mix 3. Android comes in all shapes - sizes , providing a larger flexibility to get use cases to business 4. Cost advantages enable leveraging low cost devices with faster retire cycles for business 5. Android+ RESULT: Android is starting to win over reluctant IT gatekeepers
  • 15. What’s Needed for Android to become a good corporate citizen 1. Enterprises need to be able to set consistent management policies across broad range of Android devices (Management) 2. Enterprises need deep management policies to be able to customize the device to meet business needs (Productivity) 3. Deep security policies to allow businesses to trust Android (Compliance) 4. IT needs tools to provide the same level of end-user support for mobile (Support)
  • 16. Google Strikes Back Google leaning on OEMs to use latest version of Android on their devices • If OEMs want to receive access to Google Play Store and Google Apps, they need to get moving • Google will not be certifying devices that cross a cut-off date for each Android firmware release • Cut-off dates from Android 2.3 Froyo through 4.1 Jelly Bean have already passed • Google will no longer certify any device that’s running firmware version below Android 4.1 • Cut-off date for Android 4.3 Jelly Bean is July 31, 2014
  • 19. SOTI’s Solution to Android Fragmentation: Android+ SOTI Android+ MDM Strategy MobiControl Agent Android APIs (Protected) OEM APIs (Protected) SOTI APIs (Protected) Android Public APIs Protected Public Full management Management limited to functions provided by OEM Other MDM Vendors Strategy Android APIs (Protected) OEM APIs (Protected) Android Public APIs Other MDM Agent Google APIs OEM APIs SOTI APIs
  • 20. SOTI Android+ Technology Endorsed by 36 OEMs worldwide…and counting SOTI’s Android+ technology delivers consistent management across all Android devices.
  • 21. Web Filtering • Enforce and control web access policies to ensure secure, safe and authorized access to web content • Configure web filtering policies to block access to specific URLs • Specify a URL for device redirection • Create a whitelist of acceptable URLs
  • 22. Antivirus/Malware Built in  Monitor device file system and installed applications for malware and viruses  Quarantine infected applications and files on devices  Schedule antivirus scanning, virus definition updates, and quarantine management  Configure antivirus whitelists
  • 23. Out of Contact Device Policy Alert and take action on devices that have been out-of-contact for a period of time • Enable out-of-contact policies based on last connection time and enforce device side actions • Log events, show messages, wipe device, activate data connection • Enable flexible script-based execution for IT administrators to specify any action currently supported by MobiControl
  • 24. Phone Call Policy Whitelist or blacklist specific phone number for groups or individuals • Enforce granular control over incoming and outgoing calls across device groups or on specific devices • Import feature for large whitelists or blacklists • Group blocking of phone numbers and long distance exchanges • Configure device and server notifications for blocked calls
  • 25. When Employees Go Rogue or Devices Are Lost or Stolen Remotely lock or wipe the entire device SOTI MobiControl gives enterprises flexibility to take a phased approach depending on the situation: a) Lock the device b) Remotely unlock or reset device passwords for users who have forgotten them c) Wipe the entire device; remove all data and settings back to factory default in real time
  • 26. Limiting the What & When of Device Usage Lockdown / Kiosk Mode • Create purpose-dedicated mobile devices that allow enterprises to limit applications, documents and web resources • Decrease downtime and minimize unauthorized use of corporate devices • Detect compromised or rooted Android devices and immediately force remote security actions to prohibit access to the corporate network or data Speed Control • Eliminate liability to the organization by enabling distracted driver controls to limit functionality when speed of movement is exceeded • Device functionality is restored when no longer in motion.
  • 27. And What About the Where? Real-Time Geo-Aware Policies Beyond Simple Device Tracking Devices Tracked & Access Limited Based on Location SOTI MobiControl provides accurate geo-location device tracking and user behavior monitoring that can be plotted on an interactive worldwide map. Geofencing enables the creation of a virtual boundary around a geographical area to trigger alerts and pre-defined actions when devices enter or exit the boundary. Geo-aware content access allows enterprises to restrict access to sensitive corporate content based on location while still giving employees access to their personal content and applications.
  • 28. Corporate Content: Protecting Your Assets Secure Access to Corporate Content • Securely distribute and manage corporate content to your mobile workforce • Supporting all major formats, files can be delivered flexibly one-to-one, one-to-many or one-to-all • Secure Content Library gives you fine-grained control over your content, allowing administrators to set priority levels, document expiry, and location based delivery. • Data stored encrypted on device, for enhanced security.
  • 29. Applications: It’s Not All Black & White Application Management SOTI provides the ability to: • whitelist and blacklist apps on the device • silently install approved corporate applications into the container without user intervention • geo-awareness helps control usage of device apps (e.g. camera) when user is in the confines of a restricted work area.
  • 30. Mobile Email Management It’s About More Than Just Access • Access, privacy, sharing, and forwarding don’t have to be taboo. All can be addressed with SOTI MobiControl management. • Restrict access to email to allow compliant devices • Prevent data breaches by allowing, removing or blocking mobile devices accessing the network • And for added protection, comprehensive Exchange Access Controls prevent unmanaged devices from accessing the corporate Exchange server. • Integration with Nitrodesk Touchdown Email Client to sandbox email in a secure container
  • 31. Enhanced Certificate Management • Add, renew, revoke and deliver authentication certificates from a certificate authority to managed devices • MobiControl integrates with Microsoft, VeriSign and Entrust • Connects to corporate resources like Wi-Fi, VPN and email
  • 32. File Synchronization Manage device files and folders over the air • MobiControl can synchronize files and folders between devices and servers on an ad hoc or scheduled basis • Equip employees with up to date corporate resources with special read and write to device storage privileges
  • 33. Remote Help: Happy User, Happy Admin Remote Help Desk Suite for Real-Time Support • Fastest and most reliable interactive remote control of Android devices for optimal Helpdesk capability and troubleshooting • Best-in-class remote helpdesk capabilities offer administrators the ability to support their growing mobile workforce effortlessly
  • 34. Put End Users In the Driver’s Seat “Manage Your Own Device” With MobiControl’s “Manage Your Own Device” End User Self-Service Portal, employees can: • Enrol • Lock • Locate • Wipe • Reset password • Send messages to their devices… • And more Your helpdesk employees will be grateful.
  • 35. Manage Enterprise Mobile Assets Collect and store important device info for reporting purposes • Enroll, provision and configure one or many devices simultaneously over the air • Manage device inventory individually or by dynamic groups and communicate to end users proactively • Access a wealth of live device information such as Device ID, Carrier, Phone Number, Signal Strength, Battery status, Memory (and many more) for live display, report, or auditing purposes • Dashboard provides a quick and interactive overview of mobile asset status and system health in graphical displays • Monitor the mobile fleet and communicate effectively using Android's native messaging system or MobiControl’s built in Messaging Service • Wireless Device Configuration
  • 36. Business Visibility & Control Audit Logs Full device and network logging providing comprehensive analysis of device activities. Audit logs capture network traffic and statistics, as well as OS-level activity, to provide military grade auditable tracking. The system provides Voice and Data overage alerts for administrators and device users, with automatic pre-defined actions. Also provides the ability to import large whitelists or blacklists, group blocking of phone numbers and long distance exchanges, and server notifications for blocked calls. Telecom Expense Management
  • 38. Copyright © 2014 MobileWorxs About MobileWorxs MobileWorxs helps you increase the productivty and effectivess of your mobile workers by providing them with solutions that let them access legacy ERP CRM and decision managment systems elminate paper and provide enhanced customer care or sales tasks Reach us at: www.mobileworxs.com