Showing posts with label MDM. Show all posts
Showing posts with label MDM. Show all posts

Thursday, September 17, 2015

Alcatel-Lucent Acquires Mformation for Mobile Device Management

Alcatel-Lucent has acquired privately-held Mformation, a provider of mobile device management solutions for mobile operators, service providers and enterprises. Financial terms were not disclosed.

Alcatel-Lucent said Mformation’s software products will extend and enhance the capabilities of its Motive Customer Experience Management (CEM) solution to provide service providers with an end-to-end, integrated and cost-efficient device management solution across home, mobile and enterprise networks.

Mformation, headquartered in Woodbridge, NJ, will be incorporated into Alcatel-Lucent’s IP Platforms organization, providing service providers and enterprises with a secure, scalable, application-independent IoT security and control platform for use across multiple industries including automotive, healthcare, utilities, manufacturing and the digital home.

Mformation was founded in 1999.  The company claims more than 20 service provider customers around the world, managing more than 500 million devices.

https://www.alcatel-lucent.com

Wednesday, April 1, 2015

Palo Alto Networks and VMware AirWatch Target Mobile Security

Palo Alto Networks and VMware are extending their strategic partnership by integrating their enterprise security and mobile management technologies to give organizations a rich and unique combination of mobile device management (MDM) with advanced threat prevention for secure enterprise BYOD support.

The partnership bring together Palo Alto Networks' Next-Generation Firewall, WildFire and GlobalProtect technologies with the AirWatch by VMware Enterprise Mobility Management platform.  The solution helps customers enforce security policy to protect networks from unauthorized or infected devices, provides the appropriate level of access to apps and data for mobile users, and enables mobile devices to be properly configured for business use and connection to a global threat intelligence service.

Detailed capabilities include:

  • Malware Detection:  Palo Alto Networks WildFire security subscription service identifies known and previously unknown mobile malware. By integrating the intelligence provided by WildFire, users can identify infected applications and take immediate and automated action for security and containment, such as creating an application blacklist. 
  • Network Protection:  Organizations need to make sure only approved devices are used with sensitive applications and networks; this is accomplished with Palo Alto Networks GlobalProtect Host Information Profile (HIP), a direct tie between information about the mobile device, its configuration and what data and applications the device can access. 
  • VPN and Network Security:  Palo Alto Networks GlobalProtect provides a secure connection between AirWatch managed mobile devices and the Palo Alto Networks Next-Generation Firewall at the device or application level utilizing per-app VPN. This allows consistent inspection of traffic and enforcement of network security policy for threat prevention, wherever the user goes.

The Palo Alto Networks GlobalProtect iOS VPN app deployed by AirWatch is now available.

https://www.paloaltonetworks.com/products/technologies.html
http://www.air-watch.com


  • In 2014, Palo Alto Networks and VMware announced a software-defined data center reseller agreement and network security and network virtualization solutions.


Wednesday, September 17, 2014

Spirent Acquires Mobilethink for MDM Expertise

Spirent Communications has acquired Mobilethink A/S and its wholly owned subsidiary, Tweakker, for US$20 million in cash.

Headquartered in Aarhus, Denmark, Mobilethink is a provider of mobile device management, device analytics and intelligence solutions for mobile operators. Tweakker is a cloud-based mobile device configuration solution specifically targeted at Mobile Virtual Network Operators (MVNOs).  The solutions allow operators to correctly detect mobile devices, configure them for data usage, analyze device population trends, and run marketing campaigns with the goal of increasing average revenue per user (ARPU).

Eric Hutchinson, CEO of Spirent commented: “Hosted and cloud-enabled device intelligence solutions give operators and MVNOs the ability to significantly improve subscriber’s service experience. The acquisition of Mobilethink combined with Spirent’s extensive portfolio of mobile device performance and customer experience management solutions will help drive our overall growth with additional recurring revenue potential.”
“Mobilethink has been part of the Mobile Device Management (MDM) market for over a decade and the core of the business is about enabling mobile operators of all types to seamlessly deliver services to their customers,” said Lars Houbak, CEO of Mobilethink. “Mobilethink along with Tweakker will provide Spirent customers a more comprehensive and intuitive way to better manage and improve the subscriber’s device experience.”

http://www.spirent.com/

Thursday, May 22, 2014

Absolute Software Delivers Persistent Client for BYOD Security

Absolute Software, which offers a persistent endpoint security and management module that can be embedded in the firmware of computers, laptops, tablets and smartphones, announced full BYOD support for Mac and Windows computers.

