RFI Template for Enterprise Mobile Device Management

Total Page:16

File Type:pdf, Size:1020Kb

RFI Template for Enterprise Mobile Device Management RFI Template for Enterprise Mobile Device Management MDM SOLUTION – RFI TEMPLATE About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile devices are similar to other endpoints in the enterprise and require similar security as corporate issued desktops and laptops. Many businesses are also subject to regulatory requirements and compliance standards that drive the need for specific mobile security capabilities. Enterprise mobility is fast-changing with a crowded field of products and solutions from several vendors. Businesses have to choose carefully to pick the correct solution that will not only address their needs today but also those of the future. Not all MDM solutions are created equal. There are several products that only offer basic asset management capabilities for mobile devices. Some others support only a limited range of features on some platforms. Very few solutions offer a full complement of capabilities that address enterprise mobile security, availability, and manageability requirements that go beyond device management to address content security and “business-ready” apps. This document provides guidelines on key requirements that should be addressed by an MDM solution. The requirements for MDM solutions are grouped into the following categories: 1. Core MDM capabilities 2. Simplicity of MDM solution for administrators and end-users 3. End-to-end security and compliance 4. Enterprise-grade architecture 5. Best-in-class support, services and training © 2012 Zenprise, Inc. 2 MDM SOLUTION – RFI TEMPLATE 1 Core MDM Capabilities 1.1 Delivery Model: 1.1.1 Solution should provide deployment options that fit the business model and budget, with cloud and on-premises options, as well as a hybrid option with a mix of cloud solution and back-end integrations with LDAP, PKI, and application servers, as well as subscription options. 1.1.2 Are the identical set of features available both in the on-premise version as the cloud version 1.1.3 What are the SLAs for the cloud delivery model? 1.1.4 Does the cloud or hosted solution use shared database instances for customer data or dedicat- ed database instances? Have customers experienced data-corruption issues? 1.1.5 What is longest outage that customers have experienced with the cloud solution? What was it due to? 1.2 Integration with Systems and Services: Solution must offer out-of-the-box integration with enterprise infrastructure. 1.2.1 How does the solution integrate with Active Directory / LDAP? 1.2.2 How does integration with Microsoft® Exchange Server / ActiveSync work for securing access to corporate email/calendar? How are non-compliant devices blocked from accessing email/calendar? 1.2.3 Explain how the solution provides additional functionality over and above what is available with Microsoft Exchange™ ActiveSync (EAS) – Direct OS-MDM API integration instead of relying only on ActiveSync policies. 1.2.4 Can the solution integrate with PKI / certificate systems for access to common service and for two-factor authentication and single sign-on? 1.2.5 Can the solution integrate with security information and event management (SIEM) systems like ArcSight, Splunk, or Envision for advanced correlation, reporting, and incident forensic analysis? 1.3 Provisioning: 1.3.1 Explain the provisioning process for devices on different platforms – iOS™, Android™, Symbi- an™, and WindowsMobile™. Is the enrollment process similar or are there platform specific variations? 1.3.2 Explain how the solution provides a secure registration process in which users and devices © 2012 Zenprise, Inc. 3 MDM SOLUTION – RFI TEMPLATE cannot partially register (e.g., register with the Microsoft Exchange server but not with the MDM). 1.3.3 Explain how the solution performs a compliance check pre-enrollment, to ensure that jail- broken, rooted, or non-compliant devices can be enrolled into the system. 1.4 Presence Awareness: 1.4.1 Explain how the solution provides device status, tracking, and monitoring. Does it provide a full software inventory and a range of device statistics? 1.5 Platform Support: 1.5.1 Provide a matrix of platforms and operating systems your service supports. At a minimum the solutions should support all of the major mobile OSes – iOS, Android (including non-C2DM like Amazon Kindle Fire), Windows, Symbian, and Blackberry™. 1.5.2 Does the solution support advanced integration with Samsung SAFE approved devices to pro- vide advanced management and control for these device? 1.5.3 What is your turn around time to support new devices after they are launched? 