MOBILE DEVICE MANAGEMENT

MOBILE DEVICE MANAGEMENT

Manage and Secure your Mobile Resources

Extending Perimeter Security. IT administrators face challenges securing and managing security as their workforce becomes increasingly mobile. Executives demand greater use of BYOD devices to curtail costs and maximise flexibility but expect IT staff to provide full security to widely dispersed employees or business partners. Securite provides solutions that meet different requirements and varied features that suit heterogeneous environments.

  • Securite partner XenMobile from Citrix
  • MobileIron partners with Securite in Australia
  • Securite offers Palo Alto's GlobalProtect in Australia

Palo Alto GlobalProtect

Your mobile workforce is on the move but how do you protect your employees from security threats when they are not securely within the confines of your perimeter? Extend the protection of the Palo Alto Networks® Next-Generation Security Platform to your mobile workforce by using GlobalProtect to maintain visibility of traffic and enforcement of security policy for protection against all threats.

  • You can’t secure what you can’t observe and GlobalProtect provides administrators with full visibility into application traffic, across all ports, in real-time
  • GlobalProtect establishes consistency by enforcing security policy using the security platform to evaluate all traffic
  • Deploy GlobalProtect using any mix of physical and virtual appliances in the private or public cloud to protect your mobile workforce. Support for VM-Series in AWS and many other cloud platforms is supported

ResourcesData Sheet

Citrix XenMobile

XenMobile delivers mobile device management, mobile application management and mobile content management to your users across the Enterprise. It also acts as a secure network gateway and provides enterprise-grade mobile productivity apps in one comprehensive solution. XenMobile enhances the user experience on BYO endpoints or corporate devices, without compromising your organisation’s security.

  • Mobile productivity: increase employee productivity on BYO or corporate devices, without compromising security
  • Security and compliance: provide end-to-end, enterprise-grade mobile device security for endpoint
  • Mobile device management: configure, secure, and support mobile devices remotely
  • Mobile application management:protect your information at the app level and ensure enterprise-grade management is applied to all endpoints

Resources

MobileIron

Secure, manage, and monitor any mobile device that accesses confidential business data. MobileIron’s mobile device management (MDM) capabilities give you granular visibility into endpoint activity and adds the controls needed to securely deploy, manage, and replace or retire devices as needed.

  • MDM software offers automated provisioning that helps reduce service desk calls with automated device setup. Registered devices are automatically configured with corporate connectivity settings, email profiles, and device-specific restrictions with a few clicks
  • Help users instantly connect over corporate Wi-Fi and VPN profiles with support for Exchange, POP, and IMAP account types. Rapidly deploy required enterprise apps and enforce policy
  • MobileIron’s identity and access management capabilities give authorised users secure access to business resources without requiring them to re­enter passwords, manually establish VPN connections or perform other other disruptive tasks. IT administrator’s benefit by maintaining complete visibility and control over devices that access sensitive corporate information
  • ResourcesData Sheet