byod

The Latest Mobile News on Apple, Android & Windows 10

This blog was updated on May 22,2017, with the latest information about the Device Enrollment Program from Apple. Join the conversation on Twitter using #iOSinBusiness.

What is the Device Enrollment Program from Apple?

The Device Enrollment Program provides a fast, streamlined way to deploy your corporate-owned Mac, iOS or tvOS devices. With a mobile device management (MDM) and unified endpoint management solution like VMware AirWatch, IT can:

  • Customize device settings;
  • Activate and supervise devices over the air; and
  • Enable users to setup their own devices out of the box.

[Related: 27 Questions Answered about AirWatch & the Device Enrollment Program from Apple]

What IT challenges does the Device Enrollment Program help address?

The Device Enrollment Program solves several critical requirements for corporate-owned devices. First, organizations save time and money by eliminating high-touch processes for IT. DEP takes configuration time to zero. Deployment of corporate-owned devices with DEP means zero-touch configuration for IT, eliminates staging and automates device configuration.

Second, onboarding iOS or macOS devices is streamlined for users. Based on the settings IT configured, users are prompted through Setup Assistant (skipping through any unnecessary screens). Users only need to authenticate and don&#rsquo;t need to be tech savvy to get the content, apps and email they need on their smartphones.

Finally, supervising iOS devices over the air is possible with the DEP. With supervision, administrators have more control over the device and can disable features like AirDrop, the App Store and account modification. They can also enable features like password protection. Also, the MDM profile cannot be removed, which eliminates the possibility of un-enrollment to protect data and investments in devices and provides the best user experience possible.

What role does AirWatch play in Apple&#rsquo;s Device Enrollment Program?

To utilize the Device Enrollment Program, MDM capabilities like those part of VMware AirWatch are required. AirWatch integrates with the Device Enrollment Program, enabling organizations to automatically import devices in the console based on order history. Then, administrators can easily configure settings, apply profiles, assign applications and set restrictions that will apply automatically when users unbox devices.

[Related: iOS 10.3, tvOS 10.2 & macOS 10.12.4 Are Live! VMware AirWatch Has Your Mobile Business Covered]

How can I join the Device Enrollment Program from Apple?

First, enroll with Apple and register your organization&#rsquo;s information to create an account and designate your administrators. Next, configure your device settings and Setup Assistant steps in the AirWatch console. You then can ship devices directly to your users.

For more information, check out Apple&#rsquo;s Device Enrollment Program Guide.

What are the device requirements for the Apple Device Enrollment Program?

The devices must be corporate-owned and purchased directly from Apple or through participating Apple Authorized Resellers.*

*The Device Enrollment Program may not be supported by all Apple Authorized Resellers and carriers.

Where is the Device Enrollment Program available?

The Device Enrollment Program is available in 34 countries: Australia,Austria,Belgium,Brazil,Canada,Czech Republic,Denmark,Finland,France,Germany, Greece,Hong Kong,Hungary,India,Ireland,Italy,Japan,Luxembourg,Mexico,Netherlands, NewZealand,Norway,Poland,Portugal,Singapore,South Africa,Spain,Sweden,Switzerland, Taiwan,Turkey,United Arab Emirates,United Kingdom andUnitedStates.

What’s available for education with the Device Enrollment Program from Apple?

Both Apple and AirWatch give special consideration to unique education use cases. With Apple School Manager (ASM), Apple has delivered a central place for account creation, role definitions and content purchases. To support ASM, AirWatch designed a console section for education to setup mobile deployments and streamline management of teachers, students, classes, apps and more—whether you have a 1:1 or shared device deployment. After importing data from Apple School Manager, use AirWatch to:

  • Match devices with students or classes;
  • Assign applications (to users or devices); and
  • Configure the new Classroom application, allowing teachers to guide learning on iPads.

Students quickly choose the device with their photo displayed once their teacher has started the class.

Visit apple.com/business/dep/ and apple.com/education/it/ to learn more about the Device Enrollment Program.

 

Read more..

New Research: Top 10 Identity and Access Management Challenges

As organizations undergo digital transformation, they experience challenges along the way. This is due to the fact that this transformation often requires them to update and/or replace legacy solutions. They also have to implement new ways of securing access from the plethora of devices out there.

We recently fielded a research studywith several hundred respondents worldwide to better understand the top identity and access management challenges that customers are facing.

Below are my top three takeaways from the VMware survey:

Takeaway #1: Most organizations allow end users to access corporate resources other than email from a personal device.

Email is often the first app that many of us think about accessing from our personal devices, but the reality is that we need more than that. The research shows that end users also need access to files and internal websites in order to be productive.

IT professionals should be concerned about the risk of data leakage from users accessing confidential information, whether it be on a file share, Microsoft SharePoint or from internal websites. Since personal devices are often not under management by IT, there is a risk that confidential company information can be copied to personal file services.

[Related: Introducing VMware Identity Manager—Identity Management for the Mobile-Cloud Era]

Takeway #2: BYO is a critical initiative for the majority of organizations.