1.5.4 Explain how the solution manages devices remotely per platform and operating system. What remote service and troubleshooting capabilities does it provide? Does it enable device service functions such as chat and remote control? 1.6 Inventory Management: 1.6.1 Explain how the solution captures and stores information about the user, device, user location, compliance, quantity, groups, device type, OS type, etc. 1.6.2 Explain how the solution manages and enforces the number of devices and types of devices per user. 1.6.3 Does the solution support the Apple® VPP program to enable automated provisioning of volume licenses purchased from the Apple enterprise store? 1.7 Security and Compliance Management: The MDM solution must have the capability to detect, block/allow, and report on devices that are not compliant with security requirements and policies. It must also enable IT to specify certain device compliance checks prior to enrollment. 1.7.1 How does the solution identify, report, and handle violations from compliance criteria? 1.7.2 Which of the following device compliance checks are available in the system? • Jail-breaking © 2012 Zenprise, Inc. 4 MDM SOLUTION – RFI TEMPLATE • Rooting • Encryption • Managed vs. unmanaged • Policy compliance • Revoked • Application blocking • Software version • Firmware version 1.7.3 How does selective wiping and full wiping work? Under what conditions can they be triggered? 1.7.4 What kind of information logging and auditing capability is available for compliance audits? 1.7.5 Do you support application deployment to managed devices? 1.7.6 Do you support selective wiping of Active Sync information? 1.7.7 How do you secure applications and over the air data exchanged with applications? 1.8 Handling of Corporate Liable versus Individually Liable Devices: 1.8.1 How does the solution handle the BYOD (bring your own device)? How are new devices sup- ported? Is the system capable of supporting Amazon Kindle Fire devices? 1.8.2 How does the solution identify corporate liable vs. individually liable devices? Does it enable users to self-identify device ownership, or does it keep that in the hands of IT or security pro- fessionals? 1.8.3 Does the solution provide a secure container for secure distribution of corporate documents that can be time-expired? 1.9 Reporting: 1.9.1 Provide a list of common reports that are available from the system. 1.9.2 Can the system provide reports by the following parameters? • By Device Count • By Device Type • By User Name and User Count • By Carriers © 2012 Zenprise, Inc. 5 MDM SOLUTION – RFI TEMPLATE • By OSes • By Inventory • By Status • By Location/Region 2 Simplicity for administrators and end-users IT administrators and security personnel are constantly under pressure to serve their internal customers efficiently. Every new task or activity adds incremental burden that causes costly additions of temporary personnel, resources, training needs or service-level challenges. Explain how the MDM solution addresses the following user experience criteria. 2.1 Deployment: MDM solutions should ease the IT administrator’s burden by making it simple to deploy policies and match them to user groups and devices. 2.1.1 Does the solution offer a console with a dashboard based view of the MDM deployment? Is the dashboard customizable by administrators? 2.1.2 Can an administrator initiate bulk actions on sets of devices directly from the dashboard view? 2.1.3 Does the console display system alerts like jail-broken or rooted devices, blocked devices, or inactive devices? 2.1.4 Can the administrator initiate enrollment notifications to unmanaged devices from the dash- board view? 2.1.5 Explain the information architecture that is used store users, groups, policies and configura- tions. Can users be associated with multiple groups (e.g., can a user be part of “West Coast”, “Management” and “Sales”, or is it a one-to-one mapping)? 2.1.6 How many steps are required to deploy a new policy? 2.1.7 How does the solution present the set of policy choices available by platform? How does it pre- vent selecting the wrong policy for a device type (e.g., Associating an Android policy to iOS)? 2.1.8 Can you change the policy once and have the change reflected everywhere the policy is de- ployed, or do you have to change it everywhere it’s deployed? As an example, can a passcode policy be changed once and applied across multiple groups or entities? 2.2 Active Directory/LDAP integration: Having up-to-date information in the MDM system is important for security. The system should allow the © 2012 Zenprise, Inc. 6 MDM SOLUTION – RFI TEMPLATE setting of policies and rules and the inheritance of policies across groups and users. 2.2.1 Does the solution automatically handle the addition or removal of groups and users based Ac- tive Directory/LDAP changes? 2.2.2 Are changes seamlessly propagated to all intended user groups
