The document is a presentation by Lars Bodenhoff, Business Development Manager at MobileAdvisor, about Zenprise and enterprise mobility management. It summarizes that mobile devices and apps are proliferating rapidly, and the best companies are 3 times as likely to have a mobility strategy. It then outlines Zenprise's offerings for mobile device management, including their MobileManager software, ZenCloud cloud-based solution, and services and support. Finally, it discusses Zenprise's security, compliance, on-premise and cloud architectures.
Thomas Gronbach, Tobias Dreyschultze
Keynote
Veranstaltung: M-Days 2013
Blog by Messe Frankfurt for the Digital Business:
http://connected.messefrankfurt.com/en/
INTELLIGENT INFORMATION GROUP DELIVERS
Easier to develop, easier to deploy, easier to maintain
New user experiences that delight our customers
Increased automation to improve business efficiency
AGILITY, INTELLIGENCE, PRODUCTIVITY
Thomas Gronbach, Tobias Dreyschultze
Keynote
Veranstaltung: M-Days 2013
Blog by Messe Frankfurt for the Digital Business:
http://connected.messefrankfurt.com/en/
INTELLIGENT INFORMATION GROUP DELIVERS
Easier to develop, easier to deploy, easier to maintain
New user experiences that delight our customers
Increased automation to improve business efficiency
AGILITY, INTELLIGENCE, PRODUCTIVITY
Context Awareness, MEAP - Mobile Enterprise Application Platform, Development platform plus distribution via Enterprise App Store and Enterprise App Kiosk.
Webinar deck for our session on Virtual Desktop technology & how it can empower employees and streamline network management & costs. Access the session on-demand at: http://www.ali-inc.com/info-resource-center.html
TEMIA and Wireless Analytics hosted a webinar on Wednesday that helped participants understand their options when choosing an MDM supplier. Attendees were able to learn more about their options for MDM providers, BYOD programs and other issues that are key to mobilizing an enterprise’s workforce. Here are five key MDM considerations Erik Eames, managing director and Fernando Oliveira, VP of client services, shared with webinar attendees.
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
In this webinar we discussed the future of mobile application security in the enterprise?
Smart phones, tablets and even e-readers are now seen as security problems for an enterprise by some IT organizations. Applying MDM — aka mobile device management — has been the response of IT to handle devices, but this approach is lacking, especially as BYOD (bring your own device) has become the primary source of devices in companies. And, as “apps” have proliferated, the apps and data are becoming the engine of user empowerment and ROI — and risk.
Users are not accepting the restrictions MDM places on their use of the phone, especially when the user actually owns the device. And if the user leaves, IT may wipe the device, personal data and all. Mobile Application Management (MAM) promise a solution that keeps enterprise apps and data separate and secure. Other approaches are coming in the future as well. Virtualization promises that one phone can run two VMs, one personal and one business. There are containers and sandboxed apps. Ultimately, different approaches to application development and management could solve the puzzle of protecting confidential data while keeping individuals productive. What approach will win out?
We’re calling it: 2013 is the Year of the Enterprise Mobile App!
Are you prepared to transform your business with increased mobile productivity? Mobile management solutions are proliferating: MDM, MAM, MBAAS, Virtualization, Containers, NAC, SDN. Which makes the most sense for your business and when?
What are the technology challenges? What are the new possibilities, applications, services or features that will empower mobile workers even more?
Experts on these subjects will cover several interesting topics: Mobile data, Device Management, Mobile Security and Mobile Enterprise Apps.
Mobile Device Management by Ulrik Van Schepdael – Mobco
Slides from our Lunch n' Learn webinar show how a Cisco Business Edition VOIP phone solution and related collaboration technologies deliver immediate and lasting benefits for companies who are not willing to settle for less than what they need to get the job done. We'll even show you some great financing offers to help make the transition even easier on your budget.
Request link to recording at: http://info.ali-inc.com/UnifiedCommunications_WebinarRegistration.html
Context Awareness, MEAP - Mobile Enterprise Application Platform, Development platform plus distribution via Enterprise App Store and Enterprise App Kiosk.
