SlideShare a Scribd company logo
New mobility strategy that provides high level of security access to
corporate information from mobile devices.
Modern mobile devices by their capabilities are almost equal to office computers.
For working with different types of document or an access to corporate
recources, employees often use their own tablets and smartphones ignoring the
prohibition of IT service. This BYOD scenario is impossible to avoid. BYOD brings
significant risks and often results in confidential data breaches. The usual
restrictions are no longer working, businesses are unable to stop employees from
bringing personal devices into the workplace, and today every company needs
more mobile and flexible solutions.
BYOD – a concept, a transitional
form between the classical
desktop and a new working
scheme.
It enables 24/7 secure access to
corporate resources, focus on
information security and
maintaining employee
productivity.
BYOD - bring your own device -
refers to the policy of permitting
employees to bring personally
owned mobile devices (laptops,
tablets, and smart phones) to their
workplace, and to use those
devices to access privileged
company information and
applications.
WorksPad is an enterprise level mobile workplace, which includes file sync and
share, corporate email client, calendar and address book, built-in office tools,
direct mobile-to-mobile file transfer, and screen sharing. WorksPad is designed to
meet the demand in the most popular corporate tools by mobile workers. It
supports the most typical scenarios of remote enterprise file access, emailing,
and working with documents in a highly productive manner, as well as paperless
meetings. Security reinforcements result from mobile client as “all-in-one”
integrated app, manageable policies and server side architecture.
MOBILE DEVICE DATA SECURITY
Corporate data isolationе
WorksPad keeps all corporate data on a mobile device inside the isolated app
container, thereby allowing to divide corporate information from personal user
data. Also, the container can be remotely wiped (without any personal data
touching) by the system administrator in case the device was lost or thieved, or
employee was dismissed.
External storage card can’t be used
By design WorksPad mobile application uses only internal device memory. None
of WorksPad data can be placed into external storage. So the user is unable to
detach WorksPad data from the device in a simple way.
Corporate mailbox only
Another one important architectural feature is that WorksPad mobile application
can work with corporate mailbox only. There is no way to connect the application
to any other email service. So corporate emails can be sent and received
exclusively through the corporate mail server. Thus, all email traffic always stays
under the control of corporate security systems, like DLP, antispam, antimalware
systems and others.
Cloudless architecture
WorksPad mobile application doesn’t use any cloud systems. Despite using
owned device, a user has no way to connect cloud storage as a data source for
WorksPad, no way to use non-corporate email service for WorksPad, no way to
get or put any information outside the WorksPad mobile application. All
corporate data always stays inside the corporate secured perimeter.
WorksPad Security Features
Independent Security Expertise
WorksPad mobile application was classified as Level 4 (HIGH) application by
Veracode, which is the leading independent provider of cloud-based application
intelligence and security verification services.
SECURITY MANAGEMENT FEATURES
‘Open In’ policy
The system administrator can deny file opening from WorksPad in third party
application, also it’s possible to deny information copying from WorksPad
application to another one. It makes user impossible to put corporate data
outside the WorksPad mobile application.
Password policies
Using the password policies system, the administrator can force WorksPad mobile
application to ask the password every time when the user runs it on the device.
Also, these policies allow the system administrator to permit or deny users to
apply a local password for running application on mobile device.
Other Policies
WorksPad system provides a wide range of security policies and administrative
settings. Among the others, the system administrator can manage which type of
clients is permitted for users. For example, allow to use iOS client only, te system
administrator will make impossible to connect Android devices to WorksPad
infrastructure. Also, WorksPad includes features, which allow the administrator to
restrict documents printing, direct files exchange, disable built-in email client or
function of external links, and many others.
Remote wipe
Remote wipe mechanism allows the system administrator to destroy WorksPad
application container remotely in case the device was lost or thieved, or
employee was dismissed. While all corporate information will be erased from the
device, all user personal data will remain untouched.
SERVER-SIDE ARCHITECHTURE AND SECURITY
Corporate infrastructure integration
WorksPad system is an enterprise level product based on Microsoft
infrastructure, so it is oriented to using the general corporate infrastructure
services. WorksPad server uses Active Directory to authenticate users. Also, while
providing access to data sources, WorksPad server uses NTFS permission for
network shares and SharePoint rights for SharePoint libraries. While using
WorksPad mobile application for corporate data access, the user gets no rights
other than ones he has inside the corporate network.
Role-Based Security Model
WorksPad system uses role-based security model which allows the system
administrator to granularly tune access to every administrative feature of the
system. For example, it is easy to create ‘Log View Only’ role for security auditors.
Logs
WorksPad system has an advanced logging mechanism. Logs store all system
event history, error details and allow getting information about all users’
activities.
SSL secured channel
WorksPad uses SSL encryption for all communications between mobile devices
and the corporate network, and also between WorksPad server components.
Thus data is secured when transferring from one component to another.
Demilitarized Zone
WorksPad server part contains special component named ‘Dispatcher’ which
designed to be installed in Demilitarized Zone, to serve connections from mobile
clients. All the following communications, in this case, will occur between the
dispatcher and other WorksPad components. There will be no direct connections
from the mobile client to the internal segment of the corporate network. This
architecture allows the IT-specialists to use any security systems to control all
traffic from mobile devices before it reaches the secure corporate perimeter.
EMM / MDM PLATFORMS INTEGRATION
WorksPad mobile application has special editions for the most popular MDM
systems. The customer can easy integrate WorksPad into the existing enterprise
mobility infrastructure. Using WorksPad with any MDM system allows a customer
to build even more secure environment and get some additional security
features. For example, it can be encryption of the application container, or using
VPN connection between the mobile client and the corporate network.
Currently, the product includes the following MDM-specific releases:
WorksPad for Good
Edition for Good is a special edition of WorksPad, which is integrated with Good
Dynamics platform and officially published in Good Marketplace as enterprise
mobile application for iOS secured by Good.
WorksPad for Citrix
Edition for Citrix is integrated with Citrix XenMobile / Worx platform, is Citrix
Ready Worx verified and officially published in Citrix Worx App Gallery as
enterprise mobile application for iOS.
WorksPad for MobileIron
This special edition is deeply integrated with the MobileIron SDK (AppConnect). It
can be deployed and managed by the MobileIron platform. WorksPad for
MobileIron natively supports all of the key AppConnect SDK for iOS capabilities.
WorksPad for Symantec
WorksPad is a member of Symantec Sealed Program with a special edition of
WorksPad for Symantec AppCenter delivered for enterprises on iOS and Android.

