SlideShare a Scribd company logo
1 of 6
-0-
01. Solution summary

PUMPTM Device Manager as a Mobile Device Management solution is to control device
functions in compliance with “Enterprise Security Policy”.



                                                         Remote Policy                Real time
        PDM Client                                         Provision                 Surveillance

                                                    Remote Control of         Live(real-time)
                                                    Mobile Devices to adopt   connection between
                                                    “Enterprise Security      Client and Server to
             Capture                                Policy”                   monitor device status
    Camer
      a



     S/W     Policy
                         3G or Wi-Fi

                                       PDM Server
      OS                                                                      National Intelligence
             Initializ                                                        Service, Korean
    rootin
              a-tion
      g                                             Ability to adopt          Government, certified
                                                    Enterprise policies       PDM through its own
                                                                              Security Suitability Test
                                                                              (under way)

                                                         Customizing                 Certification


                                                                                                          -1-
02. Service Architecture




                                         BTB PPS
        PDM Client
                                          C2DM      PDM Server

                                         APNS



       Smart Phone



     PDM Client            3G or Wi-Fi




     Tablet PC




                                                       Legacy for
                                                   enterprise hierarchy


                                                                          -2-
03. Client Functions




 No screen capture                                                       Password policy
  - Device lock up for unauthorized screen capture application run         - Force user to set password
  - H/W Key operation for screen capture to be invalid (Samsung Galaxy     - Define valid period and rule for password
 Password policy                                                         Functions restricted
  - Control password change period                                         - Control use of camera, face time, screen capture
  - Define rule for password(case sensitivity, number, etc)                - Control use of Safari, force to set security restriction
 Remote device lock up                                                   Collect information of device status
  - To request for password input by administration                        - Be able to check the device status remotely
 Remote initialization                                                   Remote device lock up
  - To factory release state by administration                             - To request for password input by administration
 Control device access from use of Camera, Bluetooth                     Remote initialization
  - Device lock up for an App to try unauthorized device access            - To factory release state by administration
 No unauthorized App run                                                 OS rooting
  - Device lock up for an unauthorized App to run (period of 3~5 min)      - Administration get notice in case of jail break or OS rooting
 OS rooting                                                              Wi-Fi
  - Device lock up in case of OS rooting                                   - Adopt Wi-Fi connection rule to simplify internal access via company
 No Tethering                                                           wireless network
  - Not allow process for internet tethering device                        - Reliable settings provided based on CA certificates

 Protect App process for mobile office                                   Control app. installation

  - Block other process in case mobile office application is run           - Control the installation of application not required for official purpose
                                                                           - Control buying app. from app. store


                                                                                                                                                     -3-
04. Admin Functions



 Device Management
  - User registration, updates, deletion by organization and
    hierarchy
  - Manage information of device and group through account
    system or directory service of enterprise, agency
 Application Management
  - Manage White or Black List for registration, update and deletion
  of each or large range applications (Android Only)
 Policy Management
  - Provisioning security policy (Android Only)
  - Provisioning Configuration Profiles (iOS Only)
 Statistics
  - Policy provision
  - Platform
  - Policy violation(Android Only)
  - Application installation
 Log
  - Log for device
  - Log for device having policy violation
  - Inquiry device having designated application


                                                                       -4-
BTB Solution Co., Ltd.
8th   Fl, Hansin IT Tower, 235, Guro-dong, Guro-ku, Seoul, Korea TEL : +82-2-6925-4100 Email : info@btbsolution.co.kr
                                           Homepage www.btbsolution.co.kr
                                                                                                                        -5-

More Related Content

What's hot

DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMAndris Soroka
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech SupportSamsung Biz Mobile
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...InSync Conference
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentationewickline
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White PaperSybase Türkiye
 
Airwatch - Mobile Content Strategies and Deployment Best Practices
Airwatch - Mobile Content Strategies and Deployment Best PracticesAirwatch - Mobile Content Strategies and Deployment Best Practices
Airwatch - Mobile Content Strategies and Deployment Best PracticesGlobal Business Events
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentationSoap MacTavish
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5RoyGerritse
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개ArumIm
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 

What's hot (16)

DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
 
Airwatch - Mobile Content Strategies and Deployment Best Practices
Airwatch - Mobile Content Strategies and Deployment Best PracticesAirwatch - Mobile Content Strategies and Deployment Best Practices
Airwatch - Mobile Content Strategies and Deployment Best Practices
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Mobile device management v5
Mobile device management v5Mobile device management v5
Mobile device management v5
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 

Viewers also liked

Viewers also liked (11)

