SlideShare a Scribd company logo
Tachyon™v1
© 2011-15 Kaprica Security Inc. • kaprica.com • sales@kaprica.com • +1 (202) 430-6685 1 of 2
12110 Sunset Hills Road, Suite LL4, Reston, VA 20190 USA 21-Oct-15
1-click enterprise mobile device configuration, deployment and updating
Tachyon automates the configuration, deployment and updating of Samsung tablets or smartphones
for organizations with 50 or more devices. Traditionally, government, healthcare, finance, retail and
field services organizations carried out these tasks manually, or with partial automation using existing
tools, spending from a few minutes to over 1 hour per device, often with poor quality control.
Tachyon’s unique automation offers these benefits:
 Greater speed
Dramatically faster OTA configuration and in-field updating
 Greater accuracy & security
Automated integration with corporate data, automated QA
testing and compliance reporting, ensuring every device is
configured or maintained exactly as intended
 Reduced cost & risk
Directly through automation and indirectly from end-user
productivity gains due to correct first time configuration,
avoidance of re-work and security issues from misconfiguration
 Full customization
In-depth configuration of all apps, settings & data automated
using API calls or user interface stimulation
 Better user experience
1-click by admins, or by end-user “self-service” for greater
savings in time and costs
 Infrastructure flexibility
Runs standalone, or as a compliment to Samsung Knox™
and/or leading MDMs. Available in cloud or on-premises
What is Tachyon?
“87% of Android devices are
vulnerable to known flaws”
University of Cambridge 1
“75% of mobile security
breaches will be the result of
mobile application
misconfiguration”
Gartner Research 2
“Tachyon is dramatically
bolstering the overall rollout
process at scale … truly a
game changer … raising a
great deal of interest in
government and industry
verticals”
Nick Rea, VP Technical
Solutions, Samsung
Electronics America
1) lightbluetouchpaper.org/2015/10/08/87-of-
android-devices-insecure-because-
manufacturers-fail-to-provide-security-
updates/
2) gartner.com/newsroom/id/2753017
Tachyon™v1
© 2011-15 Kaprica Security Inc. • kaprica.com • sales@kaprica.com • +1 (202) 430-6685 2 of 2
12110 Sunset Hills Road, Suite LL4, Reston, VA 20190 USA 21-Oct-15
Tachyon consists of an Android app and a web-based admin portal. Scripts are easily setup from the
portal and linked to corporate data. The Tachyon app runs the scripts, with one-click from a QR code,
email, or right out of the box when used with Samsung’s KNOX Mobile Enrollment.
Tachyon use cases include:
 Provisioning and refreshes
 Reconfiguring devices on an ongoing basis, for example, in sanitizing data between patients
 Migrating from one MDM to another in-the-field
Short demo videos
 Via QR code kaprica.com/s/tachyonapp2
 Via KNOX Mobile Enrollment kaprica.com/s/tachyonapp3
Can’t I do that with my existing MDM or USB configuration tool?
Tachyon automation delivers more than traditional kitting and provisioning processes, regardless of
whether they are manual or partially automated via MDM management or USB-based configuration
software.
Tachyon’s features cover:
 All Samsung smartphones & tablets
 All carriers with Android 4.4 or later
 All settings
 All apps, 3rd party or in-house
 All app stores, 3rd party or Google
 MDM enrollment & configuration,
e.g. AirWatch, MobileIron & Good
 Samsung KNOX 1.0 or later,
activation and configuration with
container or kiosk
 Certificate import
Getting started
 Please contact us directly for more information, a free customized trial or demo
About Kaprica Security Inc.
Kaprica Security Inc. is an expert in mobility and security, providing hosted and on premise solutions.
Kaprica was founded in 2011 by a team of cyber security experts from Lockheed Martin and Carnegie
Mellon University, with the goals of delivering high quality cyber security services to a wide
government and enterprise audience, and simultaneously developing easy to use and deploy software
tools to support them. Today, clients range from DARPA, to the Department of Transportation,
Lockheed, Intel and the University of Maryland. Kaprica is a Silver-Level Samsung partner and its
enterprise software products include the Skorpion™, Tachyon™ and RunSafe™ lines and associated
patents. Kaprica is headquartered just outside Washington, DC, in Reston, VA, with offices in Austin,
TX. Learn more at www.kaprica.com.

