Archives

Mobile Ecosystem

The Samsung Galaxy Note8: A Bigger, More Powerful Device for the Enterprise

This blog was updated on May 22,2017, with the latest information about the Device Enrollment Program from Apple. Join the conversation on Twitter using #iOSinBusiness.

What is the Device Enrollment Program from Apple?

The Device Enrollment Program provides a fast, streamlined way to deploy your corporate-owned Mac, iOS or tvOS devices. With a mobile device management (MDM) and unified endpoint management solution like VMware AirWatch, IT can:

  • Customize device settings;
  • Activate and supervise devices over the air; and
  • Enable users to setup their own devices out of the box.

[Related: 27 Questions Answered about AirWatch & the Device Enrollment Program from Apple]

What IT challenges does the Device Enrollment Program help address?

The Device Enrollment Program solves several critical requirements for corporate-owned devices. First, organizations save time and money by eliminating high-touch processes for IT. DEP takes configuration time to zero. Deployment of corporate-owned devices with DEP means zero-touch configuration for IT, eliminates staging and automates device configuration.

Second, onboarding iOS or macOS devices is streamlined for users. Based on the settings IT configured, users are prompted through Setup Assistant (skipping through any unnecessary screens). Users only need to authenticate and don&#rsquo;t need to be tech savvy to get the content, apps and email they need on their smartphones.

Finally, supervising iOS devices over the air is possible with the DEP. With supervision, administrators have more control over the device and can disable features like AirDrop, the App Store and account modification. They can also enable features like password protection. Also, the MDM profile cannot be removed, which eliminates the possibility of un-enrollment to protect data and investments in devices and provides the best user experience possible.

What role does AirWatch play in Apple&#rsquo;s Device Enrollment Program?

To utilize the Device Enrollment Program, MDM capabilities like those part of VMware AirWatch are required. AirWatch integrates with the Device Enrollment Program, enabling organizations to automatically import devices in the console based on order history. Then, administrators can easily configure settings, apply profiles, assign applications and set restrictions that will apply automatically when users unbox devices.

[Related: iOS 10.3, tvOS 10.2 & macOS 10.12.4 Are Live! VMware AirWatch Has Your Mobile Business Covered]

How can I join the Device Enrollment Program from Apple?

First, enroll with Apple and register your organization&#rsquo;s information to create an account and designate your administrators. Next, configure your device settings and Setup Assistant steps in the AirWatch console. You then can ship devices directly to your users.

For more information, check out Apple&#rsquo;s Device Enrollment Program Guide.

What are the device requirements for the Apple Device Enrollment Program?

The devices must be corporate-owned and purchased directly from Apple or through participating Apple Authorized Resellers.*

*The Device Enrollment Program may not be supported by all Apple Authorized Resellers and carriers.

Where is the Device Enrollment Program available?

The Device Enrollment Program is available in 34 countries: Australia,Austria,Belgium,Brazil,Canada,Czech Republic,Denmark,Finland,France,Germany, Greece,Hong Kong,Hungary,India,Ireland,Italy,Japan,Luxembourg,Mexico,Netherlands, NewZealand,Norway,Poland,Portugal,Singapore,South Africa,Spain,Sweden,Switzerland, Taiwan,Turkey,United Arab Emirates,United Kingdom andUnitedStates.

What’s available for education with the Device Enrollment Program from Apple?

Both Apple and AirWatch give special consideration to unique education use cases. With Apple School Manager (ASM), Apple has delivered a central place for account creation, role definitions and content purchases. To support ASM, AirWatch designed a console section for education to setup mobile deployments and streamline management of teachers, students, classes, apps and more—whether you have a 1:1 or shared device deployment. After importing data from Apple School Manager, use AirWatch to:

  • Match devices with students or classes;
  • Assign applications (to users or devices); and
  • Configure the new Classroom application, allowing teachers to guide learning on iPads.

Students quickly choose the device with their photo displayed once their teacher has started the class.

Visit apple.com/business/dep/ and apple.com/education/it/ to learn more about the Device Enrollment Program.

 

Read more..

The Path to Modern Windows Software Distribution: Q&A with Adaptiva Founder & CTO Deepak Kumar

This blog was updated on May 22,2017, with the latest information about the Device Enrollment Program from Apple. Join the conversation on Twitter using #iOSinBusiness.

What is the Device Enrollment Program from Apple?

The Device Enrollment Program provides a fast, streamlined way to deploy your corporate-owned Mac, iOS or tvOS devices. With a mobile device management (MDM) and unified endpoint management solution like VMware AirWatch, IT can:

  • Customize device settings;
  • Activate and supervise devices over the air; and
  • Enable users to setup their own devices out of the box.

[Related: 27 Questions Answered about AirWatch & the Device Enrollment Program from Apple]

What IT challenges does the Device Enrollment Program help address?

The Device Enrollment Program solves several critical requirements for corporate-owned devices. First, organizations save time and money by eliminating high-touch processes for IT. DEP takes configuration time to zero. Deployment of corporate-owned devices with DEP means zero-touch configuration for IT, eliminates staging and automates device configuration.

Second, onboarding iOS or macOS devices is streamlined for users. Based on the settings IT configured, users are prompted through Setup Assistant (skipping through any unnecessary screens). Users only need to authenticate and don&#rsquo;t need to be tech savvy to get the content, apps and email they need on their smartphones.

Finally, supervising iOS devices over the air is possible with the DEP. With supervision, administrators have more control over the device and can disable features like AirDrop, the App Store and account modification. They can also enable features like password protection. Also, the MDM profile cannot be removed, which eliminates the possibility of un-enrollment to protect data and investments in devices and provides the best user experience possible.

What role does AirWatch play in Apple&#rsquo;s Device Enrollment Program?

To utilize the Device Enrollment Program, MDM capabilities like those part of VMware AirWatch are required. AirWatch integrates with the Device Enrollment Program, enabling organizations to automatically import devices in the console based on order history. Then, administrators can easily configure settings, apply profiles, assign applications and set restrictions that will apply automatically when users unbox devices.

[Related: iOS 10.3, tvOS 10.2 & macOS 10.12.4 Are Live! VMware AirWatch Has Your Mobile Business Covered]

How can I join the Device Enrollment Program from Apple?

