Archive
Microsoft Intune May updates – #Intunes, #EMM, #MDM, #Mobility, #EnvokeIT
Thsi week Microsoft is going to roll out some new updates like Android Wrapping Tool and new features for iOS, Android and Windows Phone to Microsoft Intunes.
We are excited to share with you the next set of Intune features that will be released between May 19 and May 26. With our monthly release cadence, we continue to focus on providing you with best-in-class experiences that help keep your users productive while protecting your company’s sensitive data. You can expect to see the following new Intune standalone (cloud only) features in this release:
- Ability to extend application protection to your existing line-of-business apps using the Intune App Wrapping Tool for Android (Intune App Wrapping Tool for iOS made available in December 2014)
- Ability to assign help desk permissions to Intune admins, filtering their view of the Intune admin console to only provide access to perform remote tasks (e.g. passcode reset and remote lock)
- RSS feed notification option added for Intune admin to subscribe to be alerted when new Intune service notifications are available for their service instance
- Improved end user experience in the Intune Company Portal app for iOS with step-by-step guidance added on how to access corporate email by enrolling for management and validating device compliance
- Updated Intune Company Portal app for Windows Phone 8.1 to provide enhanced status notifications for app installations
- New custom policy template for managing new Windows 10 features using OMA-URI
- New per-platform mobile device security policy templates for Android, iOS, Windows, and Windows Phone, in addition to new Exchange ActiveSync policy template
- Ability to deploy Google Play store apps that are required/mandatory to install on Android devices
Also, as announced last week, several new hybrid features are now…
Contact us at EnvokeIT if you like assistance with Intunes or continue reading the blog post here.
//Richard
Configuring #XenMobile Device Manager HA Clustering – #MDM, #Citrix
A couple of nice videos from Albert Alvarez here about how to cluster XenMobile device manager!
In my previous post we configured clustered Node 1. In this second Part we will complete the cluster configuration in Node 2 and will validate and test the configuration..
//Richard
10 Mobile Device Management Leaders That Help IT Control #BYOD, #Gartner, #Citrix, #MDM
Consumers love their smartphones and tablets, so it should come as no surprise that they want to use their devices at work. The pressure to develop and deploy a bring-your-own-device (BYOD) policy is on and coming from every direction, including the ‘C’ suite of executives who tend to be especially keen on using smartphones and tablets for their work.
Managing devices in a BYOD environment is no small feat, and the right mobile device management (MDM) product is a key component in making it work. Here are 10 leading MDM vendors in the market today, drawn from the leaders and visionaries in Gartner’s 2013 Magic Quadrant for Mobile Device Management Software.
Magic Quadrant
Report: Android malware doubled in 2012, infecting 33M devices
Malware attacks on devices running Google’s (NASDAQ:GOOG) open-source Android mobile operating system more than doubled in 2012, security solutions firm NQ Mobile reports.
![]() |
NQ Mobile saw a year-over-year increase of malware of 163 percent. |
NQ Mobile discovered 65,227 new pieces of mobile malware in 2012 compared to 24,794 in 2011, a year-over-year increase of 163 percent. Among all new malware discovered last year, 94.8 percent of threats were designed to attack Android, compared to just 4 percent targeting rival open-source platform Symbian. In all, more than 32.8 million Android devices were infected in 2012, up from 10.8 million in 2011, representing an increase of more than 200 percent.
Chinese devices accounted for 25.5 percent of infected Android devices, followed by India (19.4 percent), Russia (17.9 percent), the United States (9.8 percent) and Saudi Arabia (9.6 percent). Fifty-three percent of U.S. Android owners have installed a mobile security app on their device, NQ Mobile adds.
Sixty-five percent of mobile malware discovered in 2012 falls into the category of Potentially Unwanted Programs–e.g., root exploits, spyware, pervasive adware and Trojans (surveillance hacks). Twenty-eight percent was designed to collect and profit from a user’s personal data, and 7 percent was built to prevent the user’s device from functioning properly.