The majority of organizations have either already developed a bring-your-own (BYO) policy or are in the process of developing one. The reasons for this are clear. Most of us don&#rsquo;t want to go back to the old days, when we could only do work on a corporate device. We want to be able to work anywhere, on any device.

End users also want choice—the choice to pick the device that reflects their work style and personality. Supporting BYO enables organizations to modernize with a flexible, user-friendly approach.

While supporting BYO is user-friendly, organizations need to have a policy that ensures that only the right access is delivered to the right people, on the right device. As we saw in Takeaway #1, most users are doing more than accessing email on their personal devices. It&#rsquo;s not enough to just have a policy—organizations must have the tools in order enable access from any device without compromising IT security.

[Related: VMware Identity Manager—A BYOD Solution Everyone Can Agree On]

Takeway #3: Password management is the top identity and access management challenge.

We&#rsquo;ve all been there before. We waited too long, and our password expired. Or we made a change, and somehow that change didn&#rsquo;t trickle down to all of the various systems we need to access.

Password creation, update and deletion (CRUD) is a real issue with real costs that IT wants to reduce. According to various analysts, password resets handled by the help desk can cost up to $70, and unfortunately for the help desk, a significant percentage of help desk calls have to do with passwords.

IT must look at ways to reduce the impact of password CRUD issues in their organization. This is why it&#rsquo;s so important to have solutions in place that eliminate the help desk call—the main source of cost in the equation. Having self-service tools that are easy to use and integrate with existing systems can alleviate much of the pain here.

[Related: Why the Future of the Digital Workspace Hinges on Identity Management]

Take the Next Step

Click here for the full results.

With these challenges in mind, I encourage you to learn more about what other organizations are experiencing by taking a look at the full summary of the research.

Also, take a look at VMware Workspace ONE, the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. It enables organizations to put employees in the driver&#rsquo;s seat to choose their own devices. IT is empowered with the management capabilities necessary to enable secure delivery of applications to those devices with consumer-grade simplicity.

The post New Research: Top 10 Identity and Access Management Challenges appeared first on VMware End-User Computing Blog.

Read more..

VMware AirWatch Android Enterprise Enhancements

The recent Android Enterprise enhancements for VMware AirWatch make setting upan enterprise mobility management (EMM) solution easier than ever. Use these improvements to secure an Android bring-your-own-device (BYOD) deployment, without sacrificing user experience. To get started, check out ourVMware AirWatch Android Enterpriseinfographic which provides an overview of the enhancements and key configurations.

How Do I Get the Android Enterprise Enhancements?

To take advantage of the enterprise enhancements for Android, meet the minimum platform and version requirements. Then, download additional resources to learn more.

Minimum Requirements

To access the functionality and streamlined workflows outlined in this post, complete the following:

  • Security Challenge functionality available for Android Nougat and above
  • AirWatch Console v9.0+

MyAirWatchResources

Download full guides from MyAirWatch to learn more. (However, please note that MyAirWatch access requires credentials.)

  • Android Platform Guide- Reviewthe basics of VMware AirWatch EMM for Android. Key topics include, but are not limited toenrolling, securing, configuring and managing devices.
  • Integration with Android for Work- Learn aboutAndroid devices with special features forenterprise security,formerly referred to as Android for Work. Then, learn about what VMware AirWatch EMM can do withthese devices.
  • Mobile Device Management (MDM) Guide - Reviewthe basics of VMware AirWatch EMM. Especially relevant topics include, enrolling, securing, configuring and managing devices.
  • Bring Your Own Device (BYOD) Guide - Learn how to secureemployee access to corporate resources on personal devices.

Contact Information

If you have anyquestions or concerns about the Android Enterprise enhancements, then please email us.

Because You Like This Post:

  • Android Nougat Comes to the Enterprise
  • [SlideShare] Gotta Secure Them All—Enterprise Apps!
  • Android Management: Embrace the Flavors and Flexibility of Android

The post VMware AirWatch Android Enterprise Enhancements appeared first on VMware End-User Computing Blog.

Read more..

Tackling the Top Threats in Cybersecurity with VMware TrustPoint

Searching for the term &#rsquo;cybersecurity&#rdquo; in your favorite search engine yields some interesting and somewhat alarming results. You will see advertisements from security vendors telling you not to become the &#rsquo;next target&#rdquo;. If you search within the U.S., the Department of Homeland Security website will likely show up. You may see yet another organization who just got hacked, maybe even for the second or third time in recent years.

Threats in the cyber world are showing up everywhere and every day. With the rise in bring-your-own (BYO) initiatives and workers using more devices for work, the most dangerous threats often show up on endpoints.

Organizations are struggling to get complete visibility of what is on their network to efficiently secure and manage their endpoints. An effective endpoint security and management strategy starts with a modern approach that can scale and respond quickly to today&#rsquo;s demands.

We introduced VMware TrustPoint to provide security and IT operations teams with complete endpoint visibility and control to secure and manage endpoints at speed and scale. Let us look at how TrustPoint can help tackle some of the most common cybersecurity threats trending in the enterprise today.

