Archive

Posts Tagged ‘Device’

Microsoft Intune May updates – #Intunes, #EMM, #MDM, #Mobility, #EnvokeIT

Thsi week Microsoft is going to roll out some new updates like Android Wrapping Tool and new features for iOS, Android and Windows Phone to Microsoft Intunes.

We are excited to share with you the next set of Intune features that will be released between May 19 and May 26.  With our monthly release cadence, we continue to focus on providing you with best-in-class experiences that help keep your users productive while protecting your company’s sensitive data. You can expect to see the following new Intune standalone (cloud only) features in this release:

  • Ability to extend application protection to your existing line-of-business apps using the Intune App Wrapping Tool for Android (Intune App Wrapping Tool for iOS made available in December 2014)
  • Ability to assign help desk permissions to Intune admins, filtering their view of the Intune admin console to only provide access to perform remote tasks (e.g. passcode reset and remote lock)
  • RSS feed notification option added for Intune admin to subscribe to be alerted when new Intune service notifications are available for their service instance
  • Improved end user experience in the Intune Company Portal app for iOS with step-by-step guidance added on how to access corporate email by enrolling for management and validating device compliance
  • Updated Intune Company Portal app for Windows Phone 8.1 to provide enhanced status notifications for app installations
  • New custom policy template for managing new Windows 10 features using OMA-URI
  • New per-platform mobile device security policy templates for Android, iOS, Windows, and Windows Phone, in addition to new Exchange ActiveSync policy template
  • Ability to deploy Google Play store apps that are required/mandatory to install on Android devices

Also, as announced last week, several new hybrid features are now…

Contact us at EnvokeIT if you like assistance with Intunes or continue reading the blog post here.

//Richard

Configuring #XenMobile Device Manager HA Clustering – #MDM, #Citrix

March 7, 2014 1 comment

A couple of nice videos from Albert Alvarez  here about how to cluster XenMobile device manager!

In my previous post we configured clustered Node 1.  In this second Part we will complete the cluster configuration in Node 2  and will validate and test the configuration..

//Richard

10 Mobile Device Management Leaders That Help IT Control #BYOD, #Gartner, #Citrix, #MDM

Consumers love their smartphones and tablets, so it should come as no surprise that they want to use their devices at work. The pressure to develop and deploy a bring-your-own-device (BYOD) policy is on and coming from every direction, including the ‘C’ suite of executives who tend to be especially keen on using smartphones and tablets for their work.

Managing devices in a BYOD environment is no small feat, and the right mobile device management (MDM) product is a key component in making it work. Here are 10 leading MDM vendors in the market today, drawn from the leaders and visionaries in Gartner’s 2013 Magic Quadrant for Mobile Device Management Software.

Magic Quadrant

Figure 1. Magic Quadrant for Mobile Device Management Software
Figure 1.Magic Quadrant for Mobile Device Management Software

 
 

Source: Gartner (May 2013)

Continue reading here!

//Richard

 

#Windows 8.1’s #BYOD enhancements ready for business adoption – via @kenhess

This is actually great news and a great article by Ken Hess! Microsoft is finally understanding the new BYOD use cases and scenarios! Interesting reading…

Summary: Microsoft understands, better than any other software company, that BYOD is actually a thing. It’s a thing to be dealt with at the source, which is exactly what they’re doing.

Everyone has weighed in on Microsoft’s Windows 8.1 update due at the end of the month, but few have highlighted the finer points of this significant update. Personally, I see Windows 8.1 as the new business operating system for desktop computing. Microsoft has listened to its critics and has made some super improvements on its much-beleagured new operating system.

Some of the more exciting improvements come in the form of BYOD enhancements. I believe that it is these features that will propel Windows 8.x onto corporate desktop systems and out of critical oblivion.

Excerpt from Stephen L. Rose’s Springboard Blog on Windows.com.

