Many companies has addopted BYOD (Bring your own device) approach, that allows users connect to corporate applications using user’s favourite gadget. Which makes work process more comfortable and more effective. When employee leaves workdesk for a meeting or a business trip, person is still up to date with information and can make faster decisions, even from the mobile device or table.
While BYOD is very popular approach, this puts more responsibility on IT, since IT should provide secure channel accessing corporate data and also eliminate risk of data leakage to protect business. Smartphones, tablets or other mobile devices no longer used to as voice transfer devices, they became modern business tools that helps employees do their work.
CYONE has long term experience in MDM (Mobile Device Management) deployment and implementation, and support and modernization. CYONE experience is based on IBM and CITRIX products.

IBM Mobile Connect

IBM Mobile Connect (previous product name – IBM Lotus Mobile Connect) is VPN (Virtual Private Network) solution, that allows customer hide services like IBM Traveler, IBM Sametime, IBM iNotes and others behind firewall and not to put it in public Internet. This solutions provides also to internal resources available only when user is in LAN, by providing transparent micro-VPN. Micro-VPN is done on application level, so only this particular application requests routed to LAN. IBM Mobile Connect supports “Single Sign-On” approach, which eliminates need to enter password in every backend system.
Organizations who made wise decision and has deployed IBM Domino/Notes platform for collaboration, IBM Mobile Connect client licences are included in IBM Notes licence. Thus only server part should be purchased – IBM Mobile Connect Server.

IBM Maas 360.

IBM Maas 360 allows to protect mobile devices, applications that used by business users, to access and process business data.

IBM Maas 360 features:

Compatibiliy with popular smartphone and notebook vendors

IBM Maas 360 can control, deploy mobile applications on mobile devices(iOS, Android, Windows) as well on laptops with Apple OS X and Windows OS.

Device Centralized Management

Applications needed for business pushed to device from Apple AppStore or Google Market. As well there is option to deploy inside company developed applications. Company can create its own store that has required and optional apps. Deployment is done centrally and from one console.

Protected business application container

Protected container is designed to protect business application and its data on mobile device in encypted container. Allows you to control clipboard between applications, to prevent data leakage between business and private applications.

Connection management

Centralized management of Wifi and VPN profiles on mobile devices: security policies, password and sessions timeout as well other requirements can be pushed to mobile device to comply with company requirements.

Device features management

Company can control which mobile device features are available, and which should be disabled. You can disable to create screen shots, use of camera, sharing of information to social networks and many others.

Micro VPN

Protected and secure chanel to access private (LAN) resources behind firewall on application level. It eliminates need for user to enable VPN on phone level. Only selected applications send traffic to LAN resources.

Wide range of integration options

Solution integrates with IBM Domino, IBM Connections, Microsoft Exchange, Active Directory and other popular systems.

Remote Access

Remote access to device helps IT support to solve problems with mobile devices. Helpdesk can access device information data, as well see remote screen of mobile device to assist users .

Health check of mobile device

Jailbroken/rooted device detection, action on permision to access company resources. Since Jailbroken devices may contain harmfull code it is important to detect them before company data is stored on these devices.

Device location and wiping

If device is lost or stollen, it is possible to locate device, erase sensitive data, which is protected by PINs, passwords and encryption. If employee is leaving company then only company data is removed from device.