2015 Solutions Review MDM Buyers Guide MRC75

26
Mobile Device Management Solutions Buyer’s Guide Includes a Category Overview The Top 10 Questions to Ask Plus a Capabilities Reference of the Leading 20 Providers for Mobile Device Management Solutions

description

MDM buyers guide

Transcript of 2015 Solutions Review MDM Buyers Guide MRC75

Page 1: 2015 Solutions Review MDM Buyers Guide MRC75

Mobile Device Management Solutions Buyer’s Guide

Includes a Category Overview The Top 10 Questions to Ask

Plus a Capabilities Reference of the Leading 20 Providers for

Mobile Device Management Solutions

Page 2: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

2

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

2

INTRODUCTION:

In this Buyers Guide, Solutions Review has chosen to highlight Mobile Device Management (MDM) because the recent explosion of mobile devices has caused a seismic shift in how IT executives need to think about their networks. The end user – whether they are employees or students – is demanding access to networks via mobile devices and the amount of applications and data they expect to access is growing at an alarming rate. In addition, the scope of mobility management solutions is growing as well. In the past, the broadly accepted category name has been Mobile Device Management (MDM), an extension of additional functionality has resulted in a redefinition of the technology category as Enterprise Mobility Management. In your search for an MDM provider you will come to realize that many of the leading solutions now offer multiple and bundled mobility components including:

1. Mobile Device Management (MDM) 2. Mobile Application Management (MAM) 3. Mobile Content/Email Management 4. Mobile Collaboration 5. Policy and Configuration Management

With all these changes in the technology and business practices one thing remains constant: The importance and necessity for IT managers to monitor track and secure business critical information being accessed through mobile devices. A task made even more daunting by the wide variety of mobile applications and operating systems that need to be considered. It is that complexity coupled with the necessity to manage and secure the range of devices that has led to a growing MDM solution sophistication. Today, there are numerous companies offering solutions for a host of organizational needs and for the different end-devices being utilized within. The Solutions Review Mobile Device Management Buyers Guide consolidates, organizes, and presents information from the top 20 MDM service providers so you can see what they offer and what they don’t, what kind of enterprise they best provide for and if they are a good fit for you. Instead of chasing each product to web page after web page of marketing lingo and vague bullet points, Solutions Review consolidates the facts and unbiasedly presents them to you so you can make the best decision and move forward with the right solution and not waste your time with any of the wrong ones. Matthew Adamson Editor Solutions Review [email protected] (339) 927-9237

Page 3: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

3

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

3

5 Questions You Should Ask Yourself Before Selecting a Mobile Device Management Solution

QUESTION #1 How sophisticated is our mobile environment / strategy?

Enterprise mobility has grown so rapidly over the past two years that mobile devices are becoming staples in everyday business processes that go beyond simple email and communication capabilities. Employees are accessing data and information through device centric formats and displays more and more, leaving that data more vulnerable to theft or loss. You need to understand how and at what level your organization is utilizing mobile devices.

As enterprise mobility has grown, so have the solutions that allow for mobility management. More and more technology firms are offering mobile solutions that include, but go beyond traditional MDM and address application management, content/data management and expense management wrapping all of these capabilities up into what the industry is referring to as Enterprise Mobility Management (EMM).

Reflect on the current status of your mobile environment and even look into the future. If your mobility management needs go beyond focusing on only the hardware and application and cost concerns that exist, than the more comprehensive EMM solution should be considered. While MDM will always be a pillar in the larger mobility solution it cannot offer all the security function needed to keep up with the growing sophistication of today’s enterprise mobility environments.

QUESTION #2 How will this new level of security and management impact employees?

As Bring Your Own Device (BYOD) programs grow and mobile strategies continue to mature, the line between personal and work life becomes increasingly blurry. Any level of enterprise mobility calls for security and management, and with that comes a view into what a device is doing, where it is located and what is stored on the device. Understandably, employee concerns around privacy crop up possibly leading to rejection of mobility programs or non-compliance around policy.

While this view into an employee life through their mobile device is almost unavoidable it certainly can and should be handled a certain way. Clear and understandable policies outlining both dos and don’ts as well the capabilities of IT through these management solutions need to be communicated plainly and undoubtedly. Employees will experience benefits, productivity and convenience through increased mobility however; those benefits will be outweighed by a feeling of loss of privacy if management is not handled correctly.

QUESTION #3 Do I have the internal IT resources to manage and maintain an MDM solution?

There is no arguing that most IT departments are spread thin already and adding a comprehensive enterprise mobility strategy to the mix will only compound their burden. Special aspects of your business may require special features. If you have employees who travel frequently, for instance, you may require a feature called Geo-fencing, which blocks or allows apps and access based on where that employee is on the globe. Also consider just whose devices you need to manage. Employees? CEOs? Students? Guests? Different kinds of end users will have different needs and present a variety of security risks, thus requiring different capabilities from an EMM solution.

IT will be responsible for securing devices, application and the data stored on both all the while keeping up with compliance needs and regulations such as PCI, HIPAA, HITCH and Sarbanes-Oxely. EMM solutions are meant to alleviate some of the management burden mobility brings, but first evaluate your internal team and understand what they can handle. EMM can save time, effort and money in the long run but if the right solution for you internal team and capabilities is not selected it can become clunky and cost prohibitive.

Page 4: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

4

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

4

QUESTION #4 How will we ensure compliance and decrease risk?

Monitoring tools or asset tracking can help you maintain a certain level of compliance, but some of these functions are more reactive then proactive. Waivers, forms and policy agreements are typically needed before access to the network and corporate data is granted. To truly ensure compliance and policy integrity we believe that communication and education is the best policy. Through seminars, courses or information sessions you can clearly outline, define and reinforce policies and guidelines. By laying everything out on the table and communicating rules and regulations directly to the end users, you can feel better about there being a true understanding of you mobile policies.

QUESTION #5 What specification will our enterprise mobility policy entail and what MDM functions will we utilize?

Answering this question will provide the dos, don’ts and actual functions your mobile devices can perform. These security policies will be the backbone of your mobile strategy and have a major impact on the safety of your corporate data. You will want to look at and determine how each of these functions will impact your mobile strategy, data security and device utilization: Password policy control, device and data encryption, port control (Wi-Fi, Bluetooth, camera), remote lock/unlock/wipe, asset tracking, device configuration (VPN, email), application delivery and control, black/white listing and audit, monitoring and reporting.

Remember that your enterprise mobility policy should never be a “set it and forget it” task. The policy needs to be constantly monitored, tweaked and tailored to the current environment. We can almost ensure that your mobile strategy will mature over time as technology improves, as your employees become more tech savvy and the benefits of mobility are realized. The need for new and more comprehensive security and management solution will arise and your mobile policy will need to adapt and keep pace with all those changes.

And 5 Questions You Should Ask Your Mobile Device Management Provider

QUESTION #6 How hard will to be to integrate your MDM solution into my existing infrastructure?

Once you figure out the type of architecture that might work best it is important to understand how that architecture will be implemented into your current infrastructure. As stated before, the architecture and integration should fit into what is currently in place and already helping you to achieve your overall objectives, not vice versa. Mobility implementations can be difficult enough on a small scale never mind looking at a large multi-unit organization. That is why it is important to truly understand how a MDM solution will integrate with what is currently in place and what the entire implementation process looks like before getting started. Look for solutions with simple installation requirements, distributed control, and scalability suitable for your organizations size and structure.

QUESTION #7 How flexible is the MDM architecture and solution?

Technology is continually changing and that has never been more the case than with today’s mobile devices. New operating systems, device features or capabilities seem to enter the market on a monthly basis. These devices are actually evolving faster than the MDM solutions enterprises are using to manage and secure them. That is why it will be very important for you to find out how adaptable, flexible and scalable a provider’s solution is. Choosing a solution that isn’t designed to be flexible will become a real problem as new mobile devices become part of the mix. Keep in mind your needs for the future as switching solutions may prove to be a barrier.

Page 5: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

5

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

5

QUESTION #8 What aspects of mobility do I need to manage?