First, enroll with Apple and register your organization&#rsquo;s information to create an account and designate your administrators. Next, configure your device settings and Setup Assistant steps in the AirWatch console. You then can ship devices directly to your users.

For more information, check out Apple&#rsquo;s Device Enrollment Program Guide.

What are the device requirements for the Apple Device Enrollment Program?

The devices must be corporate-owned and purchased directly from Apple or through participating Apple Authorized Resellers.*

*The Device Enrollment Program may not be supported by all Apple Authorized Resellers and carriers.

Where is the Device Enrollment Program available?

The Device Enrollment Program is available in 34 countries: Australia,Austria,Belgium,Brazil,Canada,Czech Republic,Denmark,Finland,France,Germany, Greece,Hong Kong,Hungary,India,Ireland,Italy,Japan,Luxembourg,Mexico,Netherlands, NewZealand,Norway,Poland,Portugal,Singapore,South Africa,Spain,Sweden,Switzerland, Taiwan,Turkey,United Arab Emirates,United Kingdom andUnitedStates.

What’s available for education with the Device Enrollment Program from Apple?

Both Apple and AirWatch give special consideration to unique education use cases. With Apple School Manager (ASM), Apple has delivered a central place for account creation, role definitions and content purchases. To support ASM, AirWatch designed a console section for education to setup mobile deployments and streamline management of teachers, students, classes, apps and more—whether you have a 1:1 or shared device deployment. After importing data from Apple School Manager, use AirWatch to:

  • Match devices with students or classes;
  • Assign applications (to users or devices); and
  • Configure the new Classroom application, allowing teachers to guide learning on iPads.

Students quickly choose the device with their photo displayed once their teacher has started the class.

Visit apple.com/business/dep/ and apple.com/education/it/ to learn more about the Device Enrollment Program.

 

Read more..

VMware AirWatch Is First UEM to Manage Chromebooks, Extending Cross-Platform Management Leadership

This blog was updated on May 22,2017, with the latest information about the Device Enrollment Program from Apple. Join the conversation on Twitter using #iOSinBusiness.

What is the Device Enrollment Program from Apple?

The Device Enrollment Program provides a fast, streamlined way to deploy your corporate-owned Mac, iOS or tvOS devices. With a mobile device management (MDM) and unified endpoint management solution like VMware AirWatch, IT can:

  • Customize device settings;
  • Activate and supervise devices over the air; and
  • Enable users to setup their own devices out of the box.

[Related: 27 Questions Answered about AirWatch & the Device Enrollment Program from Apple]

What IT challenges does the Device Enrollment Program help address?

The Device Enrollment Program solves several critical requirements for corporate-owned devices. First, organizations save time and money by eliminating high-touch processes for IT. DEP takes configuration time to zero. Deployment of corporate-owned devices with DEP means zero-touch configuration for IT, eliminates staging and automates device configuration.

Second, onboarding iOS or macOS devices is streamlined for users. Based on the settings IT configured, users are prompted through Setup Assistant (skipping through any unnecessary screens). Users only need to authenticate and don&#rsquo;t need to be tech savvy to get the content, apps and email they need on their smartphones.

Finally, supervising iOS devices over the air is possible with the DEP. With supervision, administrators have more control over the device and can disable features like AirDrop, the App Store and account modification. They can also enable features like password protection. Also, the MDM profile cannot be removed, which eliminates the possibility of un-enrollment to protect data and investments in devices and provides the best user experience possible.

What role does AirWatch play in Apple&#rsquo;s Device Enrollment Program?

To utilize the Device Enrollment Program, MDM capabilities like those part of VMware AirWatch are required. AirWatch integrates with the Device Enrollment Program, enabling organizations to automatically import devices in the console based on order history. Then, administrators can easily configure settings, apply profiles, assign applications and set restrictions that will apply automatically when users unbox devices.

[Related: iOS 10.3, tvOS 10.2 & macOS 10.12.4 Are Live! VMware AirWatch Has Your Mobile Business Covered]

How can I join the Device Enrollment Program from Apple?

First, enroll with Apple and register your organization&#rsquo;s information to create an account and designate your administrators. Next, configure your device settings and Setup Assistant steps in the AirWatch console. You then can ship devices directly to your users.

For more information, check out Apple&#rsquo;s Device Enrollment Program Guide.

What are the device requirements for the Apple Device Enrollment Program?

The devices must be corporate-owned and purchased directly from Apple or through participating Apple Authorized Resellers.*

*The Device Enrollment Program may not be supported by all Apple Authorized Resellers and carriers.

Where is the Device Enrollment Program available?

The Device Enrollment Program is available in 34 countries: Australia,Austria,Belgium,Brazil,Canada,Czech Republic,Denmark,Finland,France,Germany, Greece,Hong Kong,Hungary,India,Ireland,Italy,Japan,Luxembourg,Mexico,Netherlands, NewZealand,Norway,Poland,Portugal,Singapore,South Africa,Spain,Sweden,Switzerland, Taiwan,Turkey,United Arab Emirates,United Kingdom andUnitedStates.

What’s available for education with the Device Enrollment Program from Apple?

Both Apple and AirWatch give special consideration to unique education use cases. With Apple School Manager (ASM), Apple has delivered a central place for account creation, role definitions and content purchases. To support ASM, AirWatch designed a console section for education to setup mobile deployments and streamline management of teachers, students, classes, apps and more—whether you have a 1:1 or shared device deployment. After importing data from Apple School Manager, use AirWatch to:

  • Match devices with students or classes;
  • Assign applications (to users or devices); and
  • Configure the new Classroom application, allowing teachers to guide learning on iPads.

Students quickly choose the device with their photo displayed once their teacher has started the class.

Visit apple.com/business/dep/ and apple.com/education/it/ to learn more about the Device Enrollment Program.

 

Read more..

Android Oreo Is Here!

This blog was updated on May 22,2017, with the latest information about the Device Enrollment Program from Apple. Join the conversation on Twitter using #iOSinBusiness.

What is the Device Enrollment Program from Apple?

The Device Enrollment Program provides a fast, streamlined way to deploy your corporate-owned Mac, iOS or tvOS devices. With a mobile device management (MDM) and unified endpoint management solution like VMware AirWatch, IT can:

  • Customize device settings;
  • Activate and supervise devices over the air; and
  • Enable users to setup their own devices out of the box.