Webinar deck for our session on Virtual Desktop technology & how it can empower employees and streamline network management & costs. Access the session on-demand at: http://www.ali-inc.com/info-resource-center.html
TEMIA and Wireless Analytics hosted a webinar on Wednesday that helped participants understand their options when choosing an MDM supplier. Attendees were able to learn more about their options for MDM providers, BYOD programs and other issues that are key to mobilizing an enterprise’s workforce. Here are five key MDM considerations Erik Eames, managing director and Fernando Oliveira, VP of client services, shared with webinar attendees.
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
In this webinar we discussed the future of mobile application security in the enterprise?
Smart phones, tablets and even e-readers are now seen as security problems for an enterprise by some IT organizations. Applying MDM — aka mobile device management — has been the response of IT to handle devices, but this approach is lacking, especially as BYOD (bring your own device) has become the primary source of devices in companies. And, as “apps” have proliferated, the apps and data are becoming the engine of user empowerment and ROI — and risk.
Users are not accepting the restrictions MDM places on their use of the phone, especially when the user actually owns the device. And if the user leaves, IT may wipe the device, personal data and all. Mobile Application Management (MAM) promise a solution that keeps enterprise apps and data separate and secure. Other approaches are coming in the future as well. Virtualization promises that one phone can run two VMs, one personal and one business. There are containers and sandboxed apps. Ultimately, different approaches to application development and management could solve the puzzle of protecting confidential data while keeping individuals productive. What approach will win out?
We’re calling it: 2013 is the Year of the Enterprise Mobile App!
Are you prepared to transform your business with increased mobile productivity? Mobile management solutions are proliferating: MDM, MAM, MBAAS, Virtualization, Containers, NAC, SDN. Which makes the most sense for your business and when?
What are the technology challenges? What are the new possibilities, applications, services or features that will empower mobile workers even more?
Experts on these subjects will cover several interesting topics: Mobile data, Device Management, Mobile Security and Mobile Enterprise Apps.
Mobile Device Management by Ulrik Van Schepdael – Mobco
Slides from our Lunch n' Learn webinar show how a Cisco Business Edition VOIP phone solution and related collaboration technologies deliver immediate and lasting benefits for companies who are not willing to settle for less than what they need to get the job done. We'll even show you some great financing offers to help make the transition even easier on your budget.
Request link to recording at: http://info.ali-inc.com/UnifiedCommunications_WebinarRegistration.html
Altimeter Group: Building A Foundation For Mobile BusinessChris Silva
In this webinar delivered March 28th, 2012, Altimeter Group's Charlene Li and Chris Silva discuss the importance of creating a solid foundation for mobility initiatives - a mobile control plane - to usher in the era of business-led mobility projects. Published under open research.
With 50% of the mobile phone users in the US carrying a smartphone, tablets selling out as soon as they're launched, and the measure of apps downloaded numbering in the billions, it's time to start harnessing these devices to empower employees and drive business value. There are myriad examples of how business are improving efficiency and employee productivity with mobile, and who better to empower these players than their line of business management? The possibility exists today, but the critical first step still belongs to IT. In order to unleash mobile, IT organization must create a foundation for mobile, a control plane that underlies mobile business tools, that extends beyond simple MDM. This control layer contains both leadership and technology elements, from policies and a set of roles and responsibilities to mobile security and management tools. Only when this control plane is in place can the business start rolling out solutions for information consumption, creation and collaboration. This webinar will present the proper scope for mobility control, necessary elements of the technology and leadership to build a solid foundation for mobility.
iQ FutureNow: Ensuring the success of your mobile strategyiQcontent
Xavier Agnetti from Adobe tells us directly from the leader of digital marketing technology how to analyse and measure the effectiveness of your mobile strategy. First presented at iQ FutureNow, Manchester 4 July 2012.
Ibm solutions for the mobile enterpriseChris Pepin
Presentation from IBM VP of Cloud and Services Marketing, Rich Lechner and IBM CTO of Mobility Bill Bodin. Presented at Gartner Symposium 2012 in Orlando, FL
Using Apps as an interactive business development tool for professional service organisations, such as Lawyers and Accountants.
www.yourlandscape.co.uk/doc2app
#doc2app
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
Apperian and VDC Research team up to present the impact BYOD has on IT organizations today. Forward thinking companies recognize that consumerization of IT and mobility are underpinning the next significant increase in end-user productivity.