More Related Content

What's hot

Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
Thomas Godsted Rysgaard
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
Killian Delaney
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Edge Pereira
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
David J Rosenthal
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
David J Rosenthal
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
Peter Daalmans
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
Sentri
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
Olav Tvedt
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
EPC Group
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPPaulo Freitas
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
Peter Daalmans
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
David J Rosenthal
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
Robert Crane
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
J
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 

What's hot (20)

Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Microsoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisionsMicrosoft Cloud Device Management comparisions
Microsoft Cloud Device Management comparisions
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 

Viewers also liked

Is หรือ isis คือ
Is หรือ isis คือIs หรือ isis คือ
Is หรือ isis คือ
ppompuy pantham
 
Terminos, Vano, Viga Riostra y Bloque
Terminos, Vano, Viga Riostra y Bloque Terminos, Vano, Viga Riostra y Bloque
Terminos, Vano, Viga Riostra y Bloque
Maria Boss
 
PortfólioarqD.com
PortfólioarqD.comPortfólioarqD.com
PortfólioarqD.com
arqDcom
 
กฎแห่งกรรม
กฎแห่งกรรมกฎแห่งกรรม
กฎแห่งกรรม
ppompuy pantham
 
Trabajo de construccion1
Trabajo de construccion1Trabajo de construccion1
Trabajo de construccion1
Maria Paula Gonzalez Gonzalez
 