Absolute persistence technology is built into the BIOS or firmware of a device during the manufacturing process. Once activated, customers who purchase these devices benefit from an extra level of security.

The company said its latest Absolute Manage 6.5 will provide enrollment workflows as well as remote and automated security protocols for corporate and employee-owned devices, including smartphones, tablets and laptops. In addition, integration with Cisco’s Identity Service Engine (ISE) provides an increased level of network security. If a computer or mobile device attempts to access the network, its compliance status is automatically checked against company policy. This ensures all devices on the network are configured appropriately, including Absolute Manage enrollment. If a device is not already enrolled, ISE can redirect it to complete enrollment before allowing access.

“Many of our customers are receiving requests from employees to bring their personally-owned devices to work. But corporate IT doesn’t want to use multiple consoles and products to secure this range of form factors. With this release, Absolute Manage will be the only solution on the market to offer full BYOD capabilities for all devices. Our customers can count on us to provide them with the support they need to manage all the devices that enter their network,” said Errol Olsen, Interim CEO at Absolute Software. “The release of Absolute Manage 6.5 will support the Absolute Unified IT vision, allowing IT to manage all employee-owned devices from a single console.”

http://www.absolute.com

Saturday, April 26, 2014

Infonetics: Mobile Device Security Software to Hit $3.4 Billion in '18

Worldwide revenue for mobile device security client software is up 10% sequentially in 4Q13, to $385 million, and is projected to continue to grow rapidly in coming years, according to a new report from Infonetics Research.

“The triple threat of bring-your-own-device (BYOD) as a dominant enterprise trend, an increasingly hostile threat environment, and the deluge of frightening revelations about privacy courtesy of the NSA is forcing enterprises and consumers to invest real money in mobile device security. The mobile device security software market grew 40% to cross the billion-dollar mark in 2013 and we expect it to grow to $3.4 billion in 2018,” says Jeff Wilson, principal analyst for security at Infonetics Research.

Some additional highlights of the report:


  • Asia Pacific accounted for 34% of security client revenue in 2013, followed closely by North America (32%) and EMEA (31%); Latin America came in a very distant fourth
  • Though North America greatly lags behind EMEA and Asia Pacific in total smartphone shipments, it has strong security client adoption relative to the other regions
  • In 2013, enterprise mobile clients comprised 51% of the total security client market, while consumer mobile security clients made up 49%.

http://www.infonetics.com

Wednesday, January 22, 2014

VMware to Acquire AirWatch for Mobile Mgt. & Security

VMware agreed to acquire AirWatch, a leading supplier of enterprise mobile management and security solutions, for approximately $1.175 billion in cash and approximately $365 million of installment payments and assumed unvested equity.

AirWatch, which is headquartered in Atlanta, offer Mobile Device Management, Mobile Application Management and Mobile Content Management. It claims more than 10,000 customers globally and has about 1,600 employees across nine global offices.  AirWatch is privately-held.

VMware said the acquisition expands its End-User Computing group.  The AirWatch team will continue to report to founder and chief executive officer John Marshall as part of VMware's End-User Computing group, led by Sanjay Poonen, EVP and GM. Alan Dabbiere, AirWatch's co-founder and chairman, will be overseeing a new AirWatch operating board which will report to Pat Gelsinger, VMware CEO.

The acquisition will be funded through a combination of balance sheet cash and proceeds from approximately $1B of additional debt to be provided by EMC. VMware will also continue with its ongoing share buyback program.