Apperian’s Director of Product Marketing, Stephen Skidmore, and VDC Research’s Sr. Mobility Analyst, Eric Klein, discuss the complexities and opportunities of mobilizing your workforce, covering a broad range of issues and research:
-Overview of the enterprise-grade solutions that have emerged to secure mobile applications and manage the application lifecycle
-Opportunities and benefits of taking your workforce mobile
-How to balance securing mobile devices without risk or adversely impacting the user experience
Turning Mobile Apps Into Real Business Opportunity and SuccessAntenna Software
How do you define success for your enterprise applications?
Research show only 25% of employee mobile projects and 22% of consumer ones are widely taken up by intended users.*
Just because you build it – does not guarantee they will come. Just because you spend thousands of dollars on your enterprise apps does not mean you are guaranteed success.
In these slides from a previously aired webinar learn:
How to define App Success for both B2E and B2C apps
How our customer CIO’s and CMO’s measure App Success
How mobile apps can quantifiably transform your business (case study examples)
How to gain control and visibility over your mobile strategy
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
This session presents strategies to employ when planning to build a mobile application within an IBM Domino environment. Depending upon the need, whether it be mobilizing an existing Domino app, building a new Notes app with mobile components, or building an app that will support mobile first, we'll help you address the challenges that you will face in your project. What devices will I support? Does the business team understand mobile considerations when providing requirements? Does the admin team have the skills to support the mobile environment? Can I take advantage of my existing Domino infrastructure and skills? You'll leave with an understanding of the key considerations involved in building a mobile application strategy for your organization.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The mobility space has seen dramatic change in the last few years.Imagine, a year and a half ago the iPad didn’t exist. Last year saw the explosion of apps, and this year we’re seeing businesses really get serious about mobile. With the bring your own device trend well underway, lots of organizations are using mobile to transform their business.
With that opportunity comes risk. The last decade has seen the security and IT world invest billions to get secure and compliant, but with mobile on the scene, all the security and compliance holes we spent the last decade fixing are opened back up. Three use cases we address at Zenprise are around mobile devices connecting to corporate over insecure networks, users exposing the organization to malicious or non-compliant apps by downloading those apps on the devices they use for work and play; and employees accessing confidential data from their mobile devices.
Before we talk to you about our product and our areas of differentiation…it helps to get some context. It’s one thing for us to say that we’re unique and a leader. But it’s another when Gartner says so. In its Critical Capabilities report, Gartner ranked Zenprise number one and in the most recent Magic Quadrant, Zenprise is positioned as a Leader. Forrester has also given us a perfect score across the board for both our on-premise and cloud solutions.And we have more than a thousand customers who run their mobile enterprises on Zenprise.
We have three primary offerings: on premise and cloud-based mobile device management solutions and a host of support and services offerings to help you with your mobile goals.
As a baseline, your MDM solution should support your organization’s mobile devices over their lifecycle. This includes: Configuring devices and setting policies.Provisioning devices by having users self-service enroll, providing an enterprise app store, and delivering policies and apps over the air.Securing devices by configuring native security settings, blacklisting and whitelisting apps, locking apps, and securing data; Providing helpdesk functions, remote support, and troubleshooting; Monitoring and reporting on device, service, infrastructure, security, and compliance; and Decommissioning devices upon employee departure
Beyond basic device lifecycle management, we have a number of additional unique capabilities. Before we go into them, it would be helpful to know what areas are important to you. One of the ways we like to think about our customers’ requirements is by understanding where they are on their mobile adoption journey. We use this Mobile Maturity Model as a guide.CLICK. Some organizations are allowing mobile devices on the network, but managing them in an ad hoc way. We call this UNMANAGED.CLICK. Others are concerned about just getting user-owned devices under management and doing basic blocking and tackling like lock and wipe. This is the MANAGED category.CLICK. Beyond that, some of our BYOD customers also have security requirements they need to think about. Maybe they’re in a highly regulated industry or handle sensitive data. This is the ADVANCED category.CLICK. Finally, we have customers who are going beyond BYOD and rolling out mobile strategies because they are trying to do things differently in their business. Like retailers distributing iPads to salespeople and logistics companies arming workers in a distribution center with ruggedized Androids so they can make better consumer goods picking, packing, loading, and distribution decisions.[DISCOVERY ABOUT WHICH FIVE POINTS MATTERS MOST – SIMPLE TO MANAGE, CUSTOMER SUPPORT/SERVICES, END-TO-END SECURITY/COMPLIANCE, ENTERPRISE-GRADE ARCHITECTURE, or MOBILE BUSINESS OPTIMIZATION]Now that we have an understanding of where you are and the capabilities your organization cares about, I’d like to talk about some of Zenprise’s capabilities and focus on the areas of interest for you.