Aaaafffff
AaaafffffAaaafffff
Aaaafffff
 
რეფერატი ქუჩის ბავშვების პრობლემები
რეფერატი   ქუჩის ბავშვების პრობლემებირეფერატი   ქუჩის ბავშვების პრობლემები
რეფერატი ქუჩის ბავშვების პრობლემები
 
Tompkins_Cameron Final_PPP_Slide
Tompkins_Cameron Final_PPP_SlideTompkins_Cameron Final_PPP_Slide
Tompkins_Cameron Final_PPP_Slide
 
5. Product Introduction for PUMP Document Viewer
5. Product Introduction for PUMP Document Viewer5. Product Introduction for PUMP Document Viewer
5. Product Introduction for PUMP Document Viewer
 
Esta es solo una prueba de como usar Slideshare
Esta es solo una prueba de como usar SlideshareEsta es solo una prueba de como usar Slideshare
Esta es solo una prueba de como usar Slideshare
 
Paso a paso 2
Paso a paso 2Paso a paso 2
Paso a paso 2
 
Sandra velásquez investigacion ivp6
Sandra velásquez investigacion ivp6Sandra velásquez investigacion ivp6
Sandra velásquez investigacion ivp6
 
22 23
22 2322 23
22 23
 
Informe lectura herramientas_colaborativas_cap3
Informe lectura herramientas_colaborativas_cap3Informe lectura herramientas_colaborativas_cap3
Informe lectura herramientas_colaborativas_cap3
 
A Arte
A ArteA Arte
A Arte
 
Skype Chat History
Skype Chat HistorySkype Chat History
Skype Chat History
 

Similar to 7. Product Introduction for PUMP Device Manager

Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPSAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPKeneos
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet SupportFelix Yanko
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodIRJET Journal
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedMotasem Al Amour
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche AGILLY
 

Similar to 7. Product Introduction for PUMP Device Manager (20)

Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPSAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet Support
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
Pitch Deck
Pitch DeckPitch Deck
Pitch Deck
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

7. Product Introduction for PUMP Device Manager

  • 1. -0-
  • 2. 01. Solution summary PUMPTM Device Manager as a Mobile Device Management solution is to control device functions in compliance with “Enterprise Security Policy”. Remote Policy Real time PDM Client Provision Surveillance Remote Control of Live(real-time) Mobile Devices to adopt connection between “Enterprise Security Client and Server to Capture Policy” monitor device status Camer a S/W Policy 3G or Wi-Fi PDM Server OS National Intelligence Initializ Service, Korean rootin a-tion g Ability to adopt Government, certified Enterprise policies PDM through its own Security Suitability Test (under way) Customizing Certification -1-
  • 3. 02. Service Architecture BTB PPS PDM Client C2DM PDM Server APNS Smart Phone PDM Client 3G or Wi-Fi Tablet PC Legacy for enterprise hierarchy -2-
  • 4. 03. Client Functions  No screen capture  Password policy - Device lock up for unauthorized screen capture application run - Force user to set password - H/W Key operation for screen capture to be invalid (Samsung Galaxy - Define valid period and rule for password  Password policy  Functions restricted - Control password change period - Control use of camera, face time, screen capture - Define rule for password(case sensitivity, number, etc) - Control use of Safari, force to set security restriction  Remote device lock up  Collect information of device status - To request for password input by administration - Be able to check the device status remotely  Remote initialization  Remote device lock up - To factory release state by administration - To request for password input by administration  Control device access from use of Camera, Bluetooth  Remote initialization - Device lock up for an App to try unauthorized device access - To factory release state by administration  No unauthorized App run  OS rooting - Device lock up for an unauthorized App to run (period of 3~5 min) - Administration get notice in case of jail break or OS rooting  OS rooting  Wi-Fi - Device lock up in case of OS rooting - Adopt Wi-Fi connection rule to simplify internal access via company  No Tethering wireless network - Not allow process for internet tethering device - Reliable settings provided based on CA certificates  Protect App process for mobile office  Control app. installation - Block other process in case mobile office application is run - Control the installation of application not required for official purpose - Control buying app. from app. store -3-
  • 5. 04. Admin Functions  Device Management - User registration, updates, deletion by organization and hierarchy - Manage information of device and group through account system or directory service of enterprise, agency  Application Management - Manage White or Black List for registration, update and deletion of each or large range applications (Android Only)  Policy Management - Provisioning security policy (Android Only) - Provisioning Configuration Profiles (iOS Only)  Statistics - Policy provision - Platform - Policy violation(Android Only) - Application installation  Log - Log for device - Log for device having policy violation - Inquiry device having designated application -4-
  • 6. BTB Solution Co., Ltd. 8th Fl, Hansin IT Tower, 235, Guro-dong, Guro-ku, Seoul, Korea TEL : +82-2-6925-4100 Email : info@btbsolution.co.kr Homepage www.btbsolution.co.kr -5-