B.Y.O.D (Bring Your Own Device) Enhancements

  • Workplace Join – A Windows 8 PC was either domain joined or not. If it was a member of the domain, the user could access corporate resources (if permissioned) and IT could control the PC through group policy and other mechanisms. This feature allows a middle ground between all or nothing access, allowing a user to work on the device of their choice and still have access to corporate resources. With Workplace Join, IT administrators now have the ability to offer finer-grained control to corporate resources. If a user registers their device, IT can grant some access while still enforcing some governance parameters on the device to ensure the security of corporate assets.
  • Work Folders – Work Folders allows a user to sync data to their device from their user folder located in the corporation’s data center. Files created locally will sync back to the file server in the corporate environment. This syncing is natively integrated into the file system. Note, this all happens outside the firewall client sync support. Previously, Windows 8 devices needed to be domain joined (or required domain credentials) for access to file shares. Syncing could be done with 3rd party folder replication apps. With Work Folders, Users can keep local copies of their work files on their devices, with automatic synchronization to your data center, and for access from other devices. IT can enforce Dynamic Access Control policies on the Work Folder Sync Share (including automated Rights Management) and require Workplace Join to be in place.
  • Open MDM- While many organizations have investments with System Center and will continue to leverage these investments we also know that many organizations want to manage certain classes of devices, like tablets and BYOD devices, as mobile devices. With Windows 8.1, you can use an OMA-DM API agent to allow management of Windows 8.1 devices with mobile device management products, like Mobile Iron or Air Watch .
  • NFC tap-to-pair printing – Tap your Windows 8.1 device against an NFC-enabled printer and you’re all set to print without hunting on your network for the correct printer. You also don’t need to buy new printers to take advantage of this; you can simply put an NFC tag on your existing printers to enable this functionality.
  • Wi-Fi Direct printing – Connect to Wi-Fi Direct printers without adding additional drivers or software on your Windows 8.1 device, forming a peer-to-peer network between your device and any Wi-Fi enabled printer.
  • Native Miracast wireless display – Present your work wirelessly with no connection cords or dongles needed; just pair with project to a Miracast-enabled projector through Bluetooth or NFC and Miracast will use Wi-Fi to let you project wire-free.
  •  Mobile Device Management – When a user enrolls their device, they are joining the device to the Windows Intune management service. They get access to the Company Portal which provides a consistent experience for access to their applications, data and to manage their own devices. This allows a deeper management experience with existing tools like Windows Intune. IT administrators now have more comprehensive policy management for Windows RT devices, and can manage Windows 8.1 PCs as mobile devices without having to deploy a full management client.
  • Web Application Proxy – The Web Application Proxy is a new role service in the Windows Server Remote Access role. It provides the ability to publish access to corporate resources, and enforce multi-factor authentication as well as apply conditional access policies to verify both the user’s identity and the device they are using…

Continue reading here!

//Richard

Enable Enterprise #Mobility and Secure Android, iOS and Windows Devices – #BYOD

This is a good blog post from Christopher Campbell that also has links to Citrix BYOD Solutions and Citrix BYOD Starter Kit

Lots of devices with many different operating systems. Lots of users bringing Android, iOS and Windows mobile devices into the workplace. Securing all these devices and the apps and data they’re accessing can make enabling Enterprise Mobility an intimidating task. Is it going to be BYOD, COPE, MDM, MAM, MIM or a combination? One size doesn’t fit all and addressing these challenges can be painful if you’re deploying a multiple vendor solution stack.

Some of the top mobile threats now include but are not limited to:

  1. Data loss from lost and stolen devices
  2. Information stealing mobile malware
  3. Vulnerabilities from device, OS and 3rd party apps
  4. Insecure Wi-Fi, network access and rogue access points
  5. Insufficient management tools and capabilities

Join Citrix Chief Security Strategist Kurt Roemer to find out how IT can maintain control and protect business information accessed from Android, iOS and Windows tablets and smartphones.

