Kelly Brian Roach - Palo Alto CA, US John M. McGinty - Fremont CA, US Olivier Andre - Bry sur Marne, FR Shafaq Abdullah - San Mateo CA, US Thomas H. DeBenning - Mountain View CA, US Ahmed Datoo - Palo Alto CA, US
Assignee:
ZENPRISE, INC. - REDWOOD CITY CA
International Classification:
H04L 29/06
US Classification:
726 1
Abstract:
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
Secure Execution Of Enterprise Applications On Mobile Devices
Thomas H. DeBenning - Mountain View CA, US Ahmed Datoo - Palo Alto CA, US Olivier Andre - Bry sur Marne, FR Shafaq Abdullah - San Mateo CA, US
Assignee:
ZENPRISE, INC. - REDWOOD CITY CA
International Classification:
H04L 29/06
US Classification:
726 16
Abstract:
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
Secure Container For Protecting Enterprise Data On A Mobile Device
John M. McGinty - Fremond CA, US Olivier Andre - Bry sur Marne, FR Shafaq Abdullah - San Mateo CA, US Thomas H. DeBenning - Mountain View CA, US Ahmed Datoo - Palo Alto CA, US Kelly Brian Roach - Palo Alto CA, US
Assignee:
ZENPRISE, INC. - Redwood City CA
International Classification:
G06F 21/10 G06F 17/30
US Classification:
707621, 707783
Abstract:
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
Secure Execution Of Enterprise Applications On Mobile Devices
- Fort Lauderdale FL, US Thomas H. DeBenning - Mountain View CA, US Ahmed Datoo - Palo Alto CA, US Olivier Andre - Bry sur Marne, FR Shafaq Abdullah - San Mateo CA, US John M. McGinty - Fremont CA, US Kelly Brian Roach - Palo Alto CA, US
International Classification:
G06F 21/12 H04L 29/06 H04L 29/08
Abstract:
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
Secure Execution Of Enterprise Applications On Mobile Devices
- Fort Lauderdale FL, US Thomas H. DeBenning - Mountain View CA, US Ahmed Datoo - Palo Alto CA, US Olivier Andre - Bry sur Marne, FR Shafaq Abdullah - San Mateo CA, US
International Classification:
H04L 29/06 H04L 29/08
Abstract:
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
Secure Execution Of Enterprise Applications On Mobile Devices
- Fort Lauderdale FL, US Thomas H. DeBenning - Mountain View CA, US Ahmed Datoo - Palo Alto CA, US Olivier Andre - Bry sur Marne, FR Shafaq Abdullah - San Mateo CA, US
International Classification:
H04L 29/06 H04L 29/08
Abstract:
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
The kind of notifications given to users by mobile applications must be clear and should explainwhy an application needs to connect to a specific device resource, said Ahmed Datoo, vice presidentof marketing at Redwood City, Calif.-based mobile device management vendor Zenprise. Enterprisesface l
gold standard in security. But employees keep chipping away at the power of IT managers by bringing in their own phones and tablets -- iPhones, iPads or devices powered by Google's (GOOG) Android software-- and demanding to get their work email on them, said Ahmed Datoo, vice president of Zenprise Inc.
the gold standard in security. But employees keep chipping away at the power of IT managers by bringing in their own phones and tablets iPhones, iPads or devices powered by Google's Android software and demanding to get their work email on them, said Ahmed Datoo, vice president of Zenprise Inc., wh
At Zenprise Inc., a Fremont, Calif., firm that helps companies manage BlackBerrys issued to employees, vice president Ahmed Datoo said emails started piling up on U.S. servers shortly after midnight. By morning, the congestion was heavy enough at a particular client company to delay all email for Bl
Date: Oct 13, 2011
Category: Sci/Tech
Source: Google
Schwartz On Security: Smile, Your Smartphone Is Watching
Both the crowdsourced data collected by Apple and the insecure storage of credentials illustrate how today's smartphones can produce unintended consequences for enterprise security. "Security and privacy concerns in the enterprise are shifting, and one of the key drivers for that is the influx of personal devices--both smartphones and tablets--coming into the workplace," Ahmed Datoo, VP of marketing at mobile device management vendor Zenprise, told me in an interview.
Date: Apr 28, 2011
Source: Google
Youtube
Ahmed Datoo talks Zenprise for Smartphones
Recorded live on location at the BlackBerry EMEA Alliance Summit 2009 ...
Category:
Science & Technology
Uploaded:
08 Dec, 2009
Duration:
5m 8s
Screencast: Zenprise 3.1
Zenprise automates troubleshooting for Microsoft Exchange Server and B...
Category:
News & Politics
Uploaded:
29 Oct, 2007
Duration:
6m
Hafiz Hasib Ahmed new naat
Category:
Entertainment
Uploaded:
21 Feb, 2011
Duration:
1m 38s
Rejoicing in Rasulullah - Voices of Passion (...
Rejoicing in Rasulullah by Voices of Passion (www.VoicesofPas... from...
Category:
Entertainment
Uploaded:
03 Mar, 2010
Duration:
7m 19s
The Evil of Sectarianism: Its Underpinnings a...
Duration:
1h 32s
Episode 49: Ahmed Datoo of Zenprise
I was delighted to sit down and hear about how things are going with Z...
Duration:
5m 8s
MDM 2.0 is Here. Let's Put Mobile to Work.
Hear from Senior Vice President of Products Ahmed Datoo on the why Zen...
Duration:
2m 31s
Zenprise at Gartner Symposium/ITxpo 2012
Ahmed Datoo, Zenprise's CMO and SVP of Products, discusses trending to...