"Our vision is to provide a secure virtual workspace that allows end users to work at the speed of life," said Sanjay Poonen, EVP and GM of VMware's End-User Computing group. "The combination of AirWatch and VMware will enable us to deliver unprecedented value to our customers and partners across their desktop and mobile environments."

http://www.vmware.com
http://www.air-watch.com

  • VMware also announced preliminary Q4 2013 financial results for the fourth quarter of 2013:  the company now expects Q4 2013 revenues to be $1.48 billion, an increase of 15% from the fourth quarter of 2012. Excluding revenues attributable to Pivotal Software Inc. and all divestitures that occurred in 2013, revenues for the fourth quarter are expected to have increased 20% from the fourth quarter of 2012.

    "I'm delighted with our overall Q4 performance, with total revenue expected to exceed the high end of our guidance range," said Jonathan Chadwick, chief financial officer and executive vice president, VMware.
  • In February 2013, AirWatch received $200 million in Series A funding.  Investors included Accel Partners and Insight Venture Partners.  


Thursday, November 14, 2013

IBM to Acquire Fiberlink for Cloud-Based Mobile Management and Security

IBM agreed to acquire Fiberlink Communications, a mobile management and security company based in Blue Bell, Pennslyvania, for an undisclosed sum.

Fiberlink's MaaS360 is an enterprise mobility management (EMM) platform encompassing:

  • Mobile Device Management
  • Mobile Application Management
  • Mobile Content Management
  • Secure Mail
  • Secure Browser
  • Mobile Expense Management
  • Laptop Management

IBM said Fiberlink’s MaaS360 cloud-based offerings will enable it to deliver a complete mobile management and security solution via IBM MobileFirst, which includes trusted transactions and security intelligence capabilities for mobile apps, users, content and data.

“In a mobile first world, clients require a comprehensive mobile management and security offering. Often times they integrate solutions on their own and take on unnecessary risk,” said Robert LeBlanc, IBM senior vice president, Middleware Software. “To protect and enhance the complete mobile experience, it’s crucial to secure the app, user, content, data and the transaction. The acquisition of Fiberlink will enable us to offer these expanded capabilities to our clients, making it simple and quick to unlock the full potential of mobility.”

“While the proliferation of mobile devices provides great flexibility and agility for organizations, it also increases the complexity to manage and protect corporate data,” said Jim Sheward, CEO, Fiberlink. “We are looking forward to becoming part of IBM’s strategy to put mobile first and deliver holistic mobile device and app management and security for today’s always-connected workforce.”

http://www.maas360.com/
http://www.ibm.com

Wednesday, May 29, 2013

AT&T Mobile Workplace Offers Remote Content Access/Editing/Sharing

AT&T launched a cloud-based service designed to simplify how businesses access and share content with coworkers and teams across multiple mobile devices.

AT&T Mobile Workplace enables employees to seamlessly access, share, edit and create content through their mobile devices.  Key capabilities:

  • Store, share and view content from the cloud
  • Create, edit and annotate documents
  • Access the service from virtually any mobile device
  • Automatic sync for up-to-date company content across multiple devices
  • Link multiple devices and computers to the service

"The use of mobile devices continues to be a key tool for SMBs as they look to manage and expand their operations," said Lou Delery, AT&T Senior Vice President of Small Business Marketing. "Our new Mobile Workplace solution puts the work experience at the fingertips of employees regardless of where they are and allows small businesses to become more productive."

AT&T Mobile Workplace is available as a web-based solution supported by a desktop agent or mobile application that can be accessed and synched on web-connected devices. Business content can be viewed online or offline, enabling continued work even while in transit. The service can be self-installed and is backed by 24/7 U.S.-based remote, technical support from AT&T as needed.

Pricing of AT&T Mobile Workplace starts at $6 per user per month for the Basic service package subscription. Each subscription includes cloud storage ranging from 25 GB to 100 GB.

http://www.att.com
http://attmobileworkplace.att.com


Wednesday, May 22, 2013

Citrix Debuts XenMobile Enterprise Mobile Device and App Management

Citrix introduced XenMobile Enterprise, an integrated solution combining mobile device, app and data management, a unified corporate app store, mobile productivity apps and “one-touch” live support.