Enterprise Mobility Management consists of a lot of different pieces. From the actual mobile devices themselves to the physical network and everything in between, including mobile device and application management, WLAN solutions and BYOD policies, the complexity of making all these pieces work together can overwhelm. If you can reduce that complexity by only managing what actually needs management, you can help ensure success, but doing any less could guarantee failure. Additionally, you need to consider whether to approach the process with an aim to achieve best of suite, in other words, shop for the best single solution that covers everything, or best of breed, where you look for the best solution for each particular area of mobility and then try to integrate them all together.

QUESTION #9 How do you maintain or improve the user’s experience?

User experience with many MDM solutions has often come up short. A poor user experience can be more than just a nuisance for the employees of your company. If employees start finding ways around the rules you have set and technology you have implemented because they are too inconvenient, you may find yourself with security breaches you hadn’t anticipated in addition to the potential for decreased productivity.

QUESTION #10 With the rise in BYOD, does your solution offer containerization in the even remediation activities

are needed?

BYOD offers great options for employees, but it can also present a tough mix of personal and corporate data for IT to have to manage. In the instance of device exceptions (conditions that indicate tampering, client side MDM failure, etc.) actions such as remote wiping or locking may need to be taken. On a device where data is not separated in corporate and personal containers all can be lost, Solutions offering containerization can help prevent some of the issues organizations face when allowing for BYOD.

And a few more MDM Strategy and Issues to Keep in Mind:

Determine the type of devices that the company or organization will support whether that company/organization issued or employee own devices.

Be sure to align the chosen devices with the level of security need to secure and protect data and make sure they can handle that level.

Create strong policies and security standards. Enforce policies and standard but be sure to communicate those clearly to employees.

Remember to keep in mind legal implications and structure the MDM (and BYOD) strategy and policies in accordance.

Do not expect 100% acceptance and be ready to communicate, educate and train on best practices and device capabilities.

Structure you MDM strategy to allow it to scale and adapt – technology is ever changing. Below is a list and Summary Information on 20 of the Top Enterprise Mobility Solution Providers. If you have any questions regarding this list or the topic of Mobile Device Management, please feel free to call (339) 927-9234.

Page 6: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

6

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

6

Solution Provider Profiles

Fiberlink / IBM ________________________________________________________________________________________ 7

Centrify ________________________________________________________________________________________ 8

FileWave ________________________________________________________________________________________ 9

LANDesk ______________________________________________________________________________________ 10

BlackBerry ______________________________________________________________________________________ 11

Airwatch ______________________________________________________________________________________ 12

SOTI ______________________________________________________________________________________ 13

Globo ______________________________________________________________________________________ 14

MobileIron ______________________________________________________________________________________ 15

Good Technology ______________________________________________________________________________________ 16

Sophos ______________________________________________________________________________________ 17

FancyFon ______________________________________________________________________________________ 18

Dell ______________________________________________________________________________________ 19

Amtel ______________________________________________________________________________________ 20

Symantec ______________________________________________________________________________________ 21

Citrix ______________________________________________________________________________________ 22

Tangoe ______________________________________________________________________________________ 23

Microsoft ______________________________________________________________________________________ 24

CA Technologies ______________________________________________________________________________________ 25

Absolute Software ______________________________________________________________________________________ 26

Page 7: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

7

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

7

Fiberlink MaaS360

MaaS360 lets you provision, secure and manage your mobile devices, apps and content—all from a single portal—while minimizing risk to your organization. MaaS360 provides dynamic, end-to-end security and compliance management capabilities to continuously monitor devices and take action. It delivers the ability to diagnose and resolve device, user or application issues in real-time from a web-based portal; offering complete IT visibility and control, and ensuring optimum mobile user productivity.

MaaS360 provides a unified mobile device management console for smartphones and tablets with centralized policy and control across multiple platforms. Dashboards deliver an interactive, graphical summary of your mobile device management operations and compliance allowing IT to report in real-time across the entire enterprise.

Environment: MaaS360 is available on-premise or as a cloud-based solution.

OS Support: Android, iOS, Samsung, Amazon Fire OS, BlackBerry, Windows Phone and Symbian.

Key Features

Mobile Application Management (MAM) - MaaS360 simplifies mobile application management by delivering an easy-to-use enterprise app catalog with full security and operational lifecycle management of apps across mobile device platforms. Protect enterprise apps with full containerization, increase employee productivity and satisfaction, and centrally manage mobile apps with web-based console.

Application Security- Enables an application container for your enterprise and third-party applications with full operational and security management for iOS and Android. Enforce authentication, provide access control across MaaS360 contained applications, and configure data leak prevention (DLP) controls.

Mobile Threat Management- Delivers a system to protect against mobile malware on iOS and Android devices. You can gain visibility of these mobile risks and remediate the threats before they compromise your enterprise data. Detect apps with malware signatures from a continually updated database, and proactively manage mobile threats in real-time.

Mobile Enterprise Gateway- Enables collaboration while securing your content with authorization, encryption and containerization policies. It's easy to set up, configure and maintain without additional hardware in your IT environment. Protect sensitive corporate data with security policies, including authorization, encryption and data leak prevention (DLP) controls and provide access without requiring changes to your network or firewall security configuration.

Mobile Expense Management- Enables organizations to set corporate-wide expense policies, and to proactively monitor and track mobile data and application usage. Enterprises can now optimize their mobile spend and shift the accountability more to the business and individual employees.

Secure Document Sharing- Gives users access to business documents on mobile devices while providing total manageability and control in a secure, encrypted container. Each document can have its own security policy and be distributed to all users, groups, or individual devices, creating a highly personalized and compliant experience for each employee.

Bottom Line

Fiberlink MaaS360 can do very well for large enterprises. Since they owned by IBM, MaaS360 is constantly being developed up to IBM standards and is compatible with other IBM products. Users have said that the interface is pleasant and easy to use for both administrators and end-users. It’s recent move to offer on-premise as well as a cloud-based solution, make it appealing to a wider user base.

1787 Sentry Parkway West

Building 18, Suite 200

Blue Bell, PA 19422

United States

+1 (855) 611-7360

www.mass360.com

Page 8: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

8

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

8

Centrify Identity Service

Centrify is a leading provider of solutions for unifying identity management across cloud, mobile and data center IT environments. Centrify software and cloud services let organizations securely leverage their existing infrastructure to centrally manage a wide range of identity-related IT activities—such as authentication, access control, privilege management, policy enforcement and compliance—across both cloud and data center based resources.

Centrify is a complete Enterprise Mobility Management offering integrated with Identity Management. Its MDM offering allows you to automatically push email, Wi-Fi and VPN settings, and ensure device compliance. Manage passcodes, remotely lock and wipe, and leverage device posture for app SSO policy.

Environment: Centrify is available as a cloud-based solution.

OS Support: iOS, Android.

Active Directory or Cloud-Based Device Management

Centralized administration within Active Directory or the Centrify Policy Service of all device security settings, profiles, certificates and restrictions

Group Policy-based management and enforcement of security settings, device and application

Device assignment to an Active Directory user associates each device to a unique user credential in Active Directory

Automated de-provisioning occurs when an Active Directory user account is disabled or deleted.

Group-based enrollment ensures only members of a specific domain or user group can enroll mobile devices.

Self-Service and Automation

Web or mobile application-based self-service enrollment enables the rapid deployment of mobile security and management across many devices.

Automated certificate enrollment secures access to Exchange, VPN and Wi-Fi connections, ensuring only assigned users can access sensitive corporate information.

Unified Platform for Mobile Device, Mac OS X and More

Support for multiple device platforms and release levels ensures secure management across all devices.

Centralizes management of your devices and systems and applications. Centrify also manages 450 versions of UNIX, Linux and Mac OS X systems and applications, providing a unified access management platform that further secures corporate resources compared to single-purpose mobile point products.

Inventory Devices and Even Detect Jail-broken

An inventory of devices across your entire enterprise, organized by group or role, lets you easily track and enforce the status of both company-owned and user-owned devices.

An inventory of applications across your entire enterprise, organized by user, group, or device OS, ensures only authorized applications are installed for the approved users.

