Mobile Enterprise Compliance and Security Server Solution
Introduction
Smart phones and mobile devices are rapidly becoming the Achilles' heel of IT security and compliance programs. There are two major trends in play: the increasing power and flexibility of these devices, which inadvertently makes them conduits for attacks on their users and on the corporations they work for; and the increasing crossover between business and personal activities on the user device.
Features and benefits
Mobile Enterprise Compliance and Security (MECS) protects mobile devices, with minimal impact on the user's experience.
MECS can be deployed very rapidly using existing IT security policies.
MECS is available as a service and as an on-premise product.
Your key questions answered
Smart phones and mobile devices are rapidly becoming the Achilles' heel of IT security and compliance programs. There are two major trends in play: the increasing power and flexibility of these devices, which inadvertently makes them conduits for attacks on their users and on the corporations they work for; and the increasing crossover between business and personal activities on the user device.
Features and benefits
- MAD's objective is to provide the level of security associated with the RIM Blackberry device across the growing range of modern smart phones.
- MAD provides email and web security, security policy management, and mobile device services such as wiping and disabling lost devices
Mobile Enterprise Compliance and Security (MECS) protects mobile devices, with minimal impact on the user's experience.
MECS can be deployed very rapidly using existing IT security policies.
MECS is available as a service and as an on-premise product.
Your key questions answered
- Enterprises that allow employees to access corporate systems using smart phone devices will benefit from using MECS
- MECS offers ISPs and CSPs an attractive value-added service as well as useful savings on bandwidth utilisation
SUMMARY
Catalyst
Key findings
Ovum view
Recommendations
FUNCTIONALITY
Solution overview
Malware protection
Information protection
Geo-location functionality
Architecture and implementation
Solution analysis
MECS enforcement component
MECS management component
Personal email configuration server
Email download server
Email scanning server
Email distribution server
PRODUCT STRATEGY
Market opportunity
Go to market strategy
IMPLEMENTATION
Deployment examples
APPENDIX
Further reading
Methodology
Author
Ovum Consulting
Disclaimer
Catalyst
Key findings
Ovum view
Recommendations
FUNCTIONALITY
Solution overview
Malware protection
Information protection
Geo-location functionality
Architecture and implementation
Solution analysis
MECS enforcement component
MECS management component
Personal email configuration server
Email download server
Email scanning server
Email distribution server
PRODUCT STRATEGY
Market opportunity
Go to market strategy
IMPLEMENTATION
Deployment examples
APPENDIX
Further reading
Methodology
Author
Ovum Consulting
Disclaimer