Learn about XenMobile unique approach to protecting mobile apps at the RSA 2016!

6:00 PM
Learn about XenMobile unique approach to protecting mobile apps at the RSA 2016! -

RSA 2016 is just around the corner and the XenMobile team is there with the latest security enhancements XenMobile share. [1945002verstehendassdiemeistenEnterpriseMobilityManagement(EMM)Anbieter-einschließlichCitrix-AngebotmobileDeviceManagement(MDM)undmobileApplicationManagement(MAM)]

We will be there to help you not all MAM solutions are the same.

, the main difference in MAM solutions is applied the method to protect application data on the device. Essentially, there are two different approaches:

  • MAM Method 1: Data is encrypted using device / O.S. require MDM enrollment level encryption
  • MAM. Method 2: The data is encrypted, regardless of MDM enrollment and device / O.S. Level encryption

XenMobile is capable of both methods to offer, while some vendors provide only 1 method available - .. MAM with MDM enrollment While MAM with MDM application may be suitable for some applications (eg, a proprietary tablet used as a kind of stand), it is not suitable for BYOD, as most users are concerned about their privacy in general, and are reluctant to register their devices, fearful that iT might able to see their personal information.

There are also a security risk with MAM, which is based on the device / OS-level security. If the device itself be affected, there is a chance that the application data is stored on the device can no longer be encrypted. With Method 2 application data would remain encrypted, since there is no dependence of the So if you are planning on the device / OS

on the RSA to be, you should stop by the Citrix booth # 3214 in the North Hall. If you are not able to join us, you need to read the XenMobile Security Whitepaper.

Chromebook Banner 1

Previous
Next Post »
0 Komentar