Bottom Line

Centrify delivers a solution that secures and manages not only popular mobile devices but Mac OS X, UNIX and Linux systems as well. Centrify for Mobile’s cloud-based service lets you centrally secure and manage smart phones and tablets using your existing Active Directory infrastructure. Centrify for Mobile uses Group Policy tools together with the Centrify Cloud Service to enforce security settings over a trusted, over-the-air connection and secure access to corporate network services.

Centrify Corporation

3393 Octavius Drive

Santa Clara, CA 95054

United States

+1 (669) 444-5200

www.centrify.com

Page 9: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

9

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

9

FileWave Mobile Device Management

FileWave has provided business, education, and government customers with industry-leading systems and mobile device management software to effectively, and efficiently, secure and manage devices, applications, and content from one easy-to-use console. With offices throughout the USA and Europe, FileWave provides worldwide support, when you need it.

FileWave manages app deployments, profile management, and functions such as resetting passwords, remote wipe, inject network settings, email configuration, blocks for Youtube, iMessage, Safari, iTunes, iBook Store, explicit content, AirPlay and more. Create profiles using FileWave's Profile Editor, drag them into the FileWave admin interface and make associations for iOS devices. These associations can be scheduled for convenient deployment downloads. FileWave also allows you to utilize Apple's Layered and Institution deployment models. FileWave is capable of managing all of the iOS devices in your environment and you can to set custom configuration options for different device types.

Environment: FileWave MDM is available on-premise or as a cloud-based solution.

OS Support: Android, iOS, Mac OSX, Windows

Key Features

Mobile Device Management (MDM)- FileWave allows you to manage iOS and Android devices within the same interface you use to manage Mac and Windows clients. FileWave supports Apple’s Mobile Device Management (MDM). Its Layered and Institution models and Configurator provide integration for app and profile deployment, resetting passwords, data protection, remote wipe, inventory reporting and more.

Seamless integration - Search the Apple Mobile App stores and associate specific apps to iOS mobiles devices. For Android they allow importing of .APK application files. There are two ways to make apps available to iOS and Android end-users. Both techniques are device specific, displaying only the apps you have associated to an individual mobile device or a group of mobile devices.

Managed Distribution - FileWave version 7 (and up) supports Apple's Managed Distribution, allowing a FileWave administrator to assign apps to specific user accounts regardless of the Apple ID they used to setup the iOS device. Managed distribution allows for revoking apps, so an institution can retain ownership of their purchased applications.

Parameterized Profiles - system admins can create custom parameterized profiles containing a set of "wildcard" values that will autofill with the user's login information from LDAP directories, such as Active Directory, Open Directory, or eDirectory.

Cross Platform Imaging - Network imaging supported in Windows & OS X, layered deployment with filesets, supports new hardware deployments, local deployment workflow with Lightning and network deployment workflow with IVS.

Bottom Line

FileWave MDM is capable of supporting larger environments. Although they support both Android and iOS, the iOS support is stronger because of their support of Apple’s Mobile Device Management. FileWave also heavily supports modern classroom management for syncing classroom and BYOD devices.

10711 America Way

Fishers, IN 46038-7815

United States

+1 (817) 863-6282

www.filewave.com

Page 10: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

10

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

10

LANDesk Mobility Manager

LANDesk Mobility Manger helps IT administrators provide mobile workers access to the content and applications they need, while safeguarding corporate information. It makes mobile access easy for employees outside of the office and allows IT teams to control access to that information.

LANDesk is moving to help enterprise IT security teams accommodate modern user work styles by extending security from the mobile device itself to the content and applications. The mobility too does not manage devices, but the access mobile users have to the data without installing the LANDesk agent on the device.

Environment: Mobility Manager is available on premise or as a cloud-based solution.

OS Support- Android, iOS, Mac OS X, Windows, Windows Phone and BlackBerry.

Key Features

Secure Enterprise Mobile Applications- Offers App-Wrapping to secure individual corporate applications, eliminating the need for multiple user profiles while offering single sign-on access to users and one-click wrapping for administrators. Corporate applications are secured while mobile users gain easy access to the apps that they expect—both corporate and personal.

Mobile User Management- Mobility Manager is integrated with LANDesk Management Suite, so IT teams can use a single system while offering single sign-on access to users and one-click wrapping for administrators. This makes uniform delivery of policies easy and one-touch employee on-boarding a reality. You can administer policies once and propagate across all of the user’s devices, which ensures consistent security for IT teams and uniform user access across devices.

Corporate App Store Experience- The LANDesk Fuse mobile application provides users a secure place to access needed corporate information. IT teams can deliver a corporate app store experience, where mobile users can launch applications and stream access to corporate data.

Mobile Application Management- Push or pull applications to users’ devices and control access to documents and other content with LANDesk Mobility Manager. You can also blacklist or whitelist applications and set rules for URL access. Wipe corporate applications selectively to maintain security in the event that a device is lost or stolen.

BYOD and Ease of Use- LANDesk Mobility Manager helps your organization balance users’ needs for productivity anywhere with IT’s charter to provide secure mobility. BYOD integration allows, IT teams gain confidence that security measures are in place to safeguard corporate data consistently enterprise-wide, and mobile users benefit from a solution that respects the personal nature of their smart devices.

Bottom Line

LANDesk is a solution that fits most sized companies and does very well with larger ones. In 2012, LANDesk acquired Wavelink. These two products share the same code, but LANDesk Mobility Manager works with the LANDesk Management Suite (LDMS) which is a client management tool. Mobility Manager also offers integrated EMM and service desk and has strong converged endpoint management.

698 West 10000 South

Suite 500

South Jordan, UT 84095

United States

+1 (801) 208-1500

www.landesk.com

Page 11: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

11

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

11

BlackBerry BES 12

BES12 is a mobility management solution for secure device, application and content management, with integrated security and connectivity, for BlackBerry, iOS and Android. Deploy, manage and control both corporate and BYOD device users through a simple unified console.

BES12 is an MDM and EMM solution that will help you manage mobile devices for your organization to protect business information, keep mobile workers connected with the information that they need and provide administrators with efficient business tools.

Environment: BES12 is available on-premise or as a cloud-based solution.

OS Support: Blackberry 10, BlackBerry OS (version 5.0 to 7.1), iOS, Android and Windows Phone.

Key Features

Unified UI – You can view all devices in one place and access all management tasks in a single, web-based UI. You can share administrative duties with multiple administrators who can access the management console at the same time.

Secure Device Controls – Device controls give you management of how devices connected to your network, what capabilities are enabled and what apps are available. Whether the devices are owned by your organization or your users, you can protect your organization.

Balance of Work and Personal Data – BlackBerry Balance and Secure Work Space technologies are designed to make sure that personal information and work information are kept separate and secure on devices. If the device is lost or the employee leaves the organization, you can delete only the work-related information or all information from the device.

Client-Side Lockdown – Secured work spaces allow cross-platform (iOS, Android or BlackBerry) ownership models from BYOD to company owned, keeping private data private and work data secure. BES12 takes advantage of client-side security specific to a mobile endpoint and extends that security through encryption, certificates and containerization.

Scalable Architecture – BES12 has been built from the ground up as a modern services-based architecture. It is scalable up to 25k devices per server and 150k devices per domain. Can be deployed on premise as well as through private cloud. It reduces the complexity, optimizes pooled resources, ensures maximum uptime and helps you achieve the lowest Total Cost of Ownership (TCO).

Cross-Platform MAM, MDM and MCM – Cross-platform device, application and content management are all built into a single console. Support multiple device ownership policies at once, from BYOD to company owned personally enabled (COPE) to company owed business enabled (COBO). Comprehensive lifecycle management of apps across iOS, Android, Windows Phone and BlackBerry devices. Integrated secure connectivity provides applications with behind-the-firewall-access to your organization’s resources.

Bottom Line

BlackBerry BES12 has the ability to work well for midmarket companies and larger enterprises because it is highly scalable. BES12 is also regarded to be one of the most secure solutions out there and is BlackBerry’s main focus at the moment as they move away from producing devices. It is a much broader expansion from BES 10 as it is now available on private cloud; public and hybrid cloud installations are currently in development.