[Related: 27 Questions Answered about AirWatch & the Device Enrollment Program from Apple]

What IT challenges does the Device Enrollment Program help address?

The Device Enrollment Program solves several critical requirements for corporate-owned devices. First, organizations save time and money by eliminating high-touch processes for IT. DEP takes configuration time to zero. Deployment of corporate-owned devices with DEP means zero-touch configuration for IT, eliminates staging and automates device configuration.

Second, onboarding iOS or macOS devices is streamlined for users. Based on the settings IT configured, users are prompted through Setup Assistant (skipping through any unnecessary screens). Users only need to authenticate and don&#rsquo;t need to be tech savvy to get the content, apps and email they need on their smartphones.

Finally, supervising iOS devices over the air is possible with the DEP. With supervision, administrators have more control over the device and can disable features like AirDrop, the App Store and account modification. They can also enable features like password protection. Also, the MDM profile cannot be removed, which eliminates the possibility of un-enrollment to protect data and investments in devices and provides the best user experience possible.

What role does AirWatch play in Apple&#rsquo;s Device Enrollment Program?

To utilize the Device Enrollment Program, MDM capabilities like those part of VMware AirWatch are required. AirWatch integrates with the Device Enrollment Program, enabling organizations to automatically import devices in the console based on order history. Then, administrators can easily configure settings, apply profiles, assign applications and set restrictions that will apply automatically when users unbox devices.

[Related: iOS 10.3, tvOS 10.2 & macOS 10.12.4 Are Live! VMware AirWatch Has Your Mobile Business Covered]

How can I join the Device Enrollment Program from Apple?

First, enroll with Apple and register your organization&#rsquo;s information to create an account and designate your administrators. Next, configure your device settings and Setup Assistant steps in the AirWatch console. You then can ship devices directly to your users.

For more information, check out Apple&#rsquo;s Device Enrollment Program Guide.

What are the device requirements for the Apple Device Enrollment Program?

The devices must be corporate-owned and purchased directly from Apple or through participating Apple Authorized Resellers.*

*The Device Enrollment Program may not be supported by all Apple Authorized Resellers and carriers.

Where is the Device Enrollment Program available?

The Device Enrollment Program is available in 34 countries: Australia,Austria,Belgium,Brazil,Canada,Czech Republic,Denmark,Finland,France,Germany, Greece,Hong Kong,Hungary,India,Ireland,Italy,Japan,Luxembourg,Mexico,Netherlands, NewZealand,Norway,Poland,Portugal,Singapore,South Africa,Spain,Sweden,Switzerland, Taiwan,Turkey,United Arab Emirates,United Kingdom andUnitedStates.

What’s available for education with the Device Enrollment Program from Apple?

Both Apple and AirWatch give special consideration to unique education use cases. With Apple School Manager (ASM), Apple has delivered a central place for account creation, role definitions and content purchases. To support ASM, AirWatch designed a console section for education to setup mobile deployments and streamline management of teachers, students, classes, apps and more—whether you have a 1:1 or shared device deployment. After importing data from Apple School Manager, use AirWatch to:

  • Match devices with students or classes;
  • Assign applications (to users or devices); and
  • Configure the new Classroom application, allowing teachers to guide learning on iPads.

Students quickly choose the device with their photo displayed once their teacher has started the class.

Visit apple.com/business/dep/ and apple.com/education/it/ to learn more about the Device Enrollment Program.

 

Read more..

Q&A: What CISOs Can Do About Mobile Security Threats

This blog was updated on May 22,2017, with the latest information about the Device Enrollment Program from Apple. Join the conversation on Twitter using #iOSinBusiness.

What is the Device Enrollment Program from Apple?

The Device Enrollment Program provides a fast, streamlined way to deploy your corporate-owned Mac, iOS or tvOS devices. With a mobile device management (MDM) and unified endpoint management solution like VMware AirWatch, IT can:

  • Customize device settings;
  • Activate and supervise devices over the air; and
  • Enable users to setup their own devices out of the box.

[Related: 27 Questions Answered about AirWatch & the Device Enrollment Program from Apple]

What IT challenges does the Device Enrollment Program help address?

The Device Enrollment Program solves several critical requirements for corporate-owned devices. First, organizations save time and money by eliminating high-touch processes for IT. DEP takes configuration time to zero. Deployment of corporate-owned devices with DEP means zero-touch configuration for IT, eliminates staging and automates device configuration.

Second, onboarding iOS or macOS devices is streamlined for users. Based on the settings IT configured, users are prompted through Setup Assistant (skipping through any unnecessary screens). Users only need to authenticate and don&#rsquo;t need to be tech savvy to get the content, apps and email they need on their smartphones.

Finally, supervising iOS devices over the air is possible with the DEP. With supervision, administrators have more control over the device and can disable features like AirDrop, the App Store and account modification. They can also enable features like password protection. Also, the MDM profile cannot be removed, which eliminates the possibility of un-enrollment to protect data and investments in devices and provides the best user experience possible.

What role does AirWatch play in Apple&#rsquo;s Device Enrollment Program?

To utilize the Device Enrollment Program, MDM capabilities like those part of VMware AirWatch are required. AirWatch integrates with the Device Enrollment Program, enabling organizations to automatically import devices in the console based on order history. Then, administrators can easily configure settings, apply profiles, assign applications and set restrictions that will apply automatically when users unbox devices.

[Related: iOS 10.3, tvOS 10.2 & macOS 10.12.4 Are Live! VMware AirWatch Has Your Mobile Business Covered]

How can I join the Device Enrollment Program from Apple?

First, enroll with Apple and register your organization&#rsquo;s information to create an account and designate your administrators. Next, configure your device settings and Setup Assistant steps in the AirWatch console. You then can ship devices directly to your users.

For more information, check out Apple&#rsquo;s Device Enrollment Program Guide.

What are the device requirements for the Apple Device Enrollment Program?

The devices must be corporate-owned and purchased directly from Apple or through participating Apple Authorized Resellers.*

*The Device Enrollment Program may not be supported by all Apple Authorized Resellers and carriers.

Where is the Device Enrollment Program available?