XenMobile Enterprise includes MDM tools for configuring, securing and provisionig mobile devices in an enterprise. Citrix is also including email, calendaring and web browsing, as well as secure document sharing, syncing and editing. It also integrates ShareFile, which allows users to view, edit and share data within a secure container on their mobile device. In addition, there is one-click access in the smartphone client, to the Citrix GoToAssist Service Desk and Remote Support, which  helps IT teams support corporate users.

Citrix also announced a mobile app market built for XenMobile.  Initially. Citrix will have over 80 apps from leading mobile app vendors. 

XenMobile Enterprise will be available in June 2013. 

Tuesday, May 14, 2013

SAP Unveils Mobile Secure with AWS, Capgemini, Mocana


SAP unveiled a cloud-based enterprise mobility management solution that enables IT organizations to manage and secure corporate and personally-owned devices.

The cloud edition of the SAP® Afaria mobile device management solution was introduced at the company's SAPPHIRE NOW event in Orlando, Florida, with partners including Amazon Web Services, Capgemini, and Mocana.

SAP Afaria, cloud edition, provides analytic dashboards from the SAP BusinessObjects portfolio giving customers instant insight into device compliance and usage for Android, iOS and Windows Phone 8.

“Enterprises are using AWS for every imaginable use case, and it’s been exciting to see the acceleration of SAP applications being run on AWS,” said Andy Jassy, senior vice president, AWS. “Powering SAP Afaria, cloud edition, on AWS is a natural extension of the strong and expanding relationship we have with SAP, as we work together to help enterprises manage their mobile devices in a scalable, low-cost and robust fashion.”

“Cyber security is increasingly a board room priority, and as such, iron-clad mobile security is job one for all CIOs and CISOs to execute their mobile strategy,” said Sanjay Poonen, president of Technology Solutions and the Mobile Division, SAP.

http://www.sapmobilesecure.com

Thursday, January 3, 2013

Understanding the Full Scope of the BYOD Opportunity for Carriers

by Ray Greenan, Global Marketing Director, Symantec Communications Service Providers


Over the past couple of years mobility has become one of the most important business and IT strategy topics, and the focus on it is only going to increase in 2013. It has also become increasingly difficult to have a discussion on business mobility without it including the bring your own device, or BYOD trend.

In fact, recent research by analyst firm Ovum indicates that by 2017, there will be 443,939,000 BYOD mobile connections worldwide. This number is impressive on its own, but is even more striking when it is compared to Ovum’s estimate that there will be 532,778,000 corporate-liable mobile connections worldwide by 2017 as well. Thus, in just five years from now there will be nearly as many employee-liable devices moving in and out of corporate networks as there will be corporate-liable devices.

At first glance, the concept of BYOD is quite simple: Allow employees to supply their own devices, thereby increasing employee satisfaction and hopefully reducing capital – and perhaps even operational – expenditures. Generally, and especially for the purposes of this article, the “device” in BYOD refers to mobile devices, particularly carrier network-connected connected smartphones and tablets.

However, for all its potential benefits BYOD also creates security and management challenges. After all, at the end of the day, BYOD involves IT relinquishing at least some control over the devices connecting to corporate networks, resources and data. As always, there is some risk when relinquishing any such control.

Because of this, impressions of BYOD range from company to company, with some embracing it wholeheartedly, some remaining cautiously optimistic and some still approaching the topic with outright reproach. That said, there is also a common belief among nearly all of these organizations: BYOD in some form or another is largely inevitable.

Nonetheless, companies realize that BYOD within their organizations is going to happen whether they promote it or not, thus many are coming to the conclusion that they can at least make it on their terms. This involves efficient enabling of employee-liable devices, establishing strong policies for their acceptable use and utilizing technology to enforce those policies and secure mobile devices against a myriad of threats, from loss or theft to malware.

When all of this is taken into account, there are many companies that simply either cannot or do not want to assume this burden. Some of these are enterprise-class organizations that are finding it more financially viable to outsource the management of their mobile infrastructure, while many others are small- to medium-sized companies who do not have the resources. After all, SMBs often already have their hands full with managing the demands of their traditional IT infrastructure and endpoints. Add mobility and BYOD to the mix and often overtaxed IT staffs become spread even thinner.

