As a result of the increase in the range of devices used by end users within the company, device management needs of IT departments have started to increase. With the developing technological infrastructure, the Internet of Things (IoT) devices become widespread in the corporate environment, and this requires a separate management for each platform. Unified endpoint management enables desktop operating systems, mobile device operating systems and Internet of Things (IoT) devices to be managed over a single interface. Unified endpoint management enables IT departments to manage and monitor all devices, applications and users through a single interface.
The personal data / sensitive personal data is owned by the companies are responsible for the data. As a result of this responsibility, the endpoints that the end users carry, process or share the data with must be monitored, recorded and secured. With the combined endpoint solution, data can be traced at the endpoints where the data is available, such as who the data owner is, where it is held, and which user uses it. The combined endpoint solution provides data managers with the ability to block security breaches, along with writing compliance policies.
With UEM Solution;
- Operating systems of endpoint devices within the company can be centrally managed over a single platform.
- In different operating systems, the same security policies are implemented in company standards.
- Compliance policies can be written on operating systems, so that secure or less secure operating system access can be restricted.
- By providing integration with virtualization environments, end-user devices are enabled to work on environments such as virtual desktops or virtual applications without having to carry data.
- In cases of possible infringement, an destruction policy can be written on the devices which do not communicate with the system within the periods specified. Corporate data are destroying themselves.
- With the rules prepared automatically, it is possible to stop access to corporate data and to destroy existing data in case of termination of work.
The MAM solution provided to the IT departments technically;
1. Application Inventory Management
a. Managed application tracking on the device
b. Managed application version tracking on device
c. Application life cycle
2. Application Policy Management
a. Setting the application settings from the center
b. Password requirement on applications
c. Restrict access to device resources
d. Implementation of network settings
e. Management of application interaction
3. Application Security Management
a. Encrypting application data
b. Managing application interactions
c. Ensuring application secure network connections
d. Remote application locking
e. Delete remote application data
f. Data leak policies on application
g. Automating application ID entries
MAM Properties;
• Data protection with active policy enforcement
• Data protection with separate encryption
• Data protection over the air
• User authentication policies
• Online session policies
• Geofencing policies
• Kill pill
• Data encryption and secure VPN options
• Secure productivity apps
• Software development kits (SDKs) and application wrapping
• containerization
• Device level MAM
• App. level MAM
UEM (Unified Endpoint Management)
As a result of the increase in the range of devices used by end users within the company, device management needs of IT departments have started to increase. With the developing technological infrastructure, the Internet of Things (IoT) devices become widespread in the corporate environment, and this requires a separate management for each platform. Unified endpoint management enables desktop operating systems, mobile device operating systems and Internet of Things (IoT) devices to be managed over a single interface. Unified endpoint management enables IT departments to manage and monitor all devices, applications and users through a single interface.
The personal data / special personal data is owned by the companies responsible for the data. As a result of this responsibility, the endpoints that the end users carry, process or share the data with must be monitored, recorded and secured. With the combined endpoint solution, data can be traced at the endpoints where the data is available, such as who the data owner is, where it is held, and which user uses it. The combined endpoint solution provides data managers with the ability to block security breaches, along with writing compliance policies.
With UEM Solution;
- Operating systems of endpoint devices within the company can be centrally managed over a single platform.
- In different operating systems, the same security policies are implemented in company standards.
- Compliance policies can be written on operating systems, so that secure or less secure operating system access can be restricted.
- By providing integration with virtualization environments, end-user devices are enabled to work on environments such as virtual desktops or virtual applications without having to carry data.
- In cases of possible infringement, an destruction policy can be written on the devices which do not communicate with the system within the periods specified. Corporate data are destroying themselves.
- ith the rules prepared automatically, it is possible to stop access to corporate data and to destroy existing data in case of termination of work.
- Cryptic applications are distributed and security of data is increased over endpoint devices.
The UEM Solution provided to the IT departments technically;
1. Device Inventory Management
a. Device registration
b. Asset tracking
c. Device life cycle
2. Device Policy Management
a. Device policy definitions
b. Determination of device standards
c. Device policy maintenance
D. Compelling policy designations
3. Device Security Management
a. Device safety checks
b. Forcing device security policies
c. Device compatibility monitoring
D. Device incompatibility detection
4. Device Imaging and Reporting
a. Real-time device status monitoring
b. Producing alarm alerts
c. Keeping motion records
D. Receiving device location information
UEM Features;
• Self enrollment
• Directory integration
• Acceptable use policy
• Asset details
• Change history
• Remote wipe
• Acceptance critea
• Group / location policies
• Policy refresh
• Compliance checks
• Enforcement actions
• PIN / password
• Inactivity timeout
• Login failure
• Device encryption
• Contact
• Secure Wi-Fi, VPN, E-mail
• Jailbreak / Root detection
• Blacklist enforcement
• Configurable dashboard
• Request check-in
• GPS mapping / tracking
• Custom reports
• Summary detail views
• Data protection with active policy enforcement
• Data protection with separate encryption
• Data protection over the air
• User authentication policies
• Online session policies
• Geofencing policies
• Kill pill
• Data encryption and secure VPN options
• Secure productivity apps
• Software development kits (SDKs) and application wrapping
• containerization
• Device level MAM
• App. level MAM
EFSS (Enterprise File Sync and Share / Enterprise File Synchronization and Sharing)
The need to ensure the control and management of the growing dispersed data of corporate companies has started to increase day by day. Together with the EFSS solution, corporate companies can share their business partners or external data flows under control. With the help of EFSS solutions, who is excluded from the company infrastructure, who is sent by whom, the security of the data according to the criticality of the data, writing security policies, integration with corporate applications and end users are allowed to work on a file at the same time.
A security measure should be taken to take into account the external circulation of personal data / private personal data within the scope of the KVK Law. With the EFSS solution, cloud-based solutions that are used by end users as an alternative are provided instead of an infrastructure which can be managed by corporate and information processing.
With EFSS Solution;
- Personal data fields can be provided to end users, and quota can be added to data fields according to user profiles.
- Secure file transfer can be performed by accessing the file servers in internal sources through mobile applications.
- Together with online proofreading options, end users can work on office files at the same time.
- For business partners or file requests, end users can create links to upload files to their own personal space.
- The shares of the end user files can be made through the links and the load on the mail servers can be alleviated.
- Security policies can be applied for files shared through links.
- By working with data leakage programs, critical data can be detected in uploaded or shared files and necessary security measures can be taken.
The EFSS Solution provided to the IT departments technically;
1. Secure file space
a. Secure file sharing
b. Secure file synchronization
. Content management
a. Secure access with desktop applications
b. Secure access with mobile applications
c. File server access
3. Collaboration solution
a. O365 integration
b. Workflows
c. Outlook plug-in
a. Detailed file sharing report
b. Detailed field usage report
EFSS Features;
• Collaboration
• File sharing
• File sync
• File connectors
• DLP integration
• Embeded IRM
• Productivity apps.
• Workflows
• Enterprise forms
• Detail reports
• User management
• Client management
• Data encryption
• Hybrid storage
• Outlook plug-in
• Mobile app.
• Desktop app.
• Sync tools
• E-Signature
Sentra works with VmWare Airwatch and Citrix for Enterprise Mobility Management. For more information about Enterprise Mobility solutions, you can use the resources tab of our site or call the Sentra sales channel directly.