More Related Content

What's hot

Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
Xperteks
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
Pete Wassell
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
Symantec
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
RapidValue
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Sierraware
 
Mainstay Fortify Infographic - $50M in annual benefits
Mainstay Fortify Infographic - $50M in annual benefitsMainstay Fortify Infographic - $50M in annual benefits
Mainstay Fortify Infographic - $50M in annual benefits
Mainstay
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile DevicesSecure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
SAP Solution Extensions
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Arnold Bijlsma
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
Sierraware
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
Prime Infoserv
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
Samsung SDS America
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
GGR Communications
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
Apperian
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
Petr Dvorak
 

What's hot (20)

Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Mainstay Fortify Infographic - $50M in annual benefits
Mainstay Fortify Infographic - $50M in annual benefitsMainstay Fortify Infographic - $50M in annual benefits
Mainstay Fortify Infographic - $50M in annual benefits
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile DevicesSecure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 

Viewers also liked

RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle Guardian
Peter Laitin
 
Practica 2
Practica 2Practica 2
Practica 2
Jorgeuniandes
 
Ejemplos sindrome respiratorio
Ejemplos sindrome respiratorioEjemplos sindrome respiratorio
Ejemplos sindrome respiratorio
Katita Bermeo
 
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...
gamboafeijoo
 
Ley general de educación
Ley general de educaciónLey general de educación
Ley general de educación
Fabirita
 
Phantom limelight collection 2015
Phantom limelight collection 2015Phantom limelight collection 2015
Phantom limelight collection 2015
Philippe Platteau
 
OPINT at a glance
OPINT at a glanceOPINT at a glance
OPINT at a glance
Alon Cohen
 
16 diagramas
16 diagramas16 diagramas
16 diagramas
Daniiel Gonzalez
 
Cicloo iv
Cicloo ivCicloo iv
Cicloo iv
Dragonci
 
Brand Measurement Solutions
Brand Measurement SolutionsBrand Measurement Solutions
Brand Measurement Solutions
Mazen Mroueh
 
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...
gamboafeijoo
 
Arquitectura de un computador
Arquitectura de un computadorArquitectura de un computador
Arquitectura de un computador
Marlon Fuentes
 
El perú
El perúEl perú
El perú
Javier Correa
 
TIPOS DE SOFTWARE.
TIPOS DE SOFTWARE.TIPOS DE SOFTWARE.
TIPOS DE SOFTWARE.
Fany_leija
 
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...
gamboafeijoo
 

Viewers also liked (16)

RunSafe Vehicle Guardian
RunSafe Vehicle GuardianRunSafe Vehicle Guardian
RunSafe Vehicle Guardian
 
Practica 2
Practica 2Practica 2
Practica 2
 
Ejemplos sindrome respiratorio
Ejemplos sindrome respiratorioEjemplos sindrome respiratorio
Ejemplos sindrome respiratorio
 
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 5. Riesg...
 
Ley general de educación
Ley general de educaciónLey general de educación
Ley general de educación
 
Phantom limelight collection 2015
Phantom limelight collection 2015Phantom limelight collection 2015
Phantom limelight collection 2015
 
OPINT at a glance
OPINT at a glanceOPINT at a glance
OPINT at a glance
 
16 diagramas
16 diagramas16 diagramas
16 diagramas
 
aseza
asezaaseza
aseza
 
Cicloo iv
Cicloo ivCicloo iv
Cicloo iv
 
Brand Measurement Solutions
Brand Measurement SolutionsBrand Measurement Solutions
Brand Measurement Solutions
 
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 6. Revis...
 
Arquitectura de un computador
Arquitectura de un computadorArquitectura de un computador
Arquitectura de un computador
 
El perú
El perúEl perú
El perú
 
TIPOS DE SOFTWARE.
TIPOS DE SOFTWARE.TIPOS DE SOFTWARE.
TIPOS DE SOFTWARE.
 
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...
Seminario: Evaluación de la Gestión Integral de Riesgos Financieros: 4. Riesg...
 