Abdul Rehman resume1
Abdul Rehman resume1Abdul Rehman resume1
Abdul Rehman resume1Abdul Rehman
 
เป้าหมายของชีวิตตามหลักพระพุทธศาสนา
เป้าหมายของชีวิตตามหลักพระพุทธศาสนาเป้าหมายของชีวิตตามหลักพระพุทธศาสนา
เป้าหมายของชีวิตตามหลักพระพุทธศาสนา
ppompuy pantham
 
Union Park Master Plan
Union Park Master Plan Union Park Master Plan
Union Park Master Plan Colin Kelley
 
AssetWorks RFID Quick Guide
AssetWorks RFID Quick GuideAssetWorks RFID Quick Guide
AssetWorks RFID Quick Guide
Garrett Conti
 
Widder Nickie_Resume
Widder Nickie_ResumeWidder Nickie_Resume
Widder Nickie_ResumeNickie Widder
 
Lights on Campus Proposal
Lights on Campus ProposalLights on Campus Proposal
Lights on Campus ProposalKeshia Daniel
 
Logias masónicas en el mundo
Logias masónicas en el mundoLogias masónicas en el mundo
Logias masónicas en el mundo
Rodrigo Blanco
 
Construccion columnas
Construccion columnasConstruccion columnas
Construccion columnas
Maria Boss
 
Insights from the 2016 USPA Conference
Insights from the 2016 USPA ConferenceInsights from the 2016 USPA Conference
Insights from the 2016 USPA Conference
Garrett Conti
 
Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016
Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016
Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016Ebba G. Hult
 
VOCABULARIO
VOCABULARIOVOCABULARIO
VOCABULARIO
Maria Boss
 
Claim Analytics.pptx %5bRead-Only%5d (1)
Claim Analytics.pptx %5bRead-Only%5d (1)Claim Analytics.pptx %5bRead-Only%5d (1)
Claim Analytics.pptx %5bRead-Only%5d (1)Steven Henning
 

Viewers also liked (20)

Is หรือ isis คือ
Is หรือ isis คือIs หรือ isis คือ
Is หรือ isis คือ
 
Terminos, Vano, Viga Riostra y Bloque
Terminos, Vano, Viga Riostra y Bloque Terminos, Vano, Viga Riostra y Bloque
Terminos, Vano, Viga Riostra y Bloque
 
PortfólioarqD.com
PortfólioarqD.comPortfólioarqD.com
PortfólioarqD.com
 
กฎแห่งกรรม
กฎแห่งกรรมกฎแห่งกรรม
กฎแห่งกรรม
 
CV
CVCV
CV
 
Trabajo de construccion1
Trabajo de construccion1Trabajo de construccion1
Trabajo de construccion1
 
Abdul Rehman resume1
Abdul Rehman resume1Abdul Rehman resume1
Abdul Rehman resume1
 
เป้าหมายของชีวิตตามหลักพระพุทธศาสนา
เป้าหมายของชีวิตตามหลักพระพุทธศาสนาเป้าหมายของชีวิตตามหลักพระพุทธศาสนา
เป้าหมายของชีวิตตามหลักพระพุทธศาสนา
 
Union Park Master Plan
Union Park Master Plan Union Park Master Plan
Union Park Master Plan
 
AssetWorks RFID Quick Guide
AssetWorks RFID Quick GuideAssetWorks RFID Quick Guide
AssetWorks RFID Quick Guide
 
Widder Nickie_Resume
Widder Nickie_ResumeWidder Nickie_Resume
Widder Nickie_Resume
 
Lights on Campus Proposal
Lights on Campus ProposalLights on Campus Proposal
Lights on Campus Proposal
 
Logias masónicas en el mundo
Logias masónicas en el mundoLogias masónicas en el mundo
Logias masónicas en el mundo
 
Course Catalogue
Course CatalogueCourse Catalogue
Course Catalogue
 
Radwa CV
Radwa CVRadwa CV
Radwa CV
 
Construccion columnas
Construccion columnasConstruccion columnas
Construccion columnas
 