Watch Now and you will learn:

  • Security considerations and risk mitigation options when supporting BYOD
  • The architecture required to support tablets and smartphones accessing sensitive business information
  • How Citrix BYOD solutions enable secure access to enterprise desktops, apps and files from any device
  • Best practices for IT to maintain control over Android, Apple iOS and Windows tablets and smartphones used in the workplace

WATCH ON-DEMAND TODAY and learn how to make a complete end-to-end, fully integrated Enterprise Mobility solution work for the business, user and IT…

Continue reading here

//Richard

Report: Android malware doubled in 2012, infecting 33M devices

Malware attacks on devices running Google’s (NASDAQ:GOOG) open-source Android mobile operating system more than doubled in 2012, security solutions firm NQ Mobile reports.

NQ Mobile - Malware by Year
NQ Mobile saw a year-over-year increase of malware of 163 percent.

NQ Mobile discovered 65,227 new pieces of mobile malware in 2012 compared to 24,794 in 2011, a year-over-year increase of 163 percent. Among all new malware discovered last year, 94.8 percent of threats were designed to attack Android, compared to just 4 percent targeting rival open-source platform Symbian. In all, more than 32.8 million Android devices were infected in 2012, up from 10.8 million in 2011, representing an increase of more than 200 percent.

Chinese devices accounted for 25.5 percent of infected Android devices, followed by India (19.4 percent), Russia (17.9 percent), the United States (9.8 percent) and Saudi Arabia (9.6 percent). Fifty-three percent of U.S. Android owners have installed a mobile security app on their device, NQ Mobile adds.

Sixty-five percent of mobile malware discovered in 2012 falls into the category of Potentially Unwanted Programs–e.g., root exploits, spyware, pervasive adware and Trojans (surveillance hacks). Twenty-eight percent was designed to collect and profit from a user’s personal data, and 7 percent was built to prevent the user’s device from functioning properly.

The primary methods for delivering malware in 2012 included App Repackaging (adding lines of malicious code into a legitimate app and reloading it onto a third-party marketplace), Smishing (asking consumers to click on a fraudulent link, triggering a malicious app download or directing their browser to a rogue website) and Malicious URLs (redirecting the browser from genuine websites to clone sites intended to collect personal data).

Critics maintain Google has failed to sufficiently police its Google Play digital storefront, making it easy for attackers to distribute malware via Android applications. Google has made strides to reduce Android threats, however: In early 2012, it unveiled Bouncer, which scans Google Play for malicious apps, and its Android 4.2 OS update, a.k.a. Jelly Bean, bakes in application verification tools.

The NQ Mobile report…

Continue reading here!

//Richard

XenMobile product overview… and It’s nice! via @BasvanKaam – #BYOD, #MDM, #Citrix

March 14, 2013 2 comments

Wow! I must say that Bas van Kaam has done a great wrap-up here! I highly recommend you to read this blog post!!! 🙂

It was only about a month ago when I was writing my Blog about the CloudGateway that I wondered which route  Citrix would take now that they acquired Zenprise, well… here it is… XenMobile, another Xen sibling sees the light! Lets jump right in…

I had the opportunity to make use of one of Citrix’s demo environments to have a closer look at MDM, which is an awesome way to explore new and existing products by the way, if your company is a Citrix partner and has access I definitely recommend having a look. Besides that I used the Citrix E-Docs website as well as Citrix.com to find as much information as possible.

The main focus of this article will be on XenMobile MDM as the Mobile Solutions Bundle (one of the two editions available) focuses primarily on the CloudGateway which I already discussed in one of my previous blogs.

MDM?

MDM stand for Mobile Device Management and it’s just that! Here’s what Citrix has to say about it: As per Citrix: XenMobile MDM is a robust mobile device management solution that delivers role-based management, configuration, and security for both corporate and employee-owned devices. Upon user device enrollment, IT can provision policies and apps to devices automatically, blacklist or whitelist apps, detect and protect against jailbroken or rooted devices, and selectively wipe a device that is lost, stolen, or out of compliance. Users can use any device they choose, while IT can ensure compliance of corporate assets and secure corporate content on the device.