220 University Ave. E

Waterloo, ON N2K 0A7

Canada

+1 (519) 888-7465

us.blackberry.com

Page 12: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

12

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

12

AirWatch Mobile Device Management

AirWatch Mobile Device Management enables businesses to address challenges associated with mobility by providing an efficient way to view and manage all devices from the central admin console. It enables you to enroll devices in your enterprise environment, configure and update device settings over-the-air, and secure mobile devices.

The admin console gives visibility into all enrolled corporate-owned, employee-owned and shared devices, regardless of platform or device type. Organization groups provide administrators with a streamlined way to manage all users and devices. Directory services (AD/LDAP) integration enables custom role-based groups that mimic existing corporate structure. The HTML5, web-based console integrates with existing enterprise systems and can be accessed anytime, anywhere.

Environment: AirWatch is available on-premise or as a cloud-based solution.

OS Support: Windows, Mac, OS X, iOS, Android, Windows Phone and Symbian.

Key Features

Bring Your Own Device (BYOD)– Supports BYOD programs by enabling device choice and supporting ownership of different models without compromising the security and management your devices. AirWatch provides a flexible model for asset management, policy enforcement, and distributing profiles, apps and content, based on device ownership type.

Mobile Security – Ensures your enterprise mobility deployment is secure and corporate information is protected with end-to-end security extending to users, devices, applications, content, data, email and networks. AirWatch provides real-time device details and continuous compliance monitoring to ensure your devices and corporate data are secure.

Mobile Application Management – Addresses the challenge of acquiring, distributing, securing and tracking mobile applications. Easily manage internal, public and purchased apps across employee-owned, corporate-owned and shared devices from one central console.

Mobile Email Management – Delivers comprehensive security for your corporate email infrastructure. With AirWatch, you can control which mobile devices access email, prevent data loss, encrypt sensitive data, enforce advanced compliance policies and allow users to easily sync email through the self-service portal. AirWatch supports native email clients, enterprise services and cloud-based clients.

Mobile Browsing Management – Enables secure browsing and provides organizations with the ability to configure customized settings to meet their unique business and end-user needs. AirWatch Browser allows administrators to define and enforce secure browsing policies from the admin console.

Workspace Management – Provides complete separation of corporate and personal data on devices, securing corporate resources and maintaining employee privacy. AirWatch enables organizations to standardize enterprise security and data loss prevention strategies across mobile devices through their flexible approach to containerization.

Bottom Line

AirWatch Mobile Device Management has proven its ability to handle large enterprises and is one of the only two leading MDM vendors to support the latest iOS release the day it’s available. The administrative console has been reported as hard to use, but AirWatch has embedded the console with training videos and a wizard-like program to help administrators catch on quickly.

115 Perimeter Center West, Suite 100

Atlanta, GZ 30338 United States

+1 (404) 478-7500 www.air-watch.com

Page 13: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

13

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

13

SOTI MobiControl

SOTI MobiControl manages all stages of mobile device deployment to provide mobile device management. MobiControl delivers simplified, broadened and accelerated mobility endpoint management by leveraging the latest developments in enterprise mobility management.

SOTI unifies mobility management from a single management console, removing the complexity from managing a multi-OS, multi-vendor, and multi-purpose mobile ecosystem. SOTI MobiControl is a unified enterprise mobility and mobile device management solution that provides the ability to manage mobile devices, applications, content, email, and security within an enhanced, secure, all-in-one offering.

Environment: MobiControl is available on-premise or as a cloud based solution.

OS Support: Android, iOS, Mac OS X, Windows 8 and Windows Phone.

Key Features

Mobile Device Management (MDM)- Manage complete mobile asset lifecycle, secure data and network integrity, integrate applications environment, optimize costs and operations management, and provide help desk support and services; standard and customized diagnostics and analytics support high-end business intelligence requirements for comprehensive mobile device asset management.

Mobile Content Management (MCM)- Enterprise application management enables secure framework to manage mandatory, recommended and prohibited apps with on-the-fly, over-the-air, silent install and remote deployment technology.

Mobile Application Management (MAM)- Comprehensive technical and professional services support in multiple languages; multi OS platform and device agnostic solution. Reduce complexity of onboarding, securing, monitoring, tracking and supporting a multitude of end-point devices accessing resources at anytime and from anywhere Gather hardware and software data points for analysis. Display data such as serial numbers, Mac addresses, installed apps, telephone numbers, and other data with custom views, searches, and reports.

Remote Control & Help Desk- Lower support costs and increase device availability by remotely diagnosing and troubleshooting device issues anytime, anywhere. Our exclusive BlitFire 10X technology offers the world’s fastest remote control for today’s HD devices.

AntiVirus and Malware Protection- Quarantine threats in real-time across the device file system and installed applications. Extend desktop grade antivirus and malware protection to your managed devices. MobiControl allows you to remain vigilant against evolving mobile threats.

Bottom Line

SOTI MobiControl is a good fit for larger companies or companies that need to manage a lot of devices because of they offer a lot of control. If your company is interested in or currently has a high number of Android devices, SOTI is the top vendor at securing Android devices with their SOTI MobiControl, Android for Work, with which they work closely with Google.

5770 Hurontario St.

Suite 1100

Mississauga, ON L5R 3G5

Canada

+1 (905) 624-9828

www.soti.net

Page 14: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

14

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

14

Globo GO!Enterprise MDM

GO!Enterprise MDM is designed to provide IT administrators a single console to manage and secure corporate and individual-liable devices (BYOD) regardless of operating system, carrier, or email platform. Whether on-premise or in the cloud, GO!Enterprise MDM offers a simple and effective approach to Data Loss Prevention (DLP) and Mobility Governance initiatives.

GO!Enterprise MDM is available as both an on premise or cloud offering. The GO!Enterprise MDM cloud solution offers identical functionality as the on premise model with no hardware required at the customer site. Globo's cloud offering meets SSAE-16 reporting standards and maintains a 99.9% SLA performance.

Environment: GO!Enterprise MDM is available on premise or as a cloud-based solution.

OS Support: Windows, Mac OS X, iOS, Android, BlackBerry and Windows Phone.

Key Features

Centralized Dashboard Monitor– The GO!Enterprise MDM centralized dashboard allows you to choose from over 30 graphs to quickly display up-to-date organizational information, device statistics, and usage data.

Policies and Security– Policies can be created easily using built-in tools. GO!Enterprise MDM comes equipped with adjustable sliders that set predetermined security levels based on ownership. In addition, the administrator can edit policy categories for added customization to meet specific security requirements.

Application Management and File Distribution– If you need to manage and control mobile devices, you also need a way to manage and control the data they are accessing. Increase your control of the mobile apps your users are accessing by remotely installing or uninstalling specific apps, as well as defining whitelisted and blacklisted apps for specific users or user groups. Also upload and publish files to keep users up-to-date with the latest information.

Real-Time Device Statistics and Location – Increase Help Desk efficiencies by quickly capturing device and user information such as battery life, device memory, signal strength, encryption status, location, location history and more. The data grid view contains search capabilities to view a user based on specific criteria such as user name, device type, etc.

Compliance Manager and Alerts– Ensures devices connecting into the GO!Enterprise MDM server are complying with their designated policies. If a device is identified as non-compliant, that device will be denied access to corporate assets like email, apps, and files and an alert will notify the administrator to take action.

Wireless Usage and Monitoring– Gain better visibility into who is roaming and the amount of data devices are using for business and personal use. GO!Enterprise MDM also provides usage indicators identifying various network upload and download data amounts.

Report Generation and Logging– View and export reports to analyze device statistics, user information, system alerts, phone and text logs, as well as administrative activity.

End User Self-Service Portal– Provides an optional self-service portal where you can allow your users to initiate a remote wipe or lock their device if it is stolen, locate their device if it is misplaced, recover their password if it is forgotten, or view and install mobile applications all under complete oversight of the administrator.

Bottom Line

Globo GO!Enterprise is a good MDM solution for medium sized companies. They have their own mobile apps that can be managed by GO!Enterprise, but they do not support public apps. Globo has app development tools and supports all major mobile platforms equally. GO!Enterprise also has add-ons like messaging and calendar, that are included at no extra cost.