Recommended publications
  • Citrix Netscaler - NITRO REST - Getting Started Guide
    Citrix NetScaler - NITRO REST - Getting Started Guide Citrix® NetScaler® 10.5 Copyright and Trademark Notice Copyright © 2014 Citrix Systems, Inc. All rights reserved. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS OR USED TO MAKE DERIVATIVE WORK (SUCH AS TRANSLATION, TRANSFORMATION, OR ADAPTATION) WITHOUT THE EXPRESS WRITTEN PERMISSION OF CITRIX SYSTEMS, INC. ALTHOUGH THE MATERIAL PRESENTED IN THIS DOCUMENT IS BELIEVED TO BE ACCURATE, IT IS PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE ALL RESPONSIBILITY FOR THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS MANUAL. CITRIX SYSTEMS, INC. OR ITS SUPPLIERS DO NOT ASSUME ANY LIABILITY THAT MAY OCCUR DUE TO THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS DOCUMENT. In no event shall Citrix, its agents, officers, employees, licensees or affiliates be liable for any damages whatsoever (including, without limitation, damages for loss of profits, business information, loss of information) arising out of the information or statements contained in the publication, even if Citrix has been advised of the possibility of such loss or damages. INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. COMPANIES, NAMES, AND DATA USED IN EXAMPLES ARE FICTITIOUS UNLESS OTHERWISE NOTED. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
    [Show full text]
  • Automatic Trust Based Segregation for Mobile Devices
    The Interdisciplinary Center, Herzlia Efi Arazi School of Computer Science Automatic trust based segregation for mobile devices M.Sc. Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science (M.Sc.) Research Track in Computer Science Submitted by Oren Poleg Under the supervision of Dr. David Movshovitz (IDC) June, 2015 Acknowledgments I would like to express my deepest appreciation to Dr. David Movshovitz. Without his guidance and persistent help this dissertation would not have been possible. His thorough knowledge of information security was a valuable asset for this work. Dr. Movshovitz invested a substantial amount of time, beyond the regular office hours, so I could fulfill my commitments and for this I want to extend my sincere gratitude. I would also like to thank Prof. Anat Bremler-Bar for her encouragement and assistance. I feel privileged to have worked together with Dr. Movshovitz and Prof. Bremler-Bar. Working with such professionals was an inspirational experience for me. Last but not least, my dear wife Einat who provided me with the time and space to write this paper. ii Abstract Mobile devices have become an essential part of our lives. These devices hold much of our personal information such as contact lists, calendar appointments and private messages. Writers of applications for mobile devices are trying to get hold of personal information. Application such as WhatsApp and Viber needs this information for justified causes, as their business is built on sending messages to people in the contact list. Other applications may use personal information for targeted advertisement, and sometimes for malicious purposes.
    [Show full text]
  • Clearpass 6.X Tech Note: Clearpass Enterprise Mobility Management Integration November 2015 V5
    ClearPass 6.x Tech Note: ClearPass Enterprise Mobility Management Integration November 2015 V5 Version Date Modified By Comments 1.0 April 2013 Danny Jump Initial Published Version 2.0 Oct 2013 Danny Jump Add XenMobile support and minor Updates 3.0 Oct 2014 Danny Jump Added SAP Afaria, a new section on SCEP Enrollment for MobileIron/Airwatch and ‘other’ minor updates 4.0 Sept 2015 Danny Jump Added details of BlackBerry BES10 server integration and minor updates for CPPM 6.5 5.0 Nov 2015 Danny Jump Added integration with Globo “Go! Enterprise MDM” ClearPass 6.x Tech Note: ClearPass and EMM Integration Guide November 2015 - V5 Table of Contents Table of Contents ............................................................................................................................................ 2 Table of Figures ............................................................................................................................................... 3 Introduction ........................................................................................................................................... 6 EMM Integration ................................................................................................................................... 7 Configuration of EMM Vendors ................................................................................................................ 10 Normalized Dataset .....................................................................................................................................
