Burrowing Training Wheels: EMM without device registration is available

10:42 AM
Burrowing Training Wheels: EMM without device registration is available -

Mobile Application Management (MAM) has traditionally been stratified as technology on top of Mobile Device Management (MDM) in use. In fact, for many applications, MDM technology is required to make MAM work. Here are some examples:.

  • An MDM device code policy is necessary to use device-level encryption, the application layer security is
  • MDM is used, user certificates for application layer security.
  • MDM is required for Pro App VPNs.
  • MDM is required to push data to use and maintain controls such as open-in.
  • MDM for the use of Single Sign-On

as you can see, there are with MAM is required, always has a function of MDM. Deployment options for EMM typically contain MDM or MDM + MAM, but not MAM-only.

I am here to tell you that Citrix XenMobile the highest mobile data offers and app security, without requiring the device registration via MDM. It is a strategy of Citrix refers to as MAM-first.

We know that with EMM, a large percentage of the devices are personal (BYO) belongs. The biggest complaint and barrier to EMM assumption is that the average person does not feel comfortable to manage their personal device via MDM. There is intrusive.

Can my company read my personal texts? Can it to track my location? Can it read my personal email? Can it access to my Facebook? Can listen to my voice messages? Can it trigger a factory reset of the device, which would remove all my personal photos? These are valid concerns.

Our customers have been looking for new ways of making EMM, without requiring device registration. Face the hook, there to provide security, which is at least as good as MDM + MAM is.

XenMobile Server 10.3.5 now available, continue to customers the opportunity to MDM, MDM + MAM or MAM only give anything from a single console and server.

XenMobile StorageZones

How does it work?

XenMobile architecture was designed so that MDM can be easily removed from the equation. All components for securing data-at-rest is required, data-in-motion and data-in-use are, regardless of the MDM layer. As you can see in the diagram above, the application layer security from the MDM layer is completely independent.

"MDM-like" policies in the App level exists rather than the device level. For example, with MDM You can lock, wipe or selectively delete a device. With policies XenMobile MAM, you can also lock, wipe and selectively wipe, but instead these actions apply to the entire device (a privately owned unit in many cases) you can apply to each app individually managed.

Let's talk about encryption. Our biggest competitor in the EMM market alleged app-level application to provide encryption. Application data is encrypted with its solution, but it is encrypted with the built-in operating system device-level encryption . What this means is that an MDM policy to enforce the device code is required, which ensures the encryption. In this scenario, the MDM can not be decoupled from MAM, so that users have control over their entire product must qualify with.

Citrix XenMobile Micro VPN vs Per App VPN. Do not be fooled. Micro-VPN and VPN Per-APP are not the same. The chart below, the advantages of the Micro-VPN shows compared to the Pro-App VPN, but is the bottom line that Per-App VPN requires device level MDM enrollment.

Screen Shot 2016-05-03 at 3.55.28 PM

XenMobile 10.3.5 available today-more on Citrix strong foundation of MAM-first thinking

XenMobile 10.3.5 MAM to build first feature set .:

  • authentication user certs for the application can now also without requiring the MDM enrollment.
  • users sharing a device may be Shared devices for MAM distributed and managed custom applications and access data without having to register the device again.
  • Self-destructing destroying ~~ POS = HEADCOMP MAM policy allows IT inactivity time limits for the MDX-container set. If, for example, has been lost or stolen, the user's personal device while in airplane mode MAM policy can be applied, an offline campaign to destroy itself, to initiate the container.
  • About 50+ MAM -only policy supported today without requirement for an MDM profile.
  • MAM-only 2-factor authentication with single sign-on for all managed applications.
  • a PIN to all corporate apps access touch id protected.

Others may possibly via MDM provides MAM, but only Citrix can XenMobile a MAM-only solution offer with true application layer encryption .

for the future Citrix is ​​committed to a MAM-first approach, for data and applications in a mobile office to secure. the XenMobile MDM independent architecture has allowed us to develop quickly and in the field of mobile security innovations that not MDM for an unenclosed whitepaper Device Registration required.

for more information on XenMobile MDX technology can be found here.

Citrix_Mobilize Windows_Banner 2_728x0_Static_Compete_F_072715

Previous
Next Post »

1 comment

  1. Thanks for sharing your post. This information very helpful and good looking blog. You can also visit on : Citrix Xenmobile Certification in India

    ReplyDelete