21991 E Bayshore Rd

Suite 200

Palo Alto, CA 94303

United States

+1 (650) 433-7920

www.globoplc.com

Page 15: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

15

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

15

MobileIron Mobile Device Management

MobileIron uses their platform to combine traditional mobile device management (MDM) capabilities with comprehensive security, mobile application management, and mobile content management capabilities. An IT administrator can manage the lifecycle of the device and its applications, from registration to retirement, and rapidly accelerate operationalizing and scaling their Mobile IT infrastructure.

MobileIron’s MDM capabilities enable IT to secure and manage mobile devices across multiple operating systems, providing secure corporate email, automatic device configuration, certificate-based security and selective wipe of enterprise data for both corporate and user-owned devices.

Environment: MobileIron MDM is available on-premise or as a cloud based solution.

OS Support: Mac OS X, iOS, Android, Windows, Windows Phone and BlackBerry.

Key Features

Mobile Device Management (MDM) - Enables IT to secure and manage a diverse set of mobile devices, automatically provision enterprise settings such as Wi-Fi and VPN and provide end-users with secure access to corporate email. If a device should fall out of compliance, IT can define remediation actions that will either notify the user of policy violations or selectively wipe corporate information without touching any personal data.

MobileIron Core - Integrates with backend enterprise IT systems and enables IT to define security and management policies for mobile apps, content and devices. Core can be extended through APIs to integrate with the offerings of MobileIron Technology Alliance Partners.

MobileIron Sentry - Manages, encrypts, and secures traffic between the mobile device and back-end enterprise systems. Sentry addresses three fundamental needs; mobile security, scalability and user experience.

MobileIron Content Security Service - Addresses data loss in the cloud by providing both the document-level security and the tight integration into an EMM platform necessary to protect enterprise content across common personal cloud services.

Mobile Application Management (MAM) - Delivers, secures, and retires mobile apps. With these capabilities, IT can manage the entire application life cycle: from making the applications available to employees through the Apps@Work private enterprise app store; to securing applications on the device; containerizing corporate apps from personal apps using MobileIron AppConnect.

Mobile Content Management (MCM) - IT can enable end-users to securely access and manage enterprise documents residing in a variety of content repositories, including Sharepoint, WebDav, and CIFS. MobileIron’s MCM solution also ensures that corporate email attachments are encrypted and can be viewed using authorized applications including MobileIron Docs@Work. Additionally, end users can securely browse corporate intranet content without the need for a device-wide VPN using MobileIron Web@Work.

Bottom Line

MobileIron MDM is an effective solution for any size company. They are one of the few vendors in the MDM market that have real time remote-view capacity for iOS. Their administrative console is only available in English even though the end-user product supports different languages.

415 East Middlefield Rd.

Mountain View, CA 94043

United States

+1 (877) 819-3451

www.mobileiron.com

Page 16: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

16

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

16

Good Technology MDM

Good Technology Mobile Device Management is fully integrated with the Good Dynamics Secure Mobility Platform. As your mobile needs evolve, Good MDM scale with your business. From secure mobile collaboration, to mobile content to a wide range of secure mobile apps, the Good Dynamics platform ensures you can deploy additional mobile capabilities as you need them without time-consuming and costly rip-and-replace migrations.

With Good MDM, users can self-enroll over-the-air. In addition to automatically configuring corporate policies and controls, IT can automatically setup WiFi, VPN and Exchange ActiveSync configurations on user devices. Streamlining the enrollment process increases user satisfaction while driving down mobile support costs.

Environment: Good MDM is available on-premise or as a cloud solution.

OS Support: Mac OS X, iOS, Android, Windows, Windows Phone and BlackBerry.

Key Features

Mobile Device Management (MDM) – Provides mobile device management (MDM) to support the complete device lifecycle. IT can control device settings on any managed device – corporate liable, BYOD or COPE – and ensure safe access to proprietary business information. MDM is a basic capability for enabling enterprise mobility, and is included in Good for Enterprise, the Good Collaboration Suite, and the Good Dynamics Secure Mobility Platform.

Mobile Application Management (MAM)– Good provides mobile application management (MAM), including an enterprise app store, to secure, distribute and manage mobile apps. Good’s MAM solution works with or independent of MDM, giving enterprise more options for enabling mobility in BYOD environments and the extended enterprise, without compromising user privacy.

Mobile Content Management – Mobile content management apps, such as Good Share, Accellion, Box, and mobilEcho, are all available on the Good Dynamics Secure Mobility Platform. A collection of Good secured apps enables the end-to-end-workflows, with the data protection and full mobile access for users. Content management apps allow mobile employees to access and share documents regardless of where the files are located – in the cloud, within the enterprise, or on their mobile devices.

Mobile Identity and Access Management (IAM) – Good IAM capabilities can include two-factor authentication, access control, single sign-on, identity federation, and on-demand policy deployment and enforcement. Authentication can be context-based and support an array of technologies that span microSD and smart cards, OTP, biometrics, tokens, and more.

Bring Your Own Device (BYOD) - Good's secure container solution maintains a separation between corporate and personal data, bridging demands for privacy and security

Mobile Collaboration - The Good Collaboration Suite provides balance, delivering the core productivity apps such as email, calendar, instant messaging, file access and document editing.

Bottom Line

Good Technology MDM is a good fit for midmarket to large companies that need strong mobile applications management and provides a great software development kit. Good has also just updated their support model which used to be a weakness, but is now a strength.

430 N. Mary Avenue

Suite 200

Sunnyvale, CA 94085

United States

+1 (408) 212-7500

www1.good.com

Page 17: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

17

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

17

Sophos Mobile Control

Sophos Mobile Control (SMC) ensures each document connected to the server remains secure, allowing users to remain productive by collaborating safely. Gated entry to each file assures security anywhere and everywhere users go. Ensure compliance by maintaining control of what apps are being installed. An overview of all mobile devices in your company shows the device model, OS version and many other properties of the device.

Each file is individually encrypted making sure your data is secure. SMC also integrates with Sophos UTM, Checkpoint and Cisco, keeping the networks protected. If a device is rendered non-compliant, network access is revoked. You can also filter web access on your Android devices based on categories.

Environment: SMC is available on-premise or a cloud-based solution

OS Support- Mac OS X, iOS, Android, Windows, Windows Phone and Blackberry.

Key Features

Mobile Device Management (MDM)- Manage and control iOS, Android (including Samsung SAFE), Windows 8 Windows Phone and other device types; configure device policies and deploy them over-the-air; enforce built-in security features such as passcodes and device encryption; full loss and theft protection with lock, wipe and locate; set up group-based compliance policies.

Mobile Content Management (MCM)- Transparent encryption of each file keeps documents and data safe anywhere; leverages Sophos’ Mobile Encryption app, which can be centrally managed through the SMC console; accesses content from various cloud storage providers like Dropbox, Google Drive, Microsoft OneDrive, Egnyte and various WebDAV compatible solutions.

Mobile Application Management (MAM)- Securely distribute apps to individual users or groups; deploy iOS managed apps for added control over app data; password protect apps accessing corporate data for extra security; blacklist apps that might be risky or time-wasting; supports enterprise purchasing of apps via Apple’s Volume Purchasing (VPP).

Anti-Malware and Web Filtering for Android- Automatically scans all newly installed apps for malware; quarantines infected devices; protects users from accessing malicious websites and blocks web pages by category.

Controlled Network Access- Constantly monitors device health and detects jailbreaks, blacklisted apps or insecure settings; integration with Sophos UTM enables admins to block Wi-Fi and VPN access based on compliance status of the device; out-of-the-box interfaces to control network access via Checkpoint and Cisco ISE.

Mobile Email Management (MEM)- Distribute email settings, getting your users productive in minutes; control access to e-mail via a secure email gateway based on the device posture; supports email containers like Nitrodesk Touchdown; selective wipe all corporate emails, once a user leaves the company.

Bottom Line

Sophos Mobile control works best with small to midmarket businesses and is one of the few vendors to have digital rights management. It also integrates well with third party storage but does not support Samsung Knox and only supports Microsoft Certificate Services.

3 Van de Gaaff Drive

2nd Floor

Burlington, MA 01803

United States

+1 (781) 494-5800

www.sophos.com

Page 18: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

18

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

18

FancyFon FAMOC

FAMOC is an open mobile device lifecycle management solution, enabling any number of smartphones using a variety of operating systems, to be centrally and remotely managed, over the Internet. FAMOC makes working in the mobile era simple and safe by delivering comprehensive security and management for applications, documents, email, and devices.

FAMOC is designed to suit the requirements of organizations who wish to centrally manage a large fleet of smartphone devices, and have a desire to improve the security of their handsets and associated data. FancyFon has customers in the government, Telco, financial, energy and pharmaceutical sectors. Additionally, FancyFon is offering handset and web-based end user self-care solutions for mobile service providers.

Environment: FAMOC is available on-premise or as a cloud-based solution.

OS Support: iOS, Android, BlackBerry and Windows Phone.

Key Features

Real-Time Monitoring- Real time reporting capabilities provides actionable intelligence, allowing organizations to improve processes within the business and make save money. It has been designed to make it easy to find, track, and report all the information you need to keep up to date.

My Device- A self-care web portal where employees can download and install apps, as well as remotely locate, lock or wipe their devices. If necessary, they can also perform backup or restore the lost data.

BYOD- FAMOC fully supports BYOD and offers a number of security measures as standard including password usage enforcement and remote enterprise wipe. FAMOC enables you to create separate policies based on the ownership of the device.

App Verification- Utilizing data collected and analyzed by the Webroot Intelligence Network (WIN), the App Reputation Service gives FAMOC administrators the ability to allow or block mobile apps based on the company’s security policies tied to app reputation scores which indicate whether an app is malicious, has privacy violations or is trustworthy. The solution provides flexibility to decide how to use the mobile app information and adapt it for specific corporate requirements.

Corporate Network Access Management- Integration between network access services and FAMOC provides insight into the posture of mobile devices so that companies can enforce appropriate network access policies as required by their IT organizations. With FAMOC, it is possible restrict access exclusively to the compliant devices, preventing unmanaged and potentially insecure clients from accessing sensitive network resources.

Corporate Store- With FAMOC, administrators can install, update and remove apps over-the-air. Authenticate users, customize app categories and make apps available based on user, device or group membership.

Bottom Line

FancyFon FAMOC currently has clients in the midmarket and large enterprise categories. After partnering with Webroot security, FancyFon has experienced considerable improvements on security and app verification and they have continued working together on other projects. FAMOC automatically scans apps for viruses, spyware and Trojans, and blocks them.

Atrium Business Centre

The Atrium

Blackpool Park, Cork

Ireland

+353 (21) 238-0226

www.fancyfon.com

Page 19: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

19

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

19

Dell Mobile Management

Dell Mobile Management, a component of Dell Enterprise Mobility Management, enables you to securely manage and provision access to smartphones or tablets from any device with a browser and internet connection. It also manages applications and content on the devices and enables your employees to self-enroll their devices for instant provisioning of corporate access and automated policy enforcement that provides added security.

Mobile Management is a mobile device management solution that is delivered as software as a service (SaaS). This allows you to benefit from the latest features and upgrades without the burden of ongoing solution installation, updates and maintenance.

Environment: Mobile Management is available on or as a cloud-based solution.

OS Support: Windows, Mac OS X, iOS, Android, Windows Phone and BlackBerry.

Key Features

Mobile Device Management (MDM) - Gain visibility and control over mobile devices through a single use console. It also provides you with comprehensive over-the-air (OTA) asset, configuration and policy management for smartphones and tablets. It provides secure, OTA device registration from anywhere; instant, zero-touch, configuration of mobile devices; configuration and policy updates directly from the cloud and simple, self-registration and provisioning of corporate and employee devices.

Mobile Application Management (MAM) - Get device-agnostic, remote management of corporate apps and content on corporate mobile devices. It also offers simple, secure inventory, distribution and management of apps and content across devices. It provides easy access to remote desktops, apps and content; centralized application inventory; application distribution, management and policy enforcement (public and private apps); business applications; Volume Purchase Program (VPP) support for iOS apps and devices.

User Self-Service Portal- Enable and empower your end users with self-provisioning, management and reporting tools. A policy-driven, self-service portal allows you to define end-user rights and permissions for self-service based on individual or group membership. View current devices and register new devices; reset passwords; locate, lock, and wipe devices; view individual/group policies.

Real-Time Reports, Alerts and Analytics- Gain an integrated view of all devices, applications and policies across the end-user community. Comprehensive user-centric view shows how devices, apps and policies are combined to enable service delivery to a given user. Real-time, exceptions-based alerts allow you to focus on critical issues. Includes real-time reporting (device and application inventory, asset location, groups/users and related policies); granular events and policy compliance alerts (device and application compliance, device heartbeat, devices added/removed, etc.); contextually summarized events; fast searching and detailed audit trails for user and admin functions.

Bottom Line

Dell Mobile Management is a component to Dell’s larger Enterprise Mobility Management software. Dell Mobile Management, along with Dell Enterprise Mobility is great for larger companies. The Mobile Management component of Dell EMM allows IT professionals to have complete control over all devices, network access, applications and user settings.

5 Polaris Way

Aliso Viejo, CA 92656

United States

+1 (949) 754-8000

www.software.dell.com

Page 20: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

20

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

20

Amtel MDM

With Amtel MDM, safely deploy mobile devices in the enterprise using a unified console for greater operating efficiency. Secure devices and protect access to enterprise data from corporate or BYOD devices. Deployed easily from a secure private cloud with SSAE 16 Type II compliance, Amtel’s mobile security solution is ideal for smartphone and tablet deployments in the enterprise.

Protect enterprise data with the capabilities to remotely lock and unlock lost or stolen devices and full or selective wipe of content. Set policy to restrict mobile device features such as camera or NFC at sensitive locations. By centralizing device configuration, Email server, Wi-Fi, VPN, LDAP and CalDAV settings are easily rolled out.

Environment: Amtel is deployed on a secure private cloud.

OS Support: Mac OS X, iOS, Android, BlackBerry, Windows Phone and Windows.

Key Features

Mobile Apps Management- Protect and secure enterprise apps and data with access control policies that take control over mobile apps with the ability to easily setup and manage both public and private apps. Configure whitelist policies for recommended apps and blacklist policies to restrict or block risky or time wasting apps. Easily deploy enterprise app store for distribution of in-house private apps.

BYOD Security- Allow flexibility for users while retaining the ability to secure corporate data on personal devices. Define user profiles with access rights and restrictions, deploy over the air and manage centrally. Protect corporate data using selective wipe of container in the event of lost device or user leaving the company. User or admin alerts and reports help manage BYOD with monitoring and audit trail.

Containerization- Containerize and protect corporate content by sharing only in secure containers. Automatically disable access and wipe container if a device is compromised, non-compliant or when user leaves the company. IT Administrators can push content updates centrally to container as well as impose corporate access control restrictions based on time of day or location of mobile device.

Secure Enterprise Workspace- Enforce workspace restrictions on both corporate owned and BYOD mobile devices with pre-defined configuration settings for access control, content sharing and mobile app usage. With secure workspace for Android, administrators can control how users’ home screens look and operate, restrict what apps can be accessed by a user and automatically hide any of the installed widgets and apps.

Cloud-Based Mobility Management- Amtel’s mobility management solution is deployed on a secure private cloud with reliable SSAE 16 Type II compliant hosting. Register and centrally configure corporate liable and BYOD devices. Authenticate users with Active Directory or secure system generated credentials. Self-enrollment is made easier by pushing a link via email, SMS, URL or QR Code.

Bottom Line

Amtel MDM can be deployed from large enterprises to small businesses and nonprofits, but is most effective for midmarket enterprises. It is only available as a cloud-based solution and integrates Mobile Device Security, Mobile App Management and Mobile Content Management with Mobile Expense Management (MEM). Amtel is effective will all kinds of industries, but is mainly used for businesses with field services operations like sales, logistics and pharmaceutical companies.

900 Lafayette St. #506

Santa Clara, CA 95050

United States

+1 (408) 615-0522

www.amtelnet.com

Page 21: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

21

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

21

Symantec Mobile Device Management

Symantec Mobility Device Management is part of the Symantec Mobility Suite of products. It offers a centralized system for device management and data security for to manage your enterprise. Through Device Management, enterprises can monitor mobile email and application rollouts, safeguard mobile data and devices, and gain comprehensive visibility and control of the mobile environment, regardless of platform, device type or service provider.

Symantec’s Mobility Device Management platform provides cross-platform device management, with enterprise directory integration, role-based access-control and content delivery. It enables enterprise-grade management with a scalable and mail 1server agnostic architecture. Enterprises can leverage the native reporting capabilities built into the system using predefined and customizable reports or leverage the product’s APIs for reporting via third-party or internal reporting systems.

Environment: Symantec MDM is available on-premise or as a cloud-based solution.

OS Support: Mac OS X, iOS, Android, Windows, Windows Phone and BlackBerry.

Key Features

Mobile Efficiency- Symantec MDM enables end user access to corporate resources through preventing unauthorized shadow enrollment; authorizing and controlling access to enterprise services and apps based on authentication with AD/LDAP, group membership, and jailbreak/rooted status; providing self-service activation, including automated configuration; automating configuration for native and 3rd party email clients and facilitating network access for email, VPN, Wi-Fi.

Mobile Security- Enables advanced security settings on devices. Mobile administrators can enable policy controls from passwords and application restrictions, to certificate distribution and remote actions like device lock or wipe. Some of the options include automated provisioning and delivery of device authentication certificates, enforcement of mobile email access policies using Symantec’s Email Gateway or certificates and prevention of enterprise data loss and elimination of privacy concerns by separating corporate and personal data. Remove only corporate data upon employee departure, without touching personal data. Identify only corporate email, apps, docs, and any other content.

Mobility Management- Cross-platform device management, with enterprise directory integration, role-based access-control and content delivery. It enables enterprise grade management with a scalable and mail 1server agnostic architecture. For administration, it supports both SaaS and on-premise deployments with role based access control. Enterprises can leverages the native reporting capabilities built into the system using predefined and customizable reports or leverage the product’s APIs for reporting via third-party or internal reporting systems.

Bottom Line

Symantec Mobility Device Management is part of the Symantec Mobile Management Suite which is made up of Symantec App Center, Symantec Mobile Security and Symantec Mobile Management. Symantec does well with midmarket to larger sized companies. They are also one of the only EPP mobility vendors, which offers and extra level of security however, this may cause Symantec to be a little more expensive.

350 Ellis St.

Mountain View CA, 94043

United States

+1 (650) 527-8000

www.symantec.com

Page 22: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

22

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

22

Citrix XenMobile

Citrix XenMobile is a comprehensive solution to manage mobile devices, apps, and data. Users have single-click access to all of their mobile, SaaS and Windows apps from a unified corporate app store, including integrated email, browser, data sharing and support apps. IT gains control over mobile devices with full configuration, security, provisioning and support capabilities. Deployment options give IT the choice to manage XenMobile in the cloud or on-premise.

XenMobile delivers enterprise grade MDM with role-based management, configuration, security and support for corporate and employee-owned devices. Users enroll their devices, enabling IT to provision policies and apps to those devices automatically, blacklist or whitelist apps, detect and protect against jailbroken devices, troubleshoot device and app issues, and wipe or selectively wipe a device that is lost, stolen or out of compliance.

Environment: XenMobile is available on-premise or as a cloud-based solution.

OS Support: Windows, Mac OS, iOS, Android and Windows Phone.

Key Features

XenMobile Device Manager – Provides role-based management, configuration and security of corporate and user-owned devices. IT can enroll and manage devices, blacklist or whitelist apps, detect devices that are jailbroken or out of compliance and block their ActiveSync email access and do a full or selective wipe of a device that is lost, stolen or out of compliance.

Citrix Worx Home – Available for any mobile device, Worx Home is an app that allows IT to enforce mobile settings and security while also providing access to a unified app store and live support services. XenMobile communicates with Worx Home to deliver device-specific policies and Worx-enabled app policies. .

NetScaler Gateway – NetScaler Gateway is a secure application and data access solution gives IT administrators a single point to manage access control and limit actions within sessions based on both user identity and the endpoint device, providing better application security, data protection, and compliance management.

Mobile App Management – XenMobile App Controller manages and enables access to an organization’s mobile, web and SaaS apps and ShareFile data resources. App Controller also serves as the content provider/controller for an organization’s iOS, Android and HTML5 native mobile applications (including homegrown and those sourced from third parties).

StoreFront – StoreFront provides a set of service interfaces for use by Receiver that enable access to XenDesktop (which controls and delivers virtualized Windows desktops and apps). StoreFront is an optional component that extends a customer’s existing XenDesktop/XenApp environment.

Secure Mobile Email and Browser Applications – Citrix WorxMail and WorxWeb are native mobile apps that are included in the XenMobile App and Enterprise Editions. WorxMail and WorxWeb give IT the assurance that corporate email, web content and user data are secured within a secure mobile container on the device and can be wiped remotely at any time.

Bottom Line

Citrix XenMobile is a good MDM solution for midmarket businesses because it doesn’t currently have a lot of larger deployments. The Worx Mobile Apps have been proven to improve the user experience and has a high customer support rating. XenMobile apps perform the same across all platforms, and the Worx Home program can create a virtual private network tunnel without the user having to manually create one.

851West Cypress Creek Rd Fort Lauderdale, FL 33309

United States

+1 (954) 267-3000

www.citrix.com

Page 23: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

23

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

23

Tangoe MatrixMobile MDM

MatrixMobile MDM is a comprehensive monitoring, management support software and service suite for mobile devices and applications in the enterprise, offering complete control of the device lifecycle- from the setup to decommissioning. Mobile device management provides organizations with visibility and control of any managed device, whether corporate or individual-liable, ensuring safe and secure access to corporate resources.

MatrixMobile MDM fortifies the strength of your mobile infrastructure with a unified solution that reduces security risks, enables productivity and supports collaboration while providing real-time visibility into usage, costs and policy compliance.

Environment: MatrixMobile is available on-premise or as a cloud-based solution.

OS Support: Mac OS X, iOS, Android, Windows, Windows Phone and BlackBerry.

Key Features

Mobile Device Management (MDM)- Manage your mobile device environment within a single console; securely access enterprise content from any authorized device; enforce security and policy through role-based models; distribute software and apps over-the-air in mixed mobile OS and device environments; allow personal and corporate data to securely co-exist on the same device and 24x7 helpdesk and troubleshooting services.

Security and Policy Compliance- Secure devices, data, applications, communication, and network access; pre-configure device settings and policies based on ownership models; protect devices from unauthorized use; control specific device features and applications; automatically wipe corporate data on devices out of compliance and enforce authorized Wi-Fi and VPN networks.

Mobile Application Management- Securely empower employee access to IT-approved third party and private apps; deploy, upgrade, and remove apps on all major platforms; monitor for application compliance and configure auto policy enforcement and allow-Block-Quarantine access to blacklisted apps.

Containerization- Create separate profiles for corporate and personal data on the same device; enable secure, employee-friendly data leakage prevention; encrypt corporate data using FIPS-140-2 algorithms protect against malware and unauthorized access via custom profiles and access one portal regardless of device platform.

End User Self-Activation- Reduce IT and helpdesk services with self-service portal; self-enroll devices with authentication for secure provisioning; enable employee self-activation of corporate and personal devices and comply with international guidelines for device monitoring.

Bottom Line

Tangoe MatrixMobile MDM is a good fit for smaller or midmarket companies and has one of the strongest self-service capabilities out there. Tangoe works with Acronis and SAP Afaria for support and offers a BYOD option. MatrixMobile supports all operating systems, but is a little weaker in their support of Windows Phone.

35 Executive Blvd.

Orange, CT 06477

United States

+1 (877) 571-4737

www.tangoe.com

Page 24: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

24

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

24

Microsoft Enterprise Mobility Suite

The Enterprise Mobility Suite is Microsoft’s comprehensive cloud solution for your consumerization of IT and Bring Your Own Device (BYOD) challenges. In addition, the Enterprise Mobility Suite discount makes it cost-effective to acquire the included cloud services: Microsoft Azure Active Directory Premium for hybrid identity management, Microsoft Intune for mobile device and application management and Microsoft Azure Rights Management for information protection.

Microsoft enterprise tools and technologies can help IT maintain security across all device types, regardless of whether the devices are corporate or personal assets, and establish security measures that protect their organizations’ systems, data, and networks.

Environment: Microsoft Enterprise Mobility Suite available as a cloud-based solution.

OS Support: Windows, Mac OS X, iOS, Android and Windows Phone.

Key Features

Mobile Device Management- Provides a self-service company portal for users to enroll their own devices and install corporate applications across the most popular mobile platforms. Deploy certificates, Wi-Fi, VPN and email profiles automatically once a device is enrolled, enabling users to access corporate resources with the appropriate security configurations. Protect corporate data by restricting access to Exchange email and OneDrive for business documents based upon policies set by the administrator when a user tries to access resources on an unenrolled or non-compliant device.

Mobile Application Management- Enable your workforce to securely access corporate information using the Office mobile apps they are familiar with while preventing leakage of your company’s data by restricting actions such as copy/cut/paste/save in your managed app ecosystem. Allow administrators and device users to protect corporate information through selective wipe of managed apps and related data when a device is unenrolled, no longer compliant, lost, stolen, or retired.

Advanced Identity Security- Monitor and protect access to your cloud applications by viewing detailed reports showing more advanced anomalies and inconsistent access patter reports. Advanced reports are machine learning-based and can help you gain new insights to improve access security and respond to potential threats.

Self-Service Identity Management- Keep users productive with self-service password reset for both on-premise and cloud-based directories. Simplify day-to-day administration of groups and access to group-associated applications by enabling users to create groups, request access to other groups, delegate group ownership so others can approve requests and maintain their group’s memberships.

Consistent Identity – Create and manage a single identity for each user across all your directories, keeping attributes in sync and providing single sign-on for users. Provide single sign-on access to thousands of cloud-based SaaS applications and information with conditional access policies and multi-factor authentication.

Bottom Line

Microsoft Enterprise Mobility Suite is built to support any sized business or enterprise. The Enterprise Mobility Suite is a combination of Windows Intune, Microsoft Azure Rights Management and Microsoft Azure Active Directory Premium. You need all of these components to get the full benefits of Microsoft Enterprise Mobility Suite, but they work together well and provide a solid solution.

1 Microsoft Way

Redmond, WA 98052

United States

+1 (425) 855-8080

www.microsoft.com

Page 25: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

25

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

25

CA Technologies Mobile Device Management

CA Mobile Device Management (CA MDM) is a scalable, mobile device management solution designed to help you control and secure mobile and desktop devices as well as deploy applications. Designed to be a sustainable approach to unlocking the value of mobility, CA MDM can give IT complete deployment flexibility and provide users with productivity-enhancing Bring Your Own Device (BYOD) freedom.

This mobile device security solution is equipped with, enterprise-level application management and data security features to help you maintain a seamless mobile experience for end users—without sacrificing safety.

Environment: CA MDM is available on-premise or as a cloud based solution.

OS Support: iOS, Android, Samsung, BlackBerry, Windows and Windows Phone.

Key Features

Smart Containerization- CA MDM is powered by Smart Containerization technology to dynamically control mobile device, application and email provisioning policies at a granular level.

Mobile Applications Management (MAM)- Complex file and software distribution for desktop management, best-in-class remote management and diagnostics for Android devices, Linux/Windows client and server platform. Helps convert unmanaged mobile applications into managed applications by embedding security, supportability and control within the applications.

Scalability- CA MDM supports a wide variety of device types and environments. It preserves a familiar look and feel for both mobile and traditional Windows-based endpoints to help users get acquainted more quickly.

Security- CA MDM uses a relay server in a demilitarized zone (DMZ). It also provides comprehensive add-on email security options that can secure both internal and external email communications within your enterprise. In the case of loss or theft, users can remotely locate, lock and wipe a lost device, reset the passcode, remove enterprise controls and unregister a device.

BYOD- Securely manage enterprise and personal apps, content and emails separately. Gain complete BYOD freedom with an end-user option that allows the removal of CA MDM control. BYOD solutions allow enterprise productivity apps to reside on users’ personal devices.

Self-Service Portal- streamlines enrollment and provisioning of a device. It allows users to remotely locate, lock and wipe a lost device; reset the passcode; remove enterprise controls; and unregister a device. With BYOD programs, users demand the flexibility of using their device for both work and personal use with the assurance that their enterprise information is secure and their personal content is untouched by the enterprise.

Bottom Line

CA Technologies MDM is good for enterprises and businesses of any size. CA MDM also has their own app store where you can publish corporate apps for employees to download. Content Management includes encryption to, from and on the device and there are more developments still to come; CA MDM has only been around since 2013. CA Technologies licensed SAP Afaria mobile management technology to develop CA MDM.

520 Madison Ave.

22nd Floor

New York, NY 10022

United States

+1 (800) 225-5224

www.ca.com

Page 26: 2015 Solutions Review MDM Buyers Guide MRC75

2015 Buyer’s Guide

26

Mobile Device Management Management

Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA

26

Absolute Manage MDM

Absolute Software MDM is an endpoint security and management solutions for computers, laptops, and portable devices—and the data they contain. The features available allow you to remotely manage the iOS, Android, and Windows Phone devices in your deployment. You can wirelessly (over cellular or Wi-Fi) configure, query, and wipe or lock managed devices.

The features available with Absolute Manage provide organizations with asset management capabilities. From computer imaging, patch management, MDM security, and BYOD policy automation, each capability allows IT to properly manage and secure the endpoint. Absolute Manage is available for MDM as a stand-alone product or as a component of the overall Absolute Manage Asset Management Solution.

Environment: Absolute MDM is available on-premise or as a cloud-based solution.

OS Support: Windows, Mac OS X, iOS, Android and Windows Phone.

Key Features

Mobile Application Management – Allows you to track installed apps; build device records using custom data fields; publish a list of approved apps onto each device; provide a single-click download/ install process for users and silently install/remove apps using management APIs.

Security, Change & Configuration Management – Set longer and more complex passwords; wipe a device clean to factory setting; manage and deploy profiles to configure email, restrict apps, set up VPN, disable the camera and deploy web clips; send customized messages and communicate with the end user wirelessly; use policy-locked configuration profiles to stop non-compliant devices (jailbroken, blacklisted apps installed) from accessing company email and networks; schedule policies so users have a defined window of time to access secured documents and corporate networks.

Mobile Content Management – Apply strict security controls for the sharing of files and media; distribute sensitive or confidential files to devices without using email; restrict content from being emailed, printed or moved outside of the AbsoluteSafe repository; manage all content with the same types of automated and dynamic policies used for configuration and provisioning; includes scheduling the availability of content on a device so that it can be automatically deleted based in date and time down to the minute) regardless if the device is on or off the network; includes integration with corporate SharePoint infrastructure to locate and assign content to the AbsoluteSafe repository.

Asset Inventory – Gather hardware and software data points for analysis; display data such as serial numbers, Mac addresses, installed apps, telephone numbers and other data with custom views, searches, and reports; integrate your mobile device data with third party applications such as Microsoft SCCM.

BYOD – Use the automated employee enrollment process to onboard employees and their personally owned devices, eliminating the manual IT work associated with BYOD programs; record employee opt-in and direct a copy of each confirmation to Human Resources; automatically assign BYOD-specific policies to ensure these devices only access corporate networks and data if they are compliant.

Bottom Line

Absolute Manage MDM works best with midmarket companies looking to manage Macs, PCs and mobile devices from one single tool, but is not as strong with Windows Phone as it is with other operating systems and platforms. Absolute Manage MDM’s set up is easier for Apple products because of their compatibility with OS X, but once it’s up and running, works just as well across all platforms.

430-11401 Century Oaks Terrace

Austin, Texas 78758 United States

+ 1 (512) 600-7455

www.absolute.com