Using our Mobile Maturity Model as a framework to talk about Zenprise differentiation, a basic requirement for MANAGED is ease of use. A lot of MDM vendors say they’re easy to use, but the devil is in the details…Whether on-premise or in the cloud, Zenprise is so simple that even your boss can manage it!CLICK.Zenprise has a simple, wizard-based deployment. We mix-and-match and re-use components that are visually grouped by device type, deploying “packages” to devices. We also integrate with LDAP directly, so users can be part one or multiple groups, like “Executive”, “Sales”, and “East Coast”. That way, if they need to get their sales apps, their executive policies, and the Wi-Fi configuration for East Coast, they can get all those things in one fell swoop. This is unlike some of our competitors who have one-to-one user-group mappings or who don’t group components by supported device type. This means the admin has to create packages for every component or user-group combination, or manually check to make sure that all of the policies got deployed to the proper devices, which are time-consuming and error-prone.CLICK.Beyond mixing-and-matching components and user groups, making changes is easy. If you change a policy, that change will automatically propagate where it needs to. This is unlike some of our competitors whose components are static once they’re packaged up. So if the admin reuses the same passcode policy in five packages and then makes a change to that passcode policy, he has to go in and manually change it in all five places. Doing it this way…it’s almost impossible to not make mistakes.CLICK.Because our LDAP integration is direct and real-time, personnel changes are automatically reflected in our system. This is mandatory if you have any policies that are based on roles. Some of our competitors are either not integrated with LDAP for groups or not integrated in real-time with LDAP; so admins have to go in and manually keep all personnel changes up to date, and the chances of being out of compliance are far higher. As one of our customers in the electric supply business, Codale, put it: “With Zenprise, I can just ‘set it and forget it’.”
Not only are we simple to manage, but we’re simple and transparentfor users, which means fewer support calls to IT support. Some of our competitors require, for example, the user to have a GMAIL account to register an Android device, which creates a huge headache for IT at enrollment time, and others burden users with things like agreeing to having location services turned on on the device so they can monitor device status like whether the device is jailbroken. But that’s really a burden for users who have to deal with the battery drain of location services just so they can enroll in their company’s BYOD program.As one of our Phoenix-based Transportation customers put it, “users don’t even know it’s there”.
A basic requirement of all of our customers, no matter where they are in their mobile adoption, is great services, support, and training. Our competitors talk about their support offerings, but make sure you push on them to make sure you’re getting the same level of commitment.We’ve made customer success our number one priority. Only Zenprise offers global, 24x7x365 support across all time zones, and with support in key local languages: English, Spanish, German, French, Russian, Mandarin, Hindi, Filipino, Portuguese, Japanese.Our customer success professionals are top-notch in their field, with an average of a technical bachelor of science degree and 10 years of experience.We’ve also shown commitment with lots of product communications choices, clear SLAs, a social presence, and by simply prioritizing the hiring of really talented support folks.