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • USCIS - H-1B Approved Petitioners Fis…
    5/4/2010 USCIS - H-1B Approved Petitioners Fis… H-1B Approved Petitioners Fiscal Year 2009 The file below is a list of petitioners who received an approval in fiscal year 2009 (October 1, 2008 through September 30, 2009) of Form I-129, Petition for a Nonimmigrant Worker, requesting initial H- 1B status for the beneficiary, regardless of when the petition was filed with USCIS. Please note that approximately 3,000 initial H- 1B petitions are not accounted for on this list due to missing petitioner tax ID numbers. Related Files H-1B Approved Petitioners FY 2009 (1KB CSV) Last updated:01/22/2010 AILA InfoNet Doc. No. 10042060. (Posted 04/20/10) uscis.gov/…/menuitem.5af9bb95919f3… 1/1 5/4/2010 http://www.uscis.gov/USCIS/Resource… NUMBER OF H-1B PETITIONS APPROVED BY USCIS IN FY 2009 FOR INITIAL BENEFICIARIES, EMPLOYER,INITIAL BENEFICIARIES WIPRO LIMITED,"1,964" MICROSOFT CORP,"1,318" INTEL CORP,723 IBM INDIA PRIVATE LIMITED,695 PATNI AMERICAS INC,609 LARSEN & TOUBRO INFOTECH LIMITED,602 ERNST & YOUNG LLP,481 INFOSYS TECHNOLOGIES LIMITED,440 UST GLOBAL INC,344 DELOITTE CONSULTING LLP,328 QUALCOMM INCORPORATED,320 CISCO SYSTEMS INC,308 ACCENTURE TECHNOLOGY SOLUTIONS,287 KPMG LLP,287 ORACLE USA INC,272 POLARIS SOFTWARE LAB INDIA LTD,254 RITE AID CORPORATION,240 GOLDMAN SACHS & CO,236 DELOITTE & TOUCHE LLP,235 COGNIZANT TECH SOLUTIONS US CORP,233 MPHASIS CORPORATION,229 SATYAM COMPUTER SERVICES LIMITED,219 BLOOMBERG,217 MOTOROLA INC,213 GOOGLE INC,211 BALTIMORE CITY PUBLIC SCH SYSTEM,187 UNIVERSITY OF MARYLAND,185 UNIV OF MICHIGAN,183 YAHOO INC,183
    [Show full text]
  • Magic Quadrant for Mobile Device Management Software
    Magic Quadrant for Mobile Device Management Software http://www.gartner.com/technology/media-products/reprints/mobileiron/article1/article1.html 13 April 2011 Phillip Redman, John Girard, Leif-Olof Wallin Gartner Research Note G00211101 As smartphones proliferate in the enterprise, companies are struggling to manage policy, security and support. Enterprise mobile device management software is evolving to offer smartphone (and other device) support across a variety of platforms. What You Need to Know Note 1 The MDM Market A number of vendors assessed for this Magic This document was revised on 18 April 2011. For more information, see the Corrections page. Quadrant were not included, because they did not meet our criteria; however, many of them offer some type of MDM software or services. Although some of the vendors and products have been around for a long time, mobile device Examples include: management (MDM) is a nascent market, and the vendors' offerings have little consistency. Many come from mobile messaging and security to support MDM, and, worldwide, there are more than 60 companies Absolute Software in this space. Of these, 42 were deemed potential candidates for this Magic Quadrant (see Figure 1) and AetherPal were sent questionnaires; 23 met Gartner's inclusion criteria. Avoceen Return to Top CA Technologies Cloud Systems CommSolv Magic Quadrant CommonTime HP 1 of 29 6/8/2011 10:19 AM Magic Quadrant for Mobile Device Management Software http://www.gartner.com/technology/media-products/reprints/mobileiron/article1/article1.html IBM Figure 1. Magic Quadrant for Mobile Device Management Software Innopath iPASS Jamf Juniper LANDesk LRW mFormation Mobiquant Notify Novell Perlego Proximity SynchPoint Trellia Wavelink Zelog Note 2 Supporting Apple iOS Devices Questions about support for Apple iOS devices continues to grow.