Editions

There are two editions: XenMobile MDM and the Mobile Solutions Bundle. XenMobile MDM primarily focuses on (hardware) device management, more on it’s extensive feature set shortly. Every major platform is supported including: iPhone, iPad, Android, BlackBerry, Symbian and Microsoft Windows 8. It includes the XenMobile Secure Mobile Gateway (SMG) and XenMobile SharePoint Data Leak Prevention (DLP) as well as the XenMobile Mobile Service Provider (ZSM) and the XenMobile Remote Support Application Toolset.

Read more…

Surprising Stats About Mobile Security

February 28, 2013 Leave a comment

Another good article!!

Surprising Stats About Mobile Security

IT security and data protection are the top ranked challenges faced by many mobile IT asset managers. This was certainly brought to light in Mobile Enterprise’s IT headaches executive survey, and recent research from the International Association of IT Asset Managers (IAITAM) brings this to light as well.

When IAITAM asked: how do organizations handle mobility and security? Fifty five percent of respondents access the enterprise from a remote location during off hours and the same number can access enterprise information from any BYOD device. Yet only 60% of organizations track how, how long or who is accessing remotely.
Out of those employees who do access the enterprise remotely, slightly more than half use a secure key or digital pass, while 49% use a login name and password on a secure site. A little more than half (53%) of organizations surveyed have an intrusion protection system for deployed mobile units.

Lost/Stolen Devices Covered
Nearly 90% of respondents have a mobile device policy and process in place for lost, misplaced or stolen mobile devices. At the same time, little more than a quarter have real-time location system tracking on any/all mobile devices. Still, 56% say they are able to perform a remote wipe of all data.
Less than half (43%) will automatically replace a lost, misplaced or stolen device within a 24 to 48 hour period. Eighty-four percent of companies have a firm policy that employees leaving the company must surrender their mobile device(s).
Tracking software downloaded on devices and preventing software downloads came in third and fourth as the most challenging issues, respectively, but with the predicted growth of mobile malware, this number could change going forward.

Asset Tracking?
Nearly 60% believe that they are managing mobile security adequately, but nearly 75% surveyed felt that licensing and management of mobile device assets is a challenge; 52% track their assets using an automated tool, while 36% still use spreadsheets. Another 12% are not tracking mobile assets at all. Members of the Mobile Enterprise Editorial Advisory recently had few things to say about this topic.
The main software programs accessed through a mobile handheld device or smartphone are Microsoft (85%), Google (52%) and Adobe (26%). Many of these same software publishers aggressively protect their intellectual property through software audits.

BYOD
Fifty-one percent of organizations surveyed had a BYOD or BYOT [technology] program that allows employees to use their personal mobile devices for work purposes. Surprisingly, 60% who took advantage of a BYOD program only accounted for 25% or less of employees who brought in their personal devices. 
 
More than three-quarters (77%) allow their employees…
Continue reading here!
//Richard

Do you really need a #BYOD policy? – via @GeneMarks

February 27, 2013 Leave a comment

This is a really good article by Gene Marks!

Social media.  Cloud computing.  Gamification.  SaaS.  Social CRM. Virtualization.  Mobile.  Every year we hear of the latest technology issues facing small business owners like me.   And now it’s BYOD (Bring Your Own Device).  Everywhere I read in the tech world it’s BYOD.  That’s because with the proliferation of smartphones, tablets and mini-laptops it’s become the hot tech security issue.  Whitepapers are written.  Seminars are conducted. Roundtables are moderated.  It’s a BYOD year.

I have 10 people in my company.  And a half dozen other contractors.  These people are using smartphones, tablets and laptops to access our data.  We do not have a BYOD policy.  Do I really need one?  Do all businesses, big or small, need to really worry about this?  Or is just another scare tactic from a bunch of IT guys looking to put fear into their clients’ minds and generate additional billable hours.

Hmmm.

The fact that everyone in my company has a different smartphone is of no concern to me.  Why should I care if Sam prefers his iPhone but Josh likes his Droid?  They are using their phones to call clients on Verizon or AT&T or whatever so I’m not exposed to any risk there.  The same with texting.  But uh oh…then there’s email.  Am I exposed to security issues when they send and retrieve email from our server?  No.  That’s because we have a hosted mail server and each employee has their own login to their email account.  They set up their email on their own with instructions we gave them.  Viruses, spam and all the other evil things that could happen via email are (hopefully) controlled by the security software running at the server level.