Insights from the 2016 USPA Conference
Insights from the 2016 USPA ConferenceInsights from the 2016 USPA Conference
Insights from the 2016 USPA Conference
 
Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016
Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016
Korean-Swedish Executive Meeting Value-based Healthcare_Seoul 2016
 
VOCABULARIO
VOCABULARIOVOCABULARIO
VOCABULARIO
 
Claim Analytics.pptx %5bRead-Only%5d (1)
Claim Analytics.pptx %5bRead-Only%5d (1)Claim Analytics.pptx %5bRead-Only%5d (1)
Claim Analytics.pptx %5bRead-Only%5d (1)
 

Similar to Beyond BYOD

Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
Hexnode
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Nuno Alves
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
Syeful Islam
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
Nuno Alves
 
eQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdfeQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdf
MuhammadAdeelTariq1
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
Hexnode
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
BlackBerry
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
Citrix
 
Laptop management
Laptop managementLaptop management
Laptop management
Killian Delaney
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
Hexnode
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
Icomm Technologies
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
SAP Solution Extensions
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
Jorge Gil Peña
 
Windows mobile architecture_overview
Windows mobile architecture_overviewWindows mobile architecture_overview
Windows mobile architecture_overviewDaniel Downs
 
Managing_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSManaging_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSGrant Jolly
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
Kimber Spradlin
 

Similar to Beyond BYOD (20)

Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
eQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdfeQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdf
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
Windows mobile architecture_overview
Windows mobile architecture_overviewWindows mobile architecture_overview
Windows mobile architecture_overview
 
Managing_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSManaging_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOS
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 

Recently uploaded

Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
abdulrafaychaudhry
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
QuickwayInfoSystems3
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 

Recently uploaded (20)

Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 

Beyond BYOD

  • 1. New mobility strategy that provides high level of security access to corporate information from mobile devices. Modern mobile devices by their capabilities are almost equal to office computers. For working with different types of document or an access to corporate recources, employees often use their own tablets and smartphones ignoring the prohibition of IT service. This BYOD scenario is impossible to avoid. BYOD brings significant risks and often results in confidential data breaches. The usual restrictions are no longer working, businesses are unable to stop employees from bringing personal devices into the workplace, and today every company needs more mobile and flexible solutions. BYOD – a concept, a transitional form between the classical desktop and a new working scheme. It enables 24/7 secure access to corporate resources, focus on information security and maintaining employee productivity. BYOD - bring your own device - refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications. WorksPad is an enterprise level mobile workplace, which includes file sync and share, corporate email client, calendar and address book, built-in office tools, direct mobile-to-mobile file transfer, and screen sharing. WorksPad is designed to meet the demand in the most popular corporate tools by mobile workers. It supports the most typical scenarios of remote enterprise file access, emailing, and working with documents in a highly productive manner, as well as paperless meetings. Security reinforcements result from mobile client as “all-in-one” integrated app, manageable policies and server side architecture.
  • 2. MOBILE DEVICE DATA SECURITY Corporate data isolationе WorksPad keeps all corporate data on a mobile device inside the isolated app container, thereby allowing to divide corporate information from personal user data. Also, the container can be remotely wiped (without any personal data touching) by the system administrator in case the device was lost or thieved, or employee was dismissed. External storage card can’t be used By design WorksPad mobile application uses only internal device memory. None of WorksPad data can be placed into external storage. So the user is unable to detach WorksPad data from the device in a simple way. Corporate mailbox only Another one important architectural feature is that WorksPad mobile application can work with corporate mailbox only. There is no way to connect the application to any other email service. So corporate emails can be sent and received exclusively through the corporate mail server. Thus, all email traffic always stays under the control of corporate security systems, like DLP, antispam, antimalware systems and others. Cloudless architecture WorksPad mobile application doesn’t use any cloud systems. Despite using owned device, a user has no way to connect cloud storage as a data source for WorksPad, no way to use non-corporate email service for WorksPad, no way to get or put any information outside the WorksPad mobile application. All corporate data always stays inside the corporate secured perimeter. WorksPad Security Features
  • 3. Independent Security Expertise WorksPad mobile application was classified as Level 4 (HIGH) application by Veracode, which is the leading independent provider of cloud-based application intelligence and security verification services. SECURITY MANAGEMENT FEATURES ‘Open In’ policy The system administrator can deny file opening from WorksPad in third party application, also it’s possible to deny information copying from WorksPad application to another one. It makes user impossible to put corporate data outside the WorksPad mobile application. Password policies Using the password policies system, the administrator can force WorksPad mobile application to ask the password every time when the user runs it on the device. Also, these policies allow the system administrator to permit or deny users to apply a local password for running application on mobile device. Other Policies WorksPad system provides a wide range of security policies and administrative settings. Among the others, the system administrator can manage which type of clients is permitted for users. For example, allow to use iOS client only, te system administrator will make impossible to connect Android devices to WorksPad infrastructure. Also, WorksPad includes features, which allow the administrator to restrict documents printing, direct files exchange, disable built-in email client or function of external links, and many others. Remote wipe Remote wipe mechanism allows the system administrator to destroy WorksPad application container remotely in case the device was lost or thieved, or employee was dismissed. While all corporate information will be erased from the device, all user personal data will remain untouched.
  • 4. SERVER-SIDE ARCHITECHTURE AND SECURITY Corporate infrastructure integration WorksPad system is an enterprise level product based on Microsoft infrastructure, so it is oriented to using the general corporate infrastructure services. WorksPad server uses Active Directory to authenticate users. Also, while providing access to data sources, WorksPad server uses NTFS permission for network shares and SharePoint rights for SharePoint libraries. While using WorksPad mobile application for corporate data access, the user gets no rights other than ones he has inside the corporate network. Role-Based Security Model WorksPad system uses role-based security model which allows the system administrator to granularly tune access to every administrative feature of the system. For example, it is easy to create ‘Log View Only’ role for security auditors. Logs WorksPad system has an advanced logging mechanism. Logs store all system event history, error details and allow getting information about all users’ activities. SSL secured channel WorksPad uses SSL encryption for all communications between mobile devices and the corporate network, and also between WorksPad server components. Thus data is secured when transferring from one component to another. Demilitarized Zone WorksPad server part contains special component named ‘Dispatcher’ which designed to be installed in Demilitarized Zone, to serve connections from mobile clients. All the following communications, in this case, will occur between the dispatcher and other WorksPad components. There will be no direct connections from the mobile client to the internal segment of the corporate network. This architecture allows the IT-specialists to use any security systems to control all traffic from mobile devices before it reaches the secure corporate perimeter.
  • 5. EMM / MDM PLATFORMS INTEGRATION WorksPad mobile application has special editions for the most popular MDM systems. The customer can easy integrate WorksPad into the existing enterprise mobility infrastructure. Using WorksPad with any MDM system allows a customer to build even more secure environment and get some additional security features. For example, it can be encryption of the application container, or using VPN connection between the mobile client and the corporate network. Currently, the product includes the following MDM-specific releases: WorksPad for Good Edition for Good is a special edition of WorksPad, which is integrated with Good Dynamics platform and officially published in Good Marketplace as enterprise mobile application for iOS secured by Good. WorksPad for Citrix Edition for Citrix is integrated with Citrix XenMobile / Worx platform, is Citrix Ready Worx verified and officially published in Citrix Worx App Gallery as enterprise mobile application for iOS. WorksPad for MobileIron This special edition is deeply integrated with the MobileIron SDK (AppConnect). It can be deployed and managed by the MobileIron platform. WorksPad for MobileIron natively supports all of the key AppConnect SDK for iOS capabilities. WorksPad for Symantec WorksPad is a member of Symantec Sealed Program with a special edition of WorksPad for Symantec AppCenter delivered for enterprises on iOS and Android.