    [Show full text]
  • Android Forensics: Automated Data Collection and Reporting from a Mobile Device
    Rochester Institute of Technology RIT Scholar Works Theses 1-31-2013 Android forensics: Automated data collection and reporting from a mobile device Justin Grover Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Grover, Justin, "Android forensics: Automated data collection and reporting from a mobile device" (2013). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Android Forensics: Automated Data Collection and Reporting from a Mobile Device by Justin Grover Committee Members Bill Stackpole (chair) Dr. Tae Oh Dr. Yin Pan Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computing Security and Information Assurance Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences 01/31/2013 M P 1 3 0 0 3 8 MITRE PRODUCT Android Forensics: Automated Data Collection and Reporting from a Mobile Device MITRE Sponsored Research Project: Android System Integrity Measurement Project No.: 51MSR606-TA The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designated by other documentation. Approved for Public Release; Distribution Unlimited. 13-0585 Justin N Grover ©2013 The MITRE Corporation. All rights reserved. January 2013 McLean, VA Abstract As Android smartphones gain popularity, industry and government will face increasing pressure to integrate them into their environments.
    [Show full text]
  • Citrix Xendesktop 7.5 Und Xenapp Kennen
    Wissen, wie’s geht. Leseprobe Anhand eines durchgängigen Praxisszenarios lernen Sie den Einsatz von Citrix XenDesktop 7.5 und XenApp kennen. Daher liefern wir Ihnen zum idealen Start die ersten drei Kapitel des Buches. Außer- dem können Sie einen Blick in das vollständige Inhalts- und Stich- wortverzeichnis werfen. »Einführung« »Desktop- und Anwendungs-Remoting« »XenDesktop- und XenApp-Architektur« Inhalt Index Die Autoren Leseprobe weiterempfehlen Nico Lüdemann, Jan Hendrik Meier Citrix XenDesktop 7.5 und XenApp – Das Praxishandbuch für Administratoren 630 Seiten, gebunden, 5. Auflage 2014 59,90 Euro, ISBN 978-3-8362-2744-5 www.galileo-press.de/3527 Kapitel 1 Einführung Die dynamische und flexible Bereitstellung von Anwendungen, Diensten und Informationen ist eine der wichtigsten Zielstellungen der heutigen IT-Welt. Die in den Medien stark propagierte Desktop- Virtualisierung scheint in vielerlei Hinsicht ein adäquater Ansatz für die gestellten Anforderungen zu sein. 1.1 Schöne, neue Welt Betrachtet man Veröffentlichungen diverser Analysten zu den großen Trends der IT, so wird man heutzutage in erster Linie mit vier großen Schlagworten konfrontiert: ̈ Big Data ̈ Cloud ̈ Mobility ̈ Social Diese vier Aspekte der schönen, neuen IT-Welt bestimmen die Literatur, die Diskus- sionsforen und nicht zuletzt das Marketing aller großen Hersteller. Glaubt man den Prognosen, so wird in den kommenden Jahren eine neue Generation von IT-affinen und in der digitalen Welt aufgewachsenen Benutzern mit einer großen Variations- breite von unterschiedlichen Endgeräten unterwegs sein, die ultramobil und rund um die Uhr mit Hilfe innovativer und viraler Konzepte für ihre Arbeitgeber aktiv sind. Durch Apps, die speziell für einen spezifischen Einsatzzweck entwickelt wurden, End- geräte, die dem persönlichen Habitus am nächsten kommen, und Dienste, die jeder- zeit den Zugriff auf die gewünschten Daten und Informationen bieten, wird eine neue Evolutionsstufe der Produktivität erreicht, die bisher undenkbar gewesen ist.
    [Show full text]
  • Mobile Productivity Apps
    Mobile productivity apps Citrix Product Documentation | docs.citrix.com September 23, 2021 Mobile productivity apps Contents Mobile productivity apps release timeline 3 Support for mobile productivity apps 3 Administrator tasks and considerations 5 Features by platform 16 Citrix Secure Hub 28 Secure Mail overview 55 Citrix Secure Web 56 Citrix QuickEdit for mobile productivity apps 67 ShareConnect 72 Citrix ShareFile Workflows 84 Citrix Content Collaboration for Endpoint Management 84 EOL and deprecated apps 91 Allowing secure interaction with Office 365 apps 92 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Mobile productivity apps Mobile productivity apps release timeline April 30, 2020 Citrix mobile productivity apps release is a two‑week cadence. Although exact dates may change, knowing this cadence can help you plan ahead. We also want to make it easier for you to manage app deployments and updates. About the Secure Mail and Secure Web phased release process When new versions of Secure Mail and Secure Web are available, the releases are rolled out in a phased approach as follows: • For iOS and Android users, Secure Mail and Secure Web updates are available in the App Store and Google Play store for an increasing percentage of users over the course of a week (seven days). • New downloads of Secure Mail and Secure Web for iOS get the new version within this week. New downloads of Secure Mail and Secure Web for Android will run the previous version for the week, until the rollout of the new release reaches 100 percent of all users. • For users, some features release in gradual phases.
    [Show full text]
  • Defending Mobile Devices for High Level Officials and Decision-Makers
    Authors Teemu Väisänen, Alexandria Farar, Nikolaos Pissanidis, Christian Braccini, Bernhards Blumbergs, and Enrique Diez Defending mobile devices for high level officials and decision-makers Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non‐ profit and non‐commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1. Abstract High‐level officials and decision‐makers handle and store sensitive data with their own or with their organisations’ mobile devices. The sensitive data may be owned by the person him/herself or by the organisation. These users do not always follow security policies, creating a risk of leaking this sensitive data. It is often impossible to assess all the places where data is accessed and/or stored. The purpose of this study is to find mitigation mechanisms for a number of risks resulting from the usage of such systems without obeying security policies. The study was done by analysing usage scenarios; their actors and the assets to be secured; related mobile threats; suitable mitigation mechanisms; and threats lacking good enough mitigation mechanisms.
    [Show full text]
  • Citrix Netscaler 10 Quick Start Guide: SDX 11500/13500/14500/16500/18500/20500 Platform
    Citrix NetScaler 10 Quick Start Guide: SDX 11500/13500/14500/16500/18500/20500 Platform Citrix NetScaler 10 Copyright and Trademark Notice Copyright © 2013 Citrix Systems, Inc. All rights reserved. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS OR USED TO MAKE DERIVATIVE WORK (SUCH AS TRANSLATION, TRANSFORMATION, OR ADAPTATION) WITHOUT THE EXPRESS WRITTEN PERMISSION OF CITRIX SYSTEMS, INC. ALTHOUGH THE MATERIAL PRESENTED IN THIS DOCUMENT IS BELIEVED TO BE ACCURATE, IT IS PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE ALL RESPONSIBILITY FOR THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS MANUAL. CITRIX SYSTEMS, INC. OR ITS SUPPLIERS DO NOT ASSUME ANY LIABILITY THAT MAY OCCUR DUE TO THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS DOCUMENT. INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. COMPANIES, NAMES, AND DATA USED IN EXAMPLES ARE FICTITIOUS UNLESS OTHERWISE NOTED. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his or her own expense.
    [Show full text]
  • CITRIX SYSTEMS INC Form 10-K Annual Report Filed 2013-02-21
    SECURITIES AND EXCHANGE COMMISSION FORM 10-K Annual report pursuant to section 13 and 15(d) Filing Date: 2013-02-21 | Period of Report: 2012-12-31 SEC Accession No. 0000877890-13-000016 (HTML Version on secdatabase.com) FILER CITRIX SYSTEMS INC Mailing Address Business Address 851 WEST CYPRESS CREEK 851 WEST CYPRESS CREEK CIK:877890| IRS No.: 752275152 | State of Incorp.:DE | Fiscal Year End: 1231 ROAD ROAD Type: 10-K | Act: 34 | File No.: 000-27084 | Film No.: 13630660 FORT LAUDERDALE FL FORT LAUDERDALE FL SIC: 7372 Prepackaged software 33309 33309 954-267-3000 Copyright © 2014 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2012 or o TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . Commission File Number 0-27084 CITRIX SYSTEMS, INC. (Exact name of registrant as specified in its charter) Delaware 75-2275152 (State or other jurisdiction of (IRS Employer incorporation or organization) Identification No.) 851 West Cypress Creek Road Fort Lauderdale, Florida 33309 (Address of principal executive offices, including zip code) Registrant’s Telephone Number, Including Area Code: (954) 267-3000 Securities registered pursuant to Section 12(b) of the Act: Common Stock, $.001 Par Value The NASDAQ Stock Market LLC (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: NONE Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]