Tackling the Top Threats in Cybersecurity: Ransomware Example

Ransomware is a hot topic these days and for good reason. Hackers can essentially infect devices owned by users or organizations with ransomware, usually in the form of malicious code that disables access to files. The malicious actors then hold the user or organization at ransom until they meet demands, usually in the form of payment through bitcoin currency. This type of threat is very popular:

Nearly 50% of organizations had a ransomware attack between 2015 and 2016, per Osterman Research.

Because ransomware authors typically exploit endpoints running outdated software, enterprises can work to protect their network from ransomware by keeping software and patches up to date, something TrustPoint can help with.

Using TrustPoint, security and IT operations teams can simply ask a question, retrieve results in seconds and quickly act. For example, teams can use TrustPoint to query which endpoints are out of date with the latest patches from Microsoft Windows, Internet Explorer or any other application.

Unlike security tools with outdated architectures that rely on databases, TrustPoint is built on a modern communications platform which returns results in seconds from a live environment. Once the query completes, the security or IT team has the information they need to take the appropriate action to remediate the threat in real-time. In this example, IT can remotely distribute a patch across vulnerable endpoints.

Securing Unmanaged & BYO Endpoints

Having complete network visibility also helps security teams combat ransomware and other advanced threats. TrustPoint can quickly discover unmanaged endpoints and take actions to either gain control or prevent them from being a threat.

According to a recent SANS Institute report:

&#rsquo;You can prevent 80-90% of all known attacks by implementing and staying current on basic cyber hygiene.&#rdquo;

If you do not know how many IT assets are on your corporate network, how can you assess the impact of existing threats, like ransomware, and prevent IT assets from future threats? That is where a strong security hygiene strategy begins and what TrustPoint can help answer.

TrustPoint + AirWatch Together

The popularity of the Windows operating system (OS) in the enterprise created security and management challenges over the years, in part due to the traditional systems management approach forced upon IT. The release of Windows 10 signaled a shift from this traditional management approach to a mobile-first management approach called unified endpoint management (UEM).

Already the leader in enterprise mobility management (EMM), VMware AirWatch evolved into a platform that could not only secure and manage mobile device, but also Windows 10 endpoints. With AirWatch, organizations get the full benefit of a UEM platform to manage both mobile devices and desktops. Now with TrustPoint, organizations can extend the security and management of AirWatch-managed desktops.

Security and IT operations teams can find potential threats using TrustPoint, report them back to AirWatch and take action for automated compliance. Customers also benefit from having one vendor in VMware to secure and manage mobile, desktop and server environments.

Let us look at an example of the integration. An organization looks for unsigned applications on any Windows 10 device in its environment. Using TrustPoint, the security or IT operations team can run a query that will quickly find Windows 10 devices running these unsigned applications and tag them as compromised. Using AirWatch, the team defines a compliance policy to block VPN access from any compromised device. Any user using a device with an unsigned application will be blocked from connecting into the corporate network through VPN.

Security teams can take it a step further and set up different actions according to the various threat levels they define. This helps drive even stronger compliance and real-time threat containment across all endpoints in any environment.

The Next Era of Cybersecurity: It Is Time to Get Proactive

Other types of threats security teams need to focus on include rootkits, viruses, worms, trojans, adware and spyware. According to AV-Test:

Over 390,000 new malicious programs are registered every day.

Since viruses, worms, trojans and other types of malware have been around for decades, many organizations are still using tools from the &#lsquo;90s and 2000s to combat and remediate against old and new threats.

Signature-based security alone no longer helps, as 97% of malware is unique to a specific endpoint. Large organizations end up using dozens of point tools that cannot communicate with each other and do not provide a clear picture of overall security posture. TrustPoint can help address these inefficiencies.

Let&#rsquo;s say you identity a process as malicious and spreading through your environment, like a worm. Security teams can use TrustPoint to discover affected endpoints quickly by running a query that looks for a specific MD5 hash tied to the process. The team can then take action, such as quarantining the devices and then reimaging or uninstalling the app to bring the device back into compliance. You can further automate this process, so there is a continuous check for the malicious process.

We highlighted some of the top threats that cyber criminals use to expose enterprise organizations today. TrustPoint helps security and IT operations teams get visibility into their environment, so they can efficiently detect and remediate against these advanced threats and increase their security hygiene. With VMware ecosystem integrations, such as AirWatch, TrustPoint can give organizations a complete end-to-end security approach.

For more information on how TrustPoint can help you, visit vmware.com/products/trustpoint.html.

Because you liked this blog:

  • Mobile Leaks Are On the Rise: Should You Be Concerned?
  • New eBook: The Next 5 Big Things in Mobile Security
  • Bulletproof RDS: 30 Ways to Secure Remote Desktop Services

The post Tackling the Top Threats in Cybersecurity with VMware TrustPoint appeared first on VMware End-User Computing Blog.

Read more..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 17 bytes)
in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 2022

Query Monitor