The primary methods for delivering malware in 2012 included App Repackaging (adding lines of malicious code into a legitimate app and reloading it onto a third-party marketplace), Smishing (asking consumers to click on a fraudulent link, triggering a malicious app download or directing their browser to a rogue website) and Malicious URLs (redirecting the browser from genuine websites to clone sites intended to collect personal data).
Critics maintain Google has failed to sufficiently police its Google Play digital storefront, making it easy for attackers to distribute malware via Android applications. Google has made strides to reduce Android threats, however: In early 2012, it unveiled Bouncer, which scans Google Play for malicious apps, and its Android 4.2 OS update, a.k.a. Jelly Bean, bakes in application verification tools.
The NQ Mobile report…
Continue reading here!
//Richard
XenMobile product overview… and It’s nice! via @BasvanKaam – #BYOD, #MDM, #Citrix
Wow! I must say that Bas van Kaam has done a great wrap-up here! I highly recommend you to read this blog post!!! 🙂
It was only about a month ago when I was writing my Blog about the CloudGateway that I wondered which route Citrix would take now that they acquired Zenprise, well… here it is… XenMobile, another Xen sibling sees the light! Lets jump right in…
I had the opportunity to make use of one of Citrix’s demo environments to have a closer look at MDM, which is an awesome way to explore new and existing products by the way, if your company is a Citrix partner and has access I definitely recommend having a look. Besides that I used the Citrix E-Docs website as well as Citrix.com to find as much information as possible.
The main focus of this article will be on XenMobile MDM as the Mobile Solutions Bundle (one of the two editions available) focuses primarily on the CloudGateway which I already discussed in one of my previous blogs.
MDM?
MDM stand for Mobile Device Management and it’s just that! Here’s what Citrix has to say about it: As per Citrix: XenMobile MDM is a robust mobile device management solution that delivers role-based management, configuration, and security for both corporate and employee-owned devices. Upon user device enrollment, IT can provision policies and apps to devices automatically, blacklist or whitelist apps, detect and protect against jailbroken or rooted devices, and selectively wipe a device that is lost, stolen, or out of compliance. Users can use any device they choose, while IT can ensure compliance of corporate assets and secure corporate content on the device.
Editions
There are two editions: XenMobile MDM and the Mobile Solutions Bundle. XenMobile MDM primarily focuses on (hardware) device management, more on it’s extensive feature set shortly. Every major platform is supported including: iPhone, iPad, Android, BlackBerry, Symbian and Microsoft Windows 8. It includes the XenMobile Secure Mobile Gateway (SMG) and XenMobile SharePoint Data Leak Prevention (DLP) as well as the XenMobile Mobile Service Provider (ZSM) and the XenMobile Remote Support Application Toolset.
Surprising Stats About Mobile Security
Another good article!!
Surprising Stats About Mobile Security
IT security and data protection are the top ranked challenges faced by many mobile IT asset managers. This was certainly brought to light in Mobile Enterprise’s IT headaches executive survey, and recent research from the International Association of IT Asset Managers (IAITAM) brings this to light as well.
Lost/Stolen Devices Covered
Asset Tracking?
BYOD
Do you really need a #BYOD policy? – via @GeneMarks
This is a really good article by Gene Marks!
Social media. Cloud computing. Gamification. SaaS. Social CRM. Virtualization. Mobile. Every year we hear of the latest technology issues facing small business owners like me. And now it’s BYOD (Bring Your Own Device). Everywhere I read in the tech world it’s BYOD. That’s because with the proliferation of smartphones, tablets and mini-laptops it’s become the hot tech security issue. Whitepapers are written. Seminars are conducted. Roundtables are moderated. It’s a BYOD year.
I have 10 people in my company. And a half dozen other contractors. These people are using smartphones, tablets and laptops to access our data. We do not have a BYOD policy. Do I really need one? Do all businesses, big or small, need to really worry about this? Or is just another scare tactic from a bunch of IT guys looking to put fear into their clients’ minds and generate additional billable hours.
Hmmm.