The Device Enrollment Program is available in 34 countries: Australia,Austria,Belgium,Brazil,Canada,Czech Republic,Denmark,Finland,France,Germany, Greece,Hong Kong,Hungary,India,Ireland,Italy,Japan,Luxembourg,Mexico,Netherlands, NewZealand,Norway,Poland,Portugal,Singapore,South Africa,Spain,Sweden,Switzerland, Taiwan,Turkey,United Arab Emirates,United Kingdom andUnitedStates.

What’s available for education with the Device Enrollment Program from Apple?

Both Apple and AirWatch give special consideration to unique education use cases. With Apple School Manager (ASM), Apple has delivered a central place for account creation, role definitions and content purchases. To support ASM, AirWatch designed a console section for education to setup mobile deployments and streamline management of teachers, students, classes, apps and more—whether you have a 1:1 or shared device deployment. After importing data from Apple School Manager, use AirWatch to:

  • Match devices with students or classes;
  • Assign applications (to users or devices); and
  • Configure the new Classroom application, allowing teachers to guide learning on iPads.

Students quickly choose the device with their photo displayed once their teacher has started the class.

Visit apple.com/business/dep/ and apple.com/education/it/ to learn more about the Device Enrollment Program.

 

Read more..

VMworld’s Mobility Zone Is a Must for AirWatch Connect Alumni

This blog was updated on May 22,2017, with the latest information about the Device Enrollment Program from Apple. Join the conversation on Twitter using #iOSinBusiness.

What is the Device Enrollment Program from Apple?

The Device Enrollment Program provides a fast, streamlined way to deploy your corporate-owned Mac, iOS or tvOS devices. With a mobile device management (MDM) and unified endpoint management solution like VMware AirWatch, IT can:

  • Customize device settings;
  • Activate and supervise devices over the air; and
  • Enable users to setup their own devices out of the box.

[Related: 27 Questions Answered about AirWatch & the Device Enrollment Program from Apple]

What IT challenges does the Device Enrollment Program help address?

The Device Enrollment Program solves several critical requirements for corporate-owned devices. First, organizations save time and money by eliminating high-touch processes for IT. DEP takes configuration time to zero. Deployment of corporate-owned devices with DEP means zero-touch configuration for IT, eliminates staging and automates device configuration.

Second, onboarding iOS or macOS devices is streamlined for users. Based on the settings IT configured, users are prompted through Setup Assistant (skipping through any unnecessary screens). Users only need to authenticate and don&#rsquo;t need to be tech savvy to get the content, apps and email they need on their smartphones.

Finally, supervising iOS devices over the air is possible with the DEP. With supervision, administrators have more control over the device and can disable features like AirDrop, the App Store and account modification. They can also enable features like password protection. Also, the MDM profile cannot be removed, which eliminates the possibility of un-enrollment to protect data and investments in devices and provides the best user experience possible.

What role does AirWatch play in Apple&#rsquo;s Device Enrollment Program?

To utilize the Device Enrollment Program, MDM capabilities like those part of VMware AirWatch are required. AirWatch integrates with the Device Enrollment Program, enabling organizations to automatically import devices in the console based on order history. Then, administrators can easily configure settings, apply profiles, assign applications and set restrictions that will apply automatically when users unbox devices.

[Related: iOS 10.3, tvOS 10.2 & macOS 10.12.4 Are Live! VMware AirWatch Has Your Mobile Business Covered]

How can I join the Device Enrollment Program from Apple?

First, enroll with Apple and register your organization&#rsquo;s information to create an account and designate your administrators. Next, configure your device settings and Setup Assistant steps in the AirWatch console. You then can ship devices directly to your users.

For more information, check out Apple&#rsquo;s Device Enrollment Program Guide.

What are the device requirements for the Apple Device Enrollment Program?

The devices must be corporate-owned and purchased directly from Apple or through participating Apple Authorized Resellers.*

*The Device Enrollment Program may not be supported by all Apple Authorized Resellers and carriers.

Where is the Device Enrollment Program available?

The Device Enrollment Program is available in 34 countries: Australia,Austria,Belgium,Brazil,Canada,Czech Republic,Denmark,Finland,France,Germany, Greece,Hong Kong,Hungary,India,Ireland,Italy,Japan,Luxembourg,Mexico,Netherlands, NewZealand,Norway,Poland,Portugal,Singapore,South Africa,Spain,Sweden,Switzerland, Taiwan,Turkey,United Arab Emirates,United Kingdom andUnitedStates.

What’s available for education with the Device Enrollment Program from Apple?

Both Apple and AirWatch give special consideration to unique education use cases. With Apple School Manager (ASM), Apple has delivered a central place for account creation, role definitions and content purchases. To support ASM, AirWatch designed a console section for education to setup mobile deployments and streamline management of teachers, students, classes, apps and more—whether you have a 1:1 or shared device deployment. After importing data from Apple School Manager, use AirWatch to:

  • Match devices with students or classes;
  • Assign applications (to users or devices); and
  • Configure the new Classroom application, allowing teachers to guide learning on iPads.

Students quickly choose the device with their photo displayed once their teacher has started the class.

Visit apple.com/business/dep/ and apple.com/education/it/ to learn more about the Device Enrollment Program.

 

Read more..

Silent Mobile Threat: How Apps Steal Your Data

Do your personal mobile apps steal data from you, with or without your consent? On the business side, does this mobile surveillance put your company’s data at risk? Read this insightful guest blog from Appthority Co-Founder and President Domingo Guerra.

It seems like a fair trade: Get your favorite mobile apps free, and watch annoying ads in return. Unfortunately, that is not all you do in return.

In reality, you give up a great deal of personal information. Mobile apps collect a massive amount of personal data—your location, your online history, your contacts, your schedule, your identity and more. The app instantly shares your information with mobile advertising networks. Those networks then use your personal information to determine the best ad at any given time and place.

Growing Privacy Threat: Mobile Surveillance

The tradeoff is not really ads for apps; it is intrusive mobile surveillance for apps. By agreeing to free, ad-sponsored mobile apps, we consent to an economic model that entails continuous and comprehensive personal surveillance. It is what Al Gore accurately characterized as the stalker economy.

Why is our personal, location and behavioral data so coveted by marketers? Because a smartphone is something that we as consumers carry everywhere we go. Our smartphones constantly broadcast personal data of all kinds. If advertisers know who we are, where we are and what we do, they can deliver ads that are more effective. Proximity marketing is the ad that pings your phone as you walk through the aisles. &#rsquo;Save 10% now on mouthwash.&#rdquo;

Sounds innocuous, if annoying, but it goes much further than this. We now enable a system where a major retailer can know, for example, that a teenager is pregnant before her parents do simply by correlating her activity, search and purchase data. That retailer can then reach out via mail or email or target her via phone when she is near a point of sale.

This intrusion on our collective privacy is not going away anytime soon (if ever), as the economic incentives for app developers and advertisers are too strong.

[Related: 7 Simple Ways to Secure Your Smartphone]

Enterprise Data at Risk, Too

Okay, agreed, this kind of consumer surveillance is intrusive and creepy, but how does it threaten enterprise security? Simple. As personally owned mobile devices invade the business world, leaks from those devices open the door to corporate hacks, stolen business data and crippling cyber attacks.

For instance, if a company lets its employees sync their corporate calendars and email accounts to their personal mobile devices, this opens up all sorts of risks. Suddenly, employees&#rsquo; phones contain or access the contact information of everyone in the organization. Further, any mobile app that requests access to the employees&#rsquo; contacts and calendar also gets access to the names and titles of company employees. Those apps can get dial-in codes for all private conference calls. A malicious app or hacker can easily use this information in a spear phishing attack.

Worse, many apps monetize their user bases by sharing data with ad networks that share and combine data with other networks. It is impossible to know exactly where data is going and whether any of the many parties that have access to this data handle it securely. All of this sharing means a malicious hacker does not even have to access an employee&#rsquo;s phone to attack a company. He can hack an ad network with the information from millions of users and go from there.

Stolen information can also attack an enterprise through a watering hole attack. For example, your company executives eat lunch regularly at a local restaurant. An attacker with access to their geolocation data could easily know this. The attacker correctly assumes that some of the execs are accessing the restaurant&#rsquo;s website to make reservations and browse the menu before lunch. By placing malware on the lightly defended site, the attacker can compromise the office computer or mobile device of one or more company executives. From there, the attacker can launch a successful breach.

A compromised smartphone represents a threat not just to the targeted employee, but also to the entire company.

Information about employees&#rsquo; activities both on the job and elsewhere, combined with any company-related emails, documents or sensitive information, can be devastating to an organization if it gets into the wrong hands.

[Related Partner Blog: 4 Tips to Protect Company Data & Mobile Employees]

So What Should Enterprises Do to Combat the Threat?

The first step to combating these threats is visibility. Your organization needs to know what apps employees are using, what those apps are doing and whether or not they comply with corporate security policies. For example, is there a particularly risky file-sharing app you do not want employees to use? Is it already used? If you do not know which apps your employees use for work, you are flying blind and taking a huge risk.

However, your organization also has a responsibility to protect your employees&#rsquo; privacy.

For example, it may not be prudent for &#rsquo;Jack from IT&#rdquo; to know that &#rsquo;Jill from finance&#rdquo; has a dating app or a diabetes app on her phone. Further, if employees fear a &#rsquo;big brother&#rdquo; scenario where IT is always looking over their shoulder, they may opt out of using security tools altogether leading to Shadow IT and making your enterprise less secure.

[Related: Data Privacy in 2017: From Project to Priority]

Balancing Privacy & Security

So, how do large enterprises balance the need for mobile security and employee privacy? By employing a Blind

Click to download our free eBook.

Enforcement model, where all IT sees is whether a device (using an anonymized device ID) is compliant or not while simultaneously empowering employees, but providing automate risk education so they can self-manage and self-remediate their devises for mobile risk.

This model represents a win-win, by giving IT and security teams peace of mind that the devices that are connecting to corporate email, corporate Wi-Fi, and corporate/managed apps are compliant. Users also see this model as a win, as they are given a tool to manage and protect their own privacy and security. Whether in BYO or corporate-owned environments, we often ask our employees to agree to a mobile policy, but usually don&#rsquo;t provide education or tools for them to know if they are in compliance. Using an automated Mobile Threat Protection solution with Blind Enforcement like Appthority, both IT and employees can feel safe.

There are other benefits of bringing the employee into the workflow with a self-management and self-remediation model. For one, it decreases the workload on IT or Security teams. These teams no longer become bottlenecks in compliance and enforcement workflows and instead give an opportunity for employees to comply, knowing that if they don&#rsquo;t comply in a certain time period, the system will automatically restrict the employees&#rsquo; access to sensitive company data and networks. Second, it provides on-the-fly security education and training to employees, allowing them to be part of the solution and not just part of the problem. Finally, it changes user behavior to not only improve the current state of security across your mobile fleet, but also improve the security of future use.

Next, you need a policy for managing the use of mobile devices. Most organizations already have policies for other platforms, including managing firewalls and sharing data with partners.

It is equally important to create these policies for mobile. For instance, if employees use free versions of apps that are approved by the company but ad-supported, create a policy that requires employees to upgrade to the paid version. This helps minimize, if not eliminate, unsanctioned data in the form of ads being sent to employees—though it does not eliminate the relentless collection of personal and private data.

A good next step is to educate employees about the risks of the apps they download. It is in your best interest to empower users by arming them with tools and training to make better decisions about what apps they download. For instance, coach your employees to question apps that ask for permission. Many apps want to access location, contacts or camera.

Employees do not have to say &#rsquo;yes&#rdquo; automatically. If an app does not say why it needs access, that is a big red flag.

Most apps work fine if the user denies the request. If the app really needs access to work, it will prompt users again for permission.

Enterprises can address all of these areas with a good mobile security solution. Any enterprise without a mobile threat protection solution is, by definition, unaware of its mobile risks and related data losses. It is therefore imperative that your enterprise include mobile threat protection as part of its overall security strategy. With the right mobile security platform, you take a huge step toward protecting both employee privacy and company data from the ever-growing threat of mobile surveillance and data gathering.

Because you liked this blog:

  • Bulletproof RDS: 30 Ways to Secure Remote Desktop Services
  • Infographic: Optimizing Secure Mobility in Retail
  • Redesigning the VMware AirWatch Privacy Policy

The post Silent Mobile Threat: How Apps Steal Your Data appeared first on VMware End-User Computing Blog.

Read more..

Silent Mobile Threat: How Apps Steal Your Data

Do your personal mobile apps steal data from you, with or without your consent? On the business side, does this mobile surveillance put your company’s data at risk? Read this insightful guest blog from Appthority Co-Founder and President Domingo Guerra.

It seems like a fair trade: Get your favorite mobile apps free, and watch annoying ads in return. Unfortunately, that is not all you do in return.

In reality, you give up a great deal of personal information. Mobile apps collect a massive amount of personal data—your location, your online history, your contacts, your schedule, your identity and more. The app instantly shares your information with mobile advertising networks. Those networks then use your personal information to determine the best ad at any given time and place.

Growing Privacy Threat: Mobile Surveillance

The tradeoff is not really ads for apps; it is intrusive mobile surveillance for apps. By agreeing to free, ad-sponsored mobile apps, we consent to an economic model that entails continuous and comprehensive personal surveillance. It is what Al Gore accurately characterized as the stalker economy.

Why is our personal, location and behavioral data so coveted by marketers? Because a smartphone is something that we as consumers carry everywhere we go. Our smartphones constantly broadcast personal data of all kinds. If advertisers know who we are, where we are and what we do, they can deliver ads that are more effective. Proximity marketing is the ad that pings your phone as you walk through the aisles. &#rsquo;Save 10% now on mouthwash.&#rdquo;

Sounds innocuous, if annoying, but it goes much further than this. We now enable a system where a major retailer can know, for example, that a teenager is pregnant before her parents do simply by correlating her activity, search and purchase data. That retailer can then reach out via mail or email or target her via phone when she is near a point of sale.

This intrusion on our collective privacy is not going away anytime soon (if ever), as the economic incentives for app developers and advertisers are too strong.

[Related: 7 Simple Ways to Secure Your Smartphone]

Enterprise Data at Risk, Too

Okay, agreed, this kind of consumer surveillance is intrusive and creepy, but how does it threaten enterprise security? Simple. As personally owned mobile devices invade the business world, leaks from those devices open the door to corporate hacks, stolen business data and crippling cyber attacks.

For instance, if a company lets its employees sync their corporate calendars and email accounts to their personal mobile devices, this opens up all sorts of risks. Suddenly, employees&#rsquo; phones contain or access the contact information of everyone in the organization. Further, any mobile app that requests access to the employees&#rsquo; contacts and calendar also gets access to the names and titles of company employees. Those apps can get dial-in codes for all private conference calls. A malicious app or hacker can easily use this information in a spear phishing attack.

Worse, many apps monetize their user bases by sharing data with ad networks that share and combine data with other networks. It is impossible to know exactly where data is going and whether any of the many parties that have access to this data handle it securely. All of this sharing means a malicious hacker does not even have to access an employee&#rsquo;s phone to attack a company. He can hack an ad network with the information from millions of users and go from there.

Stolen information can also attack an enterprise through a watering hole attack. For example, your company executives eat lunch regularly at a local restaurant. An attacker with access to their geolocation data could easily know this. The attacker correctly assumes that some of the execs are accessing the restaurant&#rsquo;s website to make reservations and browse the menu before lunch. By placing malware on the lightly defended site, the attacker can compromise the office computer or mobile device of one or more company executives. From there, the attacker can launch a successful breach.

A compromised smartphone represents a threat not just to the targeted employee, but also to the entire company.

Information about employees&#rsquo; activities both on the job and elsewhere, combined with any company-related emails, documents or sensitive information, can be devastating to an organization if it gets into the wrong hands.

[Related Partner Blog: 4 Tips to Protect Company Data & Mobile Employees]

So What Should Enterprises Do to Combat the Threat?

The first step to combating these threats is visibility. Your organization needs to know what apps employees are using, what those apps are doing and whether or not they comply with corporate security policies. For example, is there a particularly risky file-sharing app you do not want employees to use? Is it already used? If you do not know which apps your employees use for work, you are flying blind and taking a huge risk.

However, your organization also has a responsibility to protect your employees&#rsquo; privacy.

For example, it may not be prudent for &#rsquo;Jack from IT&#rdquo; to know that &#rsquo;Jill from finance&#rdquo; has a dating app or a diabetes app on her phone. Further, if employees fear a &#rsquo;big brother&#rdquo; scenario where IT is always looking over their shoulder, they may opt out of using security tools altogether leading to Shadow IT and making your enterprise less secure.

[Related: Data Privacy in 2017: From Project to Priority]

Balancing Privacy & Security

So, how do large enterprises balance the need for mobile security and employee privacy? By employing a Blind

Click to download our free eBook.

Enforcement model, where all IT sees is whether a device (using an anonymized device ID) is compliant or not while simultaneously empowering employees, but providing automate risk education so they can self-manage and self-remediate their devises for mobile risk.

This model represents a win-win, by giving IT and security teams peace of mind that the devices that are connecting to corporate email, corporate Wi-Fi, and corporate/managed apps are compliant. Users also see this model as a win, as they are given a tool to manage and protect their own privacy and security. Whether in BYO or corporate-owned environments, we often ask our employees to agree to a mobile policy, but usually don&#rsquo;t provide education or tools for them to know if they are in compliance. Using an automated Mobile Threat Protection solution with Blind Enforcement like Appthority, both IT and employees can feel safe.

There are other benefits of bringing the employee into the workflow with a self-management and self-remediation model. For one, it decreases the workload on IT or Security teams. These teams no longer become bottlenecks in compliance and enforcement workflows and instead give an opportunity for employees to comply, knowing that if they don&#rsquo;t comply in a certain time period, the system will automatically restrict the employees&#rsquo; access to sensitive company data and networks. Second, it provides on-the-fly security education and training to employees, allowing them to be part of the solution and not just part of the problem. Finally, it changes user behavior to not only improve the current state of security across your mobile fleet, but also improve the security of future use.

Next, you need a policy for managing the use of mobile devices. Most organizations already have policies for other platforms, including managing firewalls and sharing data with partners.

It is equally important to create these policies for mobile. For instance, if employees use free versions of apps that are approved by the company but ad-supported, create a policy that requires employees to upgrade to the paid version. This helps minimize, if not eliminate, unsanctioned data in the form of ads being sent to employees—though it does not eliminate the relentless collection of personal and private data.

A good next step is to educate employees about the risks of the apps they download. It is in your best interest to empower users by arming them with tools and training to make better decisions about what apps they download. For instance, coach your employees to question apps that ask for permission. Many apps want to access location, contacts or camera.

Employees do not have to say &#rsquo;yes&#rdquo; automatically. If an app does not say why it needs access, that is a big red flag.

Most apps work fine if the user denies the request. If the app really needs access to work, it will prompt users again for permission.

Enterprises can address all of these areas with a good mobile security solution. Any enterprise without a mobile threat protection solution is, by definition, unaware of its mobile risks and related data losses. It is therefore imperative that your enterprise include mobile threat protection as part of its overall security strategy. With the right mobile security platform, you take a huge step toward protecting both employee privacy and company data from the ever-growing threat of mobile surveillance and data gathering.

Because you liked this blog:

  • Bulletproof RDS: 30 Ways to Secure Remote Desktop Services
  • Infographic: Optimizing Secure Mobility in Retail
  • Redesigning the VMware AirWatch Privacy Policy

The post Silent Mobile Threat: How Apps Steal Your Data appeared first on VMware End-User Computing Blog.

Read more..

Guest Blog: Our Top 4 Mobile Security Lessons from 2016

As businesses slow down over the festive break, it&#rsquo;s a good time to look back over some of the mobile threats that emerged in the past year to better prepare for what&#rsquo;s ahead. Upon reflection, mobile security is clearly more important than ever. Today&#rsquo;s mobile devices are living in a hostile environment, where well-crafted and […]]>

by David Renwick, Wandera Director Product Advocacy

As businesses slow down over the festive break, it&#rsquo;s a good time to look back over some of the mobile threats that emerged in the past year to better prepare for what&#rsquo;s ahead. Upon reflection, mobile security is clearly more important than ever. Today&#rsquo;s mobile devices are living in a hostile environment, where well-crafted and sophisticated attacks are on the rise. Here are four of the top mobile security lessons we&#rsquo;ve learned from 2016.

1. Hummingbad/Hummer: Malware Is Big Business

If the motivation behind why people create malware escapes you, look no further than Hummingbad. Simply put: malware is big business. With this attack, the device actively generates fraudulent ad-clicks and downloads, which in turn generate micro-payments for someone, somewhere.Scale that activity across millions of devices, and soon enough, a lucrative business takes shape. Perhaps we brought this one on ourselves by building the pay-per-click, freeware, ad-driven economy for all those &#rsquo;free&#rdquo; apps and games, instead of putting our hands in our pockets and actually purchasing the apps we really want and need. Nevertheless, Hummingbad and its variants did an effective job of draining our device batteries and data plans, hampering our productivity and compromising our privacy and security.

[Related: What You Need to Know about Hummingbad]

2. SMS Attacks

We continue to see malicious apps requesting access to SMS capabilities on Android devices. And many users simply grant access without understanding the risk. 2016 saw a very targeted version of this attack in Australia. An app specifically looked out for an SMS from a known bank with an activation code and then harvested the information.And then, just a few weeks, I opened up my News app and saw this headline: 700 million Android handsets may be secretly sending users’ texts to China every 72 hours. SMS harvesting is just as easy and popular than it ever was, folks.

3. Pegasus

Back in September, there was a mini watershed moment when the Pegasus news broke. It demonstrated the precision in which hackers work to execute targeted, sophisticated and weaponized mobile cyber attacks and bared some uncomfortable truths. In itself, this attack is very rare. The average user is unlikely to be subjected to it directly. Plus, by the time it hit the headlines, the vulnerability was patched.

What was so special? Pegasus was a weaponized toolkit that made use of three rare iOS vulnerabilities. One vulnerability of significance is rare, so having three in play at once is an unusual case. What could Pegasus do? If you&#rsquo;ve heard all those stories about smartphones listening into your calls or reading your messages and passwords, that&#rsquo;s what it could do.

Pegasus was by all accounts very sophisticated. It was built for surveillance, and the first rule of surveillance is to remain undetected for as long as possible. Cover your tracks and leave with no (or very little) trace when you are done, so your target remains oblivious. The designers of Pegasus kept this in mind when thinking about the more obvious or clumsy run-of-the-mill jailbreak techniques we&#rsquo;ve seen in the past. Still, with all its targeted sophistication and rare attributes, Pegasus made us think about what is possible. I can&#rsquo;t help feeling that a genie escaped from a bottle this year.

[Related: What You Need to Know about Trident & Pegusus]

4. TAPS: The OMG Moment of Conflicting Human Ingenuity

Most people know security best practices, but don&#rsquo;t take the simple things seriously, such as passwords, security codes, tokens and all the things designed to bolster convenience and security. I couldn&#rsquo;t help being amazed at human ingenuity and simultaneously disheartened by TAPS: Touchscreen Sticker with Touch ID. It&#rsquo;s a sticker. You attach it to a glove, and it simulates a fingerprint so that you don&#rsquo;t have to take your glove off to unlock your most valuable, personal and precious device.

The technology behind Touch ID is incredible. It recognizes your fingerprint in a tenth of a second and makes purchasing an app quick but still secure. But in one fell swoop, TAPS undermines one of the most unique, personal and attached authentication mechanisms and throws it out of the window. Multiple factor authentication is extremely important. Always ensure there is more than one request for access to your device in case one is compromised. Even though Touch ID is available on most smartphones, biometrics are still a long way from becoming the primary way into our devices and for good reason.

What Can We Expect in 2017?

After another year or mobile threat evolution, there&#rsquo;s no sign of these threats stopping in 2017. It&#rsquo;s easy to see why malicious actors target mobile devices. Users store more information and access more services on smartphones and tablets than ever before. All that personal data is attractive to hackers and thieves. At the same time, device usage is increasing, and the amount of data is growing, too. Faster and more efficient cellular data access means we enjoying a revolutionary mobile experience that&#rsquo;s better than the last. Unfortunately, there are people who will exploit the technology.

Despite the prevalence of threats, we should still be excited for 2017 and the innovations that will hit the market to further this revolution. Security experts continue to develop and apply sophisticated technologies, such as machine learning, for mobile security to ensure businesses and end users can feel safe in today&#rsquo;s mobile world.