Read more…

Magic Quadrant for Endpoint Protection Platforms – #Gartner, #EPP via @rspruijt

January 14, 2013 1 comment

Magic Quadrant for Endpoint Protection Platforms

 
2 January 2013 ID:G00239869
Analyst(s): Peter Firstbrook, John Girard, Neil MacDonald

VIEW SUMMARY

The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.

Market Definition/Description

The enterprise endpoint protection platform (EPP) market is a composite market primarily made up of collections of products. These include:

  • Anti-malware
  • Anti-spyware
  • Personal firewalls
  • Host-based intrusion prevention
  • Port and device control
  • Full-disk and file encryption, also known as mobile data protection
  • Endpoint data loss prevention (DLP)
  • Vulnerability assessment
  • Application control (see Note 1)
  • Mobile device management (MDM)

These products and features are typically centrally managed and ideally integrated by shared policies.

DLP, MDM and vulnerability assessment are also evaluated in their own Magic Quadrant or MarketScope analyses. Longer term, portions of these markets will get subsumed by the EPP market, as the personal firewall, host intrusion prevention, device control and anti-spyware markets have in the past. EPP suites are a logical place for convergence of these functions. Indeed, 53% of organizations in a recent Gartner survey1 already use a single vendor for several of these functions, or are actively consolidating products. In particular, mobile data protection is the leading complement to EPP and purchasing decisions regarding the two products are increasingly made together. For most organizations, selecting a mobile data protection system from their incumbent EPP vendors will meet their requirements.

In 2012, the large enterprise EPP market is still dominated by Symantec, McAfee and Trend Micro, which together represent approximately 68% of the total revenue of Magic Quadrant participants. Sophos and Kaspersky Lab are the two other global leaders that are competitive across multiple functions and geographies, and push the combined Leaders quadrant market share to 85%. Despite the introduction of new players, the displacement of incumbents is still a significant challenge in the large enterprise market. The biggest impact of the Magic Quadrant Challengers and Visionaries is to push the dominant market players to invest in new features and functionality (sometimes via acquisitions) to stay ahead, and to keep pricing rational. In the less demanding small and midsize market, competition is more intense. A number of Niche Player solutions are dominant in specific regions.

The total EPP revenue of the Magic Quadrant participants at year-end 2011 was roughly $2.8 billion, up 4% from 2010. We attribute this growth primarily to increased buying of more-expensive suites, offset by lower prices for low-end malware-only solutions. Consequently, EPP revenue growth is more a result of an inflow of revenue from other markets. We anticipate that growth will continue to be in the low single digits in 2013.

Microsoft is the best vendor in a position to challenge the incumbent Leaders, primarily due to attractive pricing in its enterprise agreements. Approximately one-third of enterprise buyers1 indicate they are actively considering Microsoft or plan to do so during their next renewal periods. However, Microsoft’s slow development, the lack of a single unified security management interface and mediocre test results will temper its adoption. Longer term, we believe that increased displacement of Windows endpoints with application-controlled OSs (such as Microsoft WinRT and Apple’s iOS and OS X Mountain Lion) is the biggest market threat. These solutions shift the value proposition of EPP solutions from traditional anti-malware to MDM and data protection capabilities.

Magic Quadrant

Figure 1. Magic Quadrant for Endpoint Protection Platforms
Figure 1.Magic Quadrant for Endpoint Protection Platforms

 
 

Source: Gartner (January 2013)

Vendor Strengths and Cautions

Arkoon Network Security

Arkoon Network Security’s StormShield EPP solution (formerly offered by SkyRecon Systems) is designed as a seamless integrated EPP with a focus on behavioral protection. Arkoon’s Ability to Execute score is hampered by its relatively small market share and limited geographic presence, as well as its still-maturing management capabilities….

Continue reading here!

//Richard

%d bloggers like this: