EMM / MDM

What is it and why is it important? “Enterprise mobile management” (EMM) is a term that describes the future evolution and convergence of several current mobile management, security and support technologies.

These include mobile device management (MDM), mobile application management (MAM), application wrapping and containerization, and some elements of enterprise file synchronization and sharing (EFSS). Such tools will mature, grow in scope and eventually address a wide range of mobile management needs across all popular operating systems on smartphones, tablets and PCs.

Centrify for Office 365

Centrify for Office 365 Overview
‘A easy, simple, fast method of deploying Office365’

Centrify for Office 365 is a Microsoft-validated, Azure-based service that offers the industry’s easiest-to-deploy and most comprehensive solution for Active Directory-based user provisioning, single sign-on and mobile management. End-users will love the single sign-on and self-service features.

IT will love the automated user provisioning and lifecycle management, centralized access control and visibility. And Centrify also supports thousands of other SaaS apps so your users can get secure single sign-on to all your cloud-based

centrify1

Benefits

  • Easiest to deploy solution for federated identity from on-premise Active Directory
  • 5 min install
  • No servers in DMZ
  • No holes in firewall
  • No public certs required
  • Supports web and rich clients on both PC and mobile both inside and outside firewall
  • Supports 100s of other SaaS apps that are used in concert with Office365 (SF.com, WebEx, Yammer, Skype, etc.)
  • Centrify is trusted partner aligned with Microsoft strategy
  • Removes the need for ADFS and redundant infrastructure

 

Centrify for SaaS

Centrify for SaaS Overview
‘A easy, simple, secure method of Access Automation’

Centrify User Suite, SaaS Edition (Centrify SaaS Edition), uniquely integrates single sign-on for SaaS applications with user-centric mobile security management. With Centrify’s cloud-based service, you can quickly provide end-users with single sign-on to cloud-based apps such as Microsoft Office 365 (and thousands of others) through an easy-to-use web portal. When users enroll their devices in the Centrify Cloud Service, they automatically get zero sign-on to those same apps.

Benefits

  • Improve Security and Compliance While Reducing Complexity
  • Decrease Costs While Improving User Satisfaction/Productivity
  • Functional User portal provides:
    o MyApps: Self-Service SSO to SaaS
    One click access to thousands of SaaS apps leveraging SAML tokens
    Self-service management of passwords for HTTP app authentication
    o MyDevices: Self-Service for Mobile Devices
    View location, device status and info
    Self-service passcode reset, device lock and wipe
    o MyProfile: Self-Service AD account
    See all and edit select AD account attributes
    Self-service account unlock and password reset
    o MyActivity: Self-Service Activity Monitoring
    Reports and activity stream detailing personal activity for spotting suspicious events
centrify2

Centrify Server Suite

Centrify Server Suite Overview
‘A easy, simple, secure method of Server Management’

Centrify Server Suite secures the industry’s broadest range of mission-critical servers from identity-related insider risks and outsider attacks, making security and regulatory compliance repeatable and sustainable. The solution leverages existing Active Directory infrastructure to centrally manage authentication, access controls, privileged identities, policy enforcement and compliance for on-premises and cloud resources.

Benefits

  • Identity consolidation & privilege management
    o Consolidate identities for Windows and *Nix servers in Active Directory, simplifying privileged access management.
  • Detailed auditing of privileged user sessions
    o Report on historical user activity, monitor activity in real-time, and troubleshoot by replaying actions.
  • Dynamic isolation of cross-platform systems
    o Secure sensitive data by dynamically isolating cross-platform systems and enabling encryption of data-in-motion
  • Single sign-on to on-premises applications
    o Give users a single Active Directory login to access all their on-premises business applications and databases.
centrify3

MDM Mobile Application Development

At last count, almost six billion mobile device subscriptions were held worldwide. There is no question that mobile device use is booming, and IT organizations are jumping onboard not only in adopting bring-your-own-device (BYOD) strategies for the enterprise, but in taking advantage of the increase in demand for mobile applications. In fact, more than 300,000 mobile applications have been developed over the last three years.

mdm

The advantages of mobile application development are many custom applications can provide company-specific and targeted ways to improve business productivity and customer engagement, provide better customer service, and help organizations differentiate themselves from the competition. Additionally, some organizations develop their own internal mobile applications because they aren’t able to control mobile devices and their commercially-available applications or native operating systems (OSs) as tightly as is necessary. But if the organization creates its own applications, it can design in its choice of controls.

 

Since IT is already struggling with the challenges of managing an increasingly mobile infrastructure with ever-growing diversity and complexity while ensure the security of mobile devices and applications during the critical development phase? Multiple versions of mobile applications are typically distributed to employees’ mobile devices during the internal testing phase, adding layers of risk as well as complexity to the development process.

As a result of these shifts especially the move to employee owned devices from company-provided equipment it is more difficult than ever for IT to maintain control over the organization’s data, applications and upgrades. With the rise of BYOD, the power has shifted to the mobile device user, raising serious concerns in mobile application development environments, where the security of in-process enterprise applications is at risk.

Copyright © 2018 Quattra. All Rights Reserved.