Enterprise Mobility Management (With Unified Endpoint Management)

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Unified Logs and Reporting for Hybrid Centralized Management
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Desktop Central In IT Administrators’ Perspective.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Business Needs and IT Challenges How can IT maintain user productivity and protect against evolving threats How can IT reduce complexity and scale.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Dell Connected Security Solutions Simplify & unify.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Gary Gruba Systems Engineer Absolute Manage MDM Managing iPhones, iPads, iPod Touches and Android Dougald MacNaughton Account Executive.
Secure Lync mobile Authentication V5V5.
Secure Skype for Business
User and Device Management
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Sophos Mobile Control Joanna Wziątek-Ładosz Sales Engineer, Sophos.
MaaS360 MDM for iOS, Android & Windows Phone 7
Sophos Central for partners and customers: overview and new features
Mobile Devices in the Corporate World
Phase 4: Manage Deployment
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
Hybrid Cloud Web Filtering Platform
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Mobile Data Solutions Inc
Cloud-First, Modern Windows Management and Security
Firefish Software for Professional Recruiters Stays Available Around the Clock from Any Device and Anywhere by Using the Microsoft Azure Platform Partner.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Threat Management Gateway
Hosted on Azure, LoginRadius’ Customer Identity
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Call AVG Antivirus Support | Fix Your PC
Download Cisco Exam Dumps - Valid Cisco Question Answers - Dumpsprofessor.com
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Replace with Application Image
Mobile Device Management
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
PowerHub on Microsoft Azure Enables Renewable Energy Professionals to Track and Manage Projects from a Centralized Platform Accessible Anywhere MICROSOFT.
Data Security for Microsoft Azure
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Identity & Access Management
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Abiquo’s Hybrid Cloud Management Solution Helps Enterprises Maximise the Full Potential of the Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: ABIQUO.
Implementing Client Security on Windows 2000 and Windows XP Level 150
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
(With Hybrid Network Support)
LM 5. Wireless Network Security
IT Management, Simplified
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Enterprise Mobility Management (With Unified Endpoint Management) Version - 2

Certifications and Compliances Who are We ? MicroWorld develops Information Security solutions that provide protection against current and evolving cyber threats. Our product portfolio includes eScan and MailScan that encompass Anti-Virus, Anti-Spyware, Content Security, Anti-Spam, and Network Intrusion Prevention solutions. Incorporated in the USA with offices worldwide, we are represented by our more than 50,000 partners in more than 190 countries across the globe. Certifications and Compliances ISO 9001 ISO 14001 ISO 27001

Salient Features Presence in over 190 Countries through more than 50,000 Channel Partners. Trusted by over 10 million users and more than 5000 Corporates. Available in more than 20 Languages. 24 / 7 Support through Call, Email and Chat. Over 20 years of experience in handling complicated security outbreaks all over the World. In-house Research team for Prompt response to a Virus Outbreak, 24/7 anywhere in the World.

Registered Offices

Product Segment- Corporate

eScan Enterprise 360 - A Broad Overview Endpoint Protection (EPP) Enterprise Mobility Management (EMM) MTD/ MTDR (Mobile Threat Defense / Malware Threat Defense & Remediation) Data Leak Prevention (DLP) Security Information and Event Management (SIEM) Audit & Compliance User/ Device Entity Behavioral Analysis (UEBA) Information Centric Protection & Audit (ICPA) Employee Productivity & Monitoring Tools Analytics Unified Endpoint Management Console (HTTP/HTTPS with HTML5 compatibility)

eScan EMM - A Broad Overview eScan Enterprise Mobility Management MAM (Mobile Application Management) MTD (Mobile Threat Defense ) MCM (Mobile Content Management) MDM (Mobile Device Management ) MI (Mobile Identity ) MPM (Mobile Productivity Management ) MASM (Mobile Asset Management )