David leads Wandera’s product advocacy group, working with the company’s largest customers to develop and implement leading-edge solutions. A specialist in enterprise mobility, EMM, MDM, BYOD enablement and technology innovation, David started his career in technology over 25 years ago at the outset of the PC revolution. David has worked at some of the world’s most reputable technology companies, including Apple and VMware AirWatch, where he held various positions across multiple continents, including iOS Technical Specialist for EMEA and Innovation Director.

Because you liked this blog:

  • Gooligan Malware: What You Need to Know
  • VMware AirWatch Security: Year In Review
  • Derived Credentials: What You Need to Know

Read more..

Guest Blog: Our Top 4 Mobile Security Lessons from 2016

As businesses slow down over the festive break, it&#rsquo;s a good time to look back over some of the mobile threats that emerged in the past year to better prepare for what&#rsquo;s ahead. Upon reflection, mobile security is clearly more important than ever. Today&#rsquo;s mobile devices are living in a hostile environment, where well-crafted and […]]>

by David Renwick, Wandera Director Product Advocacy

As businesses slow down over the festive break, it&#rsquo;s a good time to look back over some of the mobile threats that emerged in the past year to better prepare for what&#rsquo;s ahead. Upon reflection, mobile security is clearly more important than ever. Today&#rsquo;s mobile devices are living in a hostile environment, where well-crafted and sophisticated attacks are on the rise. Here are four of the top mobile security lessons we&#rsquo;ve learned from 2016.

1. Hummingbad/Hummer: Malware Is Big Business

If the motivation behind why people create malware escapes you, look no further than Hummingbad. Simply put: malware is big business. With this attack, the device actively generates fraudulent ad-clicks and downloads, which in turn generate micro-payments for someone, somewhere.Scale that activity across millions of devices, and soon enough, a lucrative business takes shape. Perhaps we brought this one on ourselves by building the pay-per-click, freeware, ad-driven economy for all those &#rsquo;free&#rdquo; apps and games, instead of putting our hands in our pockets and actually purchasing the apps we really want and need. Nevertheless, Hummingbad and its variants did an effective job of draining our device batteries and data plans, hampering our productivity and compromising our privacy and security.

[Related: What You Need to Know about Hummingbad]

2. SMS Attacks

We continue to see malicious apps requesting access to SMS capabilities on Android devices. And many users simply grant access without understanding the risk. 2016 saw a very targeted version of this attack in Australia. An app specifically looked out for an SMS from a known bank with an activation code and then harvested the information.And then, just a few weeks, I opened up my News app and saw this headline: 700 million Android handsets may be secretly sending users’ texts to China every 72 hours. SMS harvesting is just as easy and popular than it ever was, folks.

3. Pegasus

Back in September, there was a mini watershed moment when the Pegasus news broke. It demonstrated the precision in which hackers work to execute targeted, sophisticated and weaponized mobile cyber attacks and bared some uncomfortable truths. In itself, this attack is very rare. The average user is unlikely to be subjected to it directly. Plus, by the time it hit the headlines, the vulnerability was patched.

What was so special? Pegasus was a weaponized toolkit that made use of three rare iOS vulnerabilities. One vulnerability of significance is rare, so having three in play at once is an unusual case. What could Pegasus do? If you&#rsquo;ve heard all those stories about smartphones listening into your calls or reading your messages and passwords, that&#rsquo;s what it could do.

Pegasus was by all accounts very sophisticated. It was built for surveillance, and the first rule of surveillance is to remain undetected for as long as possible. Cover your tracks and leave with no (or very little) trace when you are done, so your target remains oblivious. The designers of Pegasus kept this in mind when thinking about the more obvious or clumsy run-of-the-mill jailbreak techniques we&#rsquo;ve seen in the past. Still, with all its targeted sophistication and rare attributes, Pegasus made us think about what is possible. I can&#rsquo;t help feeling that a genie escaped from a bottle this year.

[Related: What You Need to Know about Trident & Pegusus]

4. TAPS: The OMG Moment of Conflicting Human Ingenuity

Most people know security best practices, but don&#rsquo;t take the simple things seriously, such as passwords, security codes, tokens and all the things designed to bolster convenience and security. I couldn&#rsquo;t help being amazed at human ingenuity and simultaneously disheartened by TAPS: Touchscreen Sticker with Touch ID. It&#rsquo;s a sticker. You attach it to a glove, and it simulates a fingerprint so that you don&#rsquo;t have to take your glove off to unlock your most valuable, personal and precious device.

The technology behind Touch ID is incredible. It recognizes your fingerprint in a tenth of a second and makes purchasing an app quick but still secure. But in one fell swoop, TAPS undermines one of the most unique, personal and attached authentication mechanisms and throws it out of the window. Multiple factor authentication is extremely important. Always ensure there is more than one request for access to your device in case one is compromised. Even though Touch ID is available on most smartphones, biometrics are still a long way from becoming the primary way into our devices and for good reason.

What Can We Expect in 2017?

After another year or mobile threat evolution, there&#rsquo;s no sign of these threats stopping in 2017. It&#rsquo;s easy to see why malicious actors target mobile devices. Users store more information and access more services on smartphones and tablets than ever before. All that personal data is attractive to hackers and thieves. At the same time, device usage is increasing, and the amount of data is growing, too. Faster and more efficient cellular data access means we enjoying a revolutionary mobile experience that&#rsquo;s better than the last. Unfortunately, there are people who will exploit the technology.

Despite the prevalence of threats, we should still be excited for 2017 and the innovations that will hit the market to further this revolution. Security experts continue to develop and apply sophisticated technologies, such as machine learning, for mobile security to ensure businesses and end users can feel safe in today&#rsquo;s mobile world.

David leads Wandera’s product advocacy group, working with the company’s largest customers to develop and implement leading-edge solutions. A specialist in enterprise mobility, EMM, MDM, BYOD enablement and technology innovation, David started his career in technology over 25 years ago at the outset of the PC revolution. David has worked at some of the world’s most reputable technology companies, including Apple and VMware AirWatch, where he held various positions across multiple continents, including iOS Technical Specialist for EMEA and Innovation Director.

Because you liked this blog:

  • Gooligan Malware: What You Need to Know
  • VMware AirWatch Security: Year In Review
  • Derived Credentials: What You Need to Know

Read more..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 36 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/taxonomy.php on line 3361