The fact that everyone in my company has a different smartphone is of no concern to me. Why should I care if Sam prefers his iPhone but Josh likes his Droid? They are using their phones to call clients on Verizon or AT&T or whatever so I’m not exposed to any risk there. The same with texting. But uh oh…then there’s email. Am I exposed to security issues when they send and retrieve email from our server? No. That’s because we have a hosted mail server and each employee has their own login to their email account. They set up their email on their own with instructions we gave them. Viruses, spam and all the other evil things that could happen via email are (hopefully) controlled by the security software running at the server level.
Magic Quadrant for Endpoint Protection Platforms – #Gartner, #EPP via @rspruijt
Magic Quadrant for Endpoint Protection Platforms
VIEW SUMMARY
The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Market Definition/Description
The enterprise endpoint protection platform (EPP) market is a composite market primarily made up of collections of products. These include:
- Anti-malware
- Anti-spyware
- Personal firewalls
- Host-based intrusion prevention
- Port and device control
- Full-disk and file encryption, also known as mobile data protection
- Endpoint data loss prevention (DLP)
- Vulnerability assessment
- Application control (see Note 1)
- Mobile device management (MDM)
These products and features are typically centrally managed and ideally integrated by shared policies.
DLP, MDM and vulnerability assessment are also evaluated in their own Magic Quadrant or MarketScope analyses. Longer term, portions of these markets will get subsumed by the EPP market, as the personal firewall, host intrusion prevention, device control and anti-spyware markets have in the past. EPP suites are a logical place for convergence of these functions. Indeed, 53% of organizations in a recent Gartner survey1 already use a single vendor for several of these functions, or are actively consolidating products. In particular, mobile data protection is the leading complement to EPP and purchasing decisions regarding the two products are increasingly made together. For most organizations, selecting a mobile data protection system from their incumbent EPP vendors will meet their requirements.
In 2012, the large enterprise EPP market is still dominated by Symantec, McAfee and Trend Micro, which together represent approximately 68% of the total revenue of Magic Quadrant participants. Sophos and Kaspersky Lab are the two other global leaders that are competitive across multiple functions and geographies, and push the combined Leaders quadrant market share to 85%. Despite the introduction of new players, the displacement of incumbents is still a significant challenge in the large enterprise market. The biggest impact of the Magic Quadrant Challengers and Visionaries is to push the dominant market players to invest in new features and functionality (sometimes via acquisitions) to stay ahead, and to keep pricing rational. In the less demanding small and midsize market, competition is more intense. A number of Niche Player solutions are dominant in specific regions.
The total EPP revenue of the Magic Quadrant participants at year-end 2011 was roughly $2.8 billion, up 4% from 2010. We attribute this growth primarily to increased buying of more-expensive suites, offset by lower prices for low-end malware-only solutions. Consequently, EPP revenue growth is more a result of an inflow of revenue from other markets. We anticipate that growth will continue to be in the low single digits in 2013.
Microsoft is the best vendor in a position to challenge the incumbent Leaders, primarily due to attractive pricing in its enterprise agreements. Approximately one-third of enterprise buyers1 indicate they are actively considering Microsoft or plan to do so during their next renewal periods. However, Microsoft’s slow development, the lack of a single unified security management interface and mediocre test results will temper its adoption. Longer term, we believe that increased displacement of Windows endpoints with application-controlled OSs (such as Microsoft WinRT and Apple’s iOS and OS X Mountain Lion) is the biggest market threat. These solutions shift the value proposition of EPP solutions from traditional anti-malware to MDM and data protection capabilities.
Magic Quadrant

Source: Gartner (January 2013)
Vendor Strengths and Cautions
Arkoon Network Security
Arkoon Network Security’s StormShield EPP solution (formerly offered by SkyRecon Systems) is designed as a seamless integrated EPP with a focus on behavioral protection. Arkoon’s Ability to Execute score is hampered by its relatively small market share and limited geographic presence, as well as its still-maturing management capabilities….
Continue reading here!
//Richard