Mobile threat Defense - Functionality Device/User Entity Behavioral Analysis Vulnerability Assessment Capture Events on SIM Change Notification on registered email ID Change Capture Events for Configuration Changes Notification on Connecting to open SSIDs Network Security Reject unknown SSID connections Capture Event on Execution of APK downloaded from unknown sources Capture Event on Hotspot Enable Capture Event on Flight Mode enable / Disable Capture Event / Notify on Change in SSID Capture Event on Uninstall of Critical Apps Block Jail broken or Rooted Device

MAM – Mobile Application Management

MCM - Content Deployment through Content Library

MI - Mobile Identity Following details are registered and captured once the device is enrolled - User’s Name IMEI Number Mobile Number MAC Number Email ID Phone Model

MPM – Mobile Productivity Management Application Control Website Control Call and SMS Filter Incoming Call Filter Outgoing Call Blocking

MASM - Mobile Asset Management

eScan EMM – Granular functionality

SMS based Action Triggers eScan EMM - Key Differentiator SMS based Action Triggers Start scan via SMS Schedule Scan via SMS Enable Disable Module via SMS Local Data Backup via SMS (Calendar Entries, SMS, Contacts) SMS commands - Wipe, Scream, Locate , Lock device

eScan Mobile Security( for Enterprise) – Policy Enforcement BYOD

eScan Mobile Security (for Enterprise) – Policy Enforcement COD

Provisioning - Enrolment – Single / Multiple Devices

AD/LDAP Sync for volume Enrollment

Device Enrolment – Key Highlights Enrolment of multiple devices by importing CSV file facilitates easy client deployment. Faster on device enrolment through QR code. Device/ group based security policy deployment. Centralized Software / Hardware Asset Management for managed devices. Sample QR Code

Auditing, Tracking and Reporting

Enrolled Device Information - Management Console Additional Details Captured * Device Sync time is 60 Minutes by default

Advanced Dashboard for Device Security and Status

Advanced Dashboard for Device Security and Status

Mobile Device Asset Management- Reports & Filters Hardware Inventory

Mobile Device Asset Management- Reports & Filters Software Inventory

Report Templates and Scheduling

SIEM through eScan MDM VIRUS SEVERITY ERROR SEVERITY UPDATE SEVERITY INFO SEVERITY

SIEM through eScan MDM – Application Control

Web and Application Control - Productivity

Enterprise Data Protection

Command Execution through Web and SMS Device Nuke Command Execution through Web and SMS

Mail Notification for Lock Watch and SIM Watch

Mobile Device Lifecycle Management

Device Tracking Real time Device Tracking using WebRTC (Upcoming)

Device Locate with History - Report

Geo Fencing

Network Access Control for Managed Devices

Device Compliance

eScan EMM - Key Features Architecture Mobile Security Multi OS Support Secure Content Blocker Highly Scalable Compromised Device Detection Role Based Administration (Upcoming) Device Compliance Rule Notify and Block rooted or Jail broken Devices Enterprise Integration Configuration and Profiles Directory Services –AD/LDAP Integration Work Profile Manage Devices (Upcoming) Smart Card, Token, SAML Authentication (Upcoming) COSU, Zero Touch Provisioning VPN Config Deploy ( IPSec, Juniper SSL -Upcoming) Syslog support for Event Management Wi-Fi Auth-Enforcement/Deploy (WEP, WPA, TTLS, EAP, PEAP - Upcoming) Splunk Forwarder Apple DEP/VPP & Google Enterprise Partner (In Process) G Suite Management (Upcoming)

eScan EMM - Key Features Self Service Flexible Service Delivery Registration and Activation Professional Services Device Locator 24/7/365 Global Support Passcode, Lock and Wipe Compliance Audit Applications Mobile Intelligence App Inventory and distribution Alert Via Console, Email or SMS White lists and black lists Reports with automated distribution App Scanning(for Privacy Permissions) Knowledge Management System App installation protection Feature (Cancel button disabled) with reports on successful / failure of installation. Real-time Tracking of Device (Upcoming)

Technical Support Complying with SLA is our Highest Priority. eScan Provides support to its users through dedicated support teams for every time zone.