Similar to Tachyon_Flyer

CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
CA Technologies
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
Robert Kleinschmidt
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
Mike Rizzo
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
Mighty Guides, Inc.
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
William John Todd
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Tim Harvey
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
Melissa Luongo
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
Gary Sandoval
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
Symantec
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
InvestorSymantec
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
Gilles Sgro
 
Best Practices for Security and Performance Testing Services
Best Practices for Security and Performance Testing ServicesBest Practices for Security and Performance Testing Services
Best Practices for Security and Performance Testing Services
Testrig Technologies
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
Chris Pepin
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
Harman DTS
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
Herve Danzelaud
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
Warba Insurance Co Kuwait
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
Softweb Solutions
 

Similar to Tachyon_Flyer (20)

CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
 
Best Practices for Security and Performance Testing Services
Best Practices for Security and Performance Testing ServicesBest Practices for Security and Performance Testing Services
Best Practices for Security and Performance Testing Services
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 

Tachyon_Flyer

  • 1. Tachyon™v1 © 2011-15 Kaprica Security Inc. • kaprica.com • sales@kaprica.com • +1 (202) 430-6685 1 of 2 12110 Sunset Hills Road, Suite LL4, Reston, VA 20190 USA 21-Oct-15 1-click enterprise mobile device configuration, deployment and updating Tachyon automates the configuration, deployment and updating of Samsung tablets or smartphones for organizations with 50 or more devices. Traditionally, government, healthcare, finance, retail and field services organizations carried out these tasks manually, or with partial automation using existing tools, spending from a few minutes to over 1 hour per device, often with poor quality control. Tachyon’s unique automation offers these benefits:  Greater speed Dramatically faster OTA configuration and in-field updating  Greater accuracy & security Automated integration with corporate data, automated QA testing and compliance reporting, ensuring every device is configured or maintained exactly as intended  Reduced cost & risk Directly through automation and indirectly from end-user productivity gains due to correct first time configuration, avoidance of re-work and security issues from misconfiguration  Full customization In-depth configuration of all apps, settings & data automated using API calls or user interface stimulation  Better user experience 1-click by admins, or by end-user “self-service” for greater savings in time and costs  Infrastructure flexibility Runs standalone, or as a compliment to Samsung Knox™ and/or leading MDMs. Available in cloud or on-premises What is Tachyon? “87% of Android devices are vulnerable to known flaws” University of Cambridge 1 “75% of mobile security breaches will be the result of mobile application misconfiguration” Gartner Research 2 “Tachyon is dramatically bolstering the overall rollout process at scale … truly a game changer … raising a great deal of interest in government and industry verticals” Nick Rea, VP Technical Solutions, Samsung Electronics America 1) lightbluetouchpaper.org/2015/10/08/87-of- android-devices-insecure-because- manufacturers-fail-to-provide-security- updates/ 2) gartner.com/newsroom/id/2753017
  • 2. Tachyon™v1 © 2011-15 Kaprica Security Inc. • kaprica.com • sales@kaprica.com • +1 (202) 430-6685 2 of 2 12110 Sunset Hills Road, Suite LL4, Reston, VA 20190 USA 21-Oct-15 Tachyon consists of an Android app and a web-based admin portal. Scripts are easily setup from the portal and linked to corporate data. The Tachyon app runs the scripts, with one-click from a QR code, email, or right out of the box when used with Samsung’s KNOX Mobile Enrollment. Tachyon use cases include:  Provisioning and refreshes  Reconfiguring devices on an ongoing basis, for example, in sanitizing data between patients  Migrating from one MDM to another in-the-field Short demo videos  Via QR code kaprica.com/s/tachyonapp2  Via KNOX Mobile Enrollment kaprica.com/s/tachyonapp3 Can’t I do that with my existing MDM or USB configuration tool? Tachyon automation delivers more than traditional kitting and provisioning processes, regardless of whether they are manual or partially automated via MDM management or USB-based configuration software. Tachyon’s features cover:  All Samsung smartphones & tablets  All carriers with Android 4.4 or later  All settings  All apps, 3rd party or in-house  All app stores, 3rd party or Google  MDM enrollment & configuration, e.g. AirWatch, MobileIron & Good  Samsung KNOX 1.0 or later, activation and configuration with container or kiosk  Certificate import Getting started  Please contact us directly for more information, a free customized trial or demo About Kaprica Security Inc. Kaprica Security Inc. is an expert in mobility and security, providing hosted and on premise solutions. Kaprica was founded in 2011 by a team of cyber security experts from Lockheed Martin and Carnegie Mellon University, with the goals of delivering high quality cyber security services to a wide government and enterprise audience, and simultaneously developing easy to use and deploy software tools to support them. Today, clients range from DARPA, to the Department of Transportation, Lockheed, Intel and the University of Maryland. Kaprica is a Silver-Level Samsung partner and its enterprise software products include the Skorpion™, Tachyon™ and RunSafe™ lines and associated patents. Kaprica is headquartered just outside Washington, DC, in Reston, VA, with offices in Austin, TX. Learn more at www.kaprica.com.