This is all excellent news for the wireless telecommunications industry. Why? Because herein lies a tremendous opportunity for carriers who have developed a trusted network to step into the role of managed service provider for companies such as those described here. And while some are already doing this to a degree, there is much more opportunity than first meets the eye. In fact, there are five specific areas of business mobility carriers should seek to address on behalf of their customers. 

These include:

App and Data Protection
Business data must be protected at all times. This is a primary objective of any IT organization, and the reason that most IT technologies exist in the first place.  Mobile apps are the primary method to access, view, store and transmit that data, so both apps and data must have controls and protection appropriate to the company and industry.

User and App Access
At all times, the people, the apps and the devices that are connecting to, and accessing, business assets must be identified and validated as authorized business participants. Identity is the first and most important component to any IT strategy, especially where mobility is involved because device and cloud access is not inherently as strict.

Device Management
Devices that access business assets and connect to company networks must be managed and secured according to applicable company policies and industry regulations. Every company should establish appropriate mobile policies, and those should be applied to all managed devices.

Threat Protection
With the incredible growth of mobile devices, they are rapidly becoming a key target for cyber criminals. Protecting devices and the apps and data on them is paramount to secure business data. Good threat protection should protect from external attacks, rogue apps, unsafe browsing and theft.

Secure File Sharing
Although mobile access, storage and sharing of files is not a challenge unique to mobile, the fact that a mobile device is typically one of multiple devices a user may have, the cloud is the obvious and simple solution for distributing and synchronizing information across devices. Businesses should have full administrative control over distribution and access to business documents on any network, and especially in the cloud.

While some carriers have begun to step into the role of managed service provider in some of the areas above, none have addressed all five areas. They are not offering a holistic managed security and management experience. Carriers would do well to expand their services offerings and the mobile security and management market has matured to the point where effective, scalable solutions are available to help them do this. Doing so will not only benefit their customers, but their bottom lines as well.

About the Author


Ray Greenan, Global Marketing Director, Symantec Communications Service Providers, is responsible for strategy and implementation of Symantec marketing solutions designed to help Communication Service Providers transform their networks and businesses to deliver new applications and services to their customers in a secure and reliable way.

Prior to his current position, Greenan spent 14 years at IBM where he held multiple positions including Global Marketing Executive, Service Delivery Platforms which focused on IBM's Service Provider Delivery Environment, SPDE and Marketing Program Director for the IBM Green Data Center group which focused on Green Technology and Sustainability for the Utility market and its customers. He also held the position of Power Marketing Program Director responsible for strategy and execution of marketing programs for the Greater China Region for IBM¹s Power Architecture and
IBM's membership within Power.org.

Greenan was awarded a Masters in Business Administration in Management Information Systems from Manhattan College, where he also received his Bachelor of Arts in English. He has also earned certification from NJIT for Sustainable Design and Green Technology.
About Symantec


Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment - from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

Sunday, August 19, 2012

AT&T Launches Cloud-hosted Mobile Device Management for Small Businesses

AT&T has expanded its cloud-based Mobile Device Management (MDM) offering with solutions for small businesses. MDM allow small businesses to proactively manage employees� mobile devices and data usage, making it easier for the company to enforce management policies while still empowering workers with mobile access. The cloud-based MDM solutions means small business owners don�t need to invest in installing hardware to support the service because it�s hosted and managed by AT&T.

AT&T Mobile Device Management solutions, available for small businesses with as few as 20 employees, offer:
  • Lost device detection, including password recovery, device lock, wipe, and encryption

  • Remote configuration of email, Wi-Fi, and Virtual Private Networks (VPNs)

  • Asset management features that enable business owners to keep track of company-owned devices

  • App distribution capabilities that allow business owners to push mission-critical apps to their employees

  • App whitelist/blacklist capabilities help control how company-owned smartphones are used
http://www.att.com/MDM