Again going back to our Mobile Maturity Model, as we move from basic requirements into the more advanced territory of tighter security requirements or regulation, we help there too.Most of our competitors’ security story is around configuring thesecurity on the device, and it kind of stops there. This is necessary but not sufficient. Zenprise’s capabilities extend beyond the device to apps, the network, and data. A testimonial to this is that one of our medical device customers in the Southwest chose us because some of their users had mobile access to an application that contained some patient data that they needed to protect and they knew we had their back with our application and network security.Our competitors talk about being secure, but again, the devil is in the details. Do they have “always on” device compliance, and security beyond the device – at the app, network, and data layers?Beyond configuring security on the device, we have what we call “always on” device compliance, which includes a pre-deployment compliance check, policy enforcement at the gateway, and the ability to differentiate between individually-liable and corporate-liable devices. This is unlike some of our competitors who can’t check device compliance, so non-compliant or even malware-infected devices can get enrolled onto and infect the network before the first policy is even deployed. Also, some don’t block on really basic things like blacklisted apps. Finally, some allow users to decline location services or even remove a profile from their device, which means that a single infected device can put the whole corporate network at risk. “Always on” device compliance is something we uniquely deliver.Beyond some basic things like application blacklisting, whitelisting, and restricting apps or resources like iTunes or the Android Market (yes, we do it on Android too!), we have some really unique app security for Android and Windows Mobile, including app lock and kill, and something we call Mobile App Tunnels. Mobile App Tunnels are like VPNs but for an individual app, and encrypt and compress the app connection and data. One of our customers – a national railway in Europe – uses Mobile App Tunnels not just for security but also for transaction reliability. Mobile App Tunnels and this level of application security is absolutely unique to Zenprise – only we provide it.On network security, let’s face it: your users are going to log in from insecure places. So we protect you by letting you either restrict access in certain circumstances or by helping you provision VPNs or Mobile App Tunnels. Something we do that our competitors don’t is provide Mobile Security Intelligence, or information about what mobile users are doing on your network. We integrate that data with your SIEM, so you can see things like mobile compliance violations and insider threats as part of your overall security visibility. Mobile Security Intelligence is absolutely unique to Zenprise – only we provide it.Finally, we protect data at rest, in use, and in motion. Our mobile DLP feature is kind of like Dropbox for mobile, but with enterprise controls. We let you securely distribute sensitive files to a secure doc container, synchronizefile changes across all users for version control, and let you block users from doing things like printing, saving, and emailing from the device. We integrate with content repositories starting with SharePoint. Mobile DLP is absolutely unique to Zenprise – only we provide it.Some of these features are basic, some advanced. But together they make for a pretty comprehensive and differentiated security and compliance story.
Also in the more ADVANCED category is architecture. Given how important mobile access is, architecture can make or break you. CLICK. We pass muster with your security architects. Unlike some of our appliance based competitors, we don’t hold your data hostage in the DMZ. We also don’t require that you synch or store LDAP data in the DMZ like our competitors do. Finally, the way we’re built doesn’t require you to open a bunch of ports to make the solution work. Some of the appliance based solutions would have you open 3x the number of ports we do. And because we meet security best practices, it’s just a lot easier and more straightforward to get buy-in on the deployment plan from your security and network counterparts.CLICK. Any business-critical mobile environment needs to be highly available. We support active-active clustering at all tiers so there are no points of failure. It’s industry-standard, straightforward, and clearly documented, so there’s no mystery. Some of our competitors say they are highly available, but make you call customer support for any information on how to configure it, and some do it through a series of steps that involve virtual machine snapshots, which is either a manual process or requires you to run scripts to make failover and failback work. Those just don’t scale – when you go down, you need your HA to just work. We also have a scale-out architecture with load balancing built in, so we can scale as your deployment grows.We also don’t require changes to your mail environment. Some of our competitors do, and we’ve learned that this has caused grief for IT because simple things like an upgrade or even a patch can cause downtime for Exchange, your MDM, or both until they can give you a patch to fix the problem.
Our customers have the option of taking advantage of our cloud deployment as well. We run on SAS70 Type II and FISMA Moderate compliant and Federal Cloud Certified infrastructure…CLICK. …that’s highly available, scalable, and globally redundant with four datacenters around the world. CLICK. It’s a truly cloud, multi-tenant solution, but with separate database instances for each of our customers so that their data won’t be co-mingled. This is unlike some of our cloud competitors who do co-mingle customer data in the cloud, and whose customers have experienced data loss, exposure, or corruption. This is also unlike some of our cloud competitors who do not offer secure access to the corporate backend such as LDAP, PKI, Exchange ActiveSync, and even the BES environment.
It’s one thing to make a theoretical argument about how our architecture is secure, available, and scalable, but we’ve proven ourselves in large, production deployments with some of the most demanding enterprises and government organizations.
As you plan for BYOD and beyond, consider some of our customers and their stories, from arming healthcare field personnel around the world with secure access to their apps while also making sure they’re compliant with local employee privacy laws.Or this large European logistics company who is not only using Zenprise for their field personnel but also our Mobile DLP solution to distribute and time-expire sensitive docs to its board of directors.Or this medical devices company that migrated its sales team to iPads, and uses Zenprise to make the latest version of sales collateral and presentations available when and where they’re needed.