Ahmed B Datoo

age ~52

from San Dimas, CA

Also known as:
  • Ahmed Bashir Datoo
  • Ahmed Datd
  • Datoo Ahmed
  • Ahmed O

Ahmed Datoo Phones & Addresses

  • San Dimas, CA
  • Irvine, CA
  • 764 Channing Ave, Palo Alto, CA 94301
  • 329 Ramona St, Palo Alto, CA 94301
  • Atherton, CA
  • Redwood City, CA
  • Chicago, IL
  • Longwood, FL
  • Princeton Junction, NJ
  • Santa Clara, CA
  • San Francisco, CA

Work

  • Position:
    Professional/Technical

Education

  • Degree:
    Graduate or professional degree

Us Patents

  • Secure Mobile Browser For Protecting Enterprise Data

    view source
  • US Patent:
    20140007182, Jan 2, 2014
  • Filed:
    Oct 10, 2012
  • Appl. No.:
    13/649063
  • Inventors:
    Kelly Brian Roach - Palo Alto CA, US
    John M. McGinty - Fremont CA, US
    Olivier Andre - Bry sur Marne, FR
    Shafaq Abdullah - San Mateo CA, US
    Thomas H. DeBenning - Mountain View CA, US
    Ahmed Datoo - Palo Alto CA, US
  • Assignee:
    ZENPRISE, INC. - REDWOOD CITY CA
  • International Classification:
    H04L 29/06
  • US Classification:
    726 1
  • Abstract:
    A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
  • Secure Execution Of Enterprise Applications On Mobile Devices

    view source
  • US Patent:
    20140007222, Jan 2, 2014
  • Filed:
    Oct 10, 2012
  • Appl. No.:
    13/649024
  • Inventors:
    Thomas H. DeBenning - Mountain View CA, US
    Ahmed Datoo - Palo Alto CA, US
    Olivier Andre - Bry sur Marne, FR
    Shafaq Abdullah - San Mateo CA, US
  • Assignee:
    ZENPRISE, INC. - REDWOOD CITY CA
  • International Classification:
    H04L 29/06
  • US Classification:
    726 16
  • Abstract:
    A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
  • Secure Container For Protecting Enterprise Data On A Mobile Device

    view source
  • US Patent:
    20140006347, Jan 2, 2014
  • Filed:
    Oct 10, 2012
  • Appl. No.:
    13/649069
  • Inventors:
    John M. McGinty - Fremond CA, US
    Olivier Andre - Bry sur Marne, FR
    Shafaq Abdullah - San Mateo CA, US
    Thomas H. DeBenning - Mountain View CA, US
    Ahmed Datoo - Palo Alto CA, US
    Kelly Brian Roach - Palo Alto CA, US
  • Assignee:
    ZENPRISE, INC. - Redwood City CA
  • International Classification:
    G06F 21/10
    G06F 17/30
  • US Classification:
    707621, 707783
  • Abstract:
    A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
  • Secure Execution Of Enterprise Applications On Mobile Devices

    view source
  • US Patent:
    20190258781, Aug 22, 2019
  • Filed:
    May 2, 2019
  • Appl. No.:
    16/401588
  • Inventors:
    - Fort Lauderdale FL, US
    Thomas H. DeBenning - Mountain View CA, US
    Ahmed Datoo - Palo Alto CA, US
    Olivier Andre - Bry sur Marne, FR
    Shafaq Abdullah - San Mateo CA, US
    John M. McGinty - Fremont CA, US
    Kelly Brian Roach - Palo Alto CA, US
  • International Classification:
    G06F 21/12
    H04L 29/06
    H04L 29/08
  • Abstract:
    A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
  • Secure Execution Of Enterprise Applications On Mobile Devices

    view source
  • US Patent:
    20190238592, Aug 1, 2019
  • Filed:
    Apr 5, 2018
  • Appl. No.:
    15/946692
  • Inventors:
    - Fort Lauderdale FL, US
    Thomas H. DeBenning - Mountain View CA, US
    Ahmed Datoo - Palo Alto CA, US
    Olivier Andre - Bry sur Marne, FR
    Shafaq Abdullah - San Mateo CA, US
  • International Classification:
    H04L 29/06
    H04L 29/08
  • Abstract:
    A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
  • Secure Execution Of Enterprise Applications On Mobile Devices

    view source
  • US Patent:
    20160099972, Apr 7, 2016
  • Filed:
    Oct 5, 2015
  • Appl. No.:
    14/875450
  • Inventors:
    - Fort Lauderdale FL, US
    Thomas H. DeBenning - Mountain View CA, US
    Ahmed Datoo - Palo Alto CA, US
    Olivier Andre - Bry sur Marne, FR
    Shafaq Abdullah - San Mateo CA, US
  • International Classification:
    H04L 29/06
    H04L 29/08
  • Abstract:
    A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.

Facebook

Ahmed Datoo Photo 1

Ahmed Datoo

view source
Friends:
Mohamed Sameh, Menna Mostafa, Zeina Ahmed, Randa Khashaba, Youssef Bassem Nassar

News

Carrier IQ spyware controversy highlights mobile app access missteps

view source
  • The kind of notifications given to users by mobile applications must be clear and should explainwhy an application needs to connect to a specific device resource, said Ahmed Datoo, vice presidentof marketing at Redwood City, Calif.-based mobile device management vendor Zenprise. Enterprisesface l
  • Date: Dec 06, 2011
  • Category: Sci/Tech
  • Source: Google

BlackBerry blackout is new threat to brand

view source
  • gold standard in security. But employees keep chipping away at the power of IT managers by bringing in their own phones and tablets -- iPhones, iPads or devices powered by Google's (GOOG) Android software-- and demanding to get their work email on them, said Ahmed Datoo, vice president of Zenprise Inc.
  • Date: Oct 14, 2011
  • Category: Sci/Tech
  • Source: Google

BlackBerrys Buzz Back to Life After Long Outage

view source
  • the gold standard in security. But employees keep chipping away at the power of IT managers by bringing in their own phones and tablets iPhones, iPads or devices powered by Google's Android software and demanding to get their work email on them, said Ahmed Datoo, vice president of Zenprise Inc., wh
  • Date: Oct 14, 2011
  • Category: Sci/Tech
  • Source: Google
Blackberry Outages Spread To North America

BlackBerry outages spread to North America

view source
  • At Zenprise Inc., a Fremont, Calif., firm that helps companies manage BlackBerrys issued to employees, vice president Ahmed Datoo said emails started piling up on U.S. servers shortly after midnight. By morning, the congestion was heavy enough at a particular client company to delay all email for Bl
  • Date: Oct 13, 2011
  • Category: Sci/Tech
  • Source: Google

Schwartz On Security: Smile, Your Smartphone Is Watching

view source
  • Both the crowdsourced data collected by Apple and the insecure storage of credentials illustrate how today's smartphones can produce unintended consequences for enterprise security. "Security and privacy concerns in the enterprise are shifting, and one of the key drivers for that is the influx of personal devices--both smartphones and tablets--coming into the workplace," Ahmed Datoo, VP of marketing at mobile device management vendor Zenprise, told me in an interview.
  • Date: Apr 28, 2011
  • Source: Google

Youtube

Ahmed Datoo talks Zenprise for Smartphones

Recorded live on location at the BlackBerry EMEA Alliance Summit 2009 ...

  • Category:
    Science & Technology
  • Uploaded:
    08 Dec, 2009
  • Duration:
    5m 8s

Screencast: Zenprise 3.1

Zenprise automates troubleshooting for Microsoft Exchange Server and B...

  • Category:
    News & Politics
  • Uploaded:
    29 Oct, 2007
  • Duration:
    6m

Hafiz Hasib Ahmed new naat

  • Category:
    Entertainment
  • Uploaded:
    21 Feb, 2011
  • Duration:
    1m 38s

Rejoicing in Rasulullah - Voices of Passion (...

Rejoicing in Rasulullah by Voices of Passion (www.VoicesofPas... from...

  • Category:
    Entertainment
  • Uploaded:
    03 Mar, 2010
  • Duration:
    7m 19s

The Evil of Sectarianism: Its Underpinnings a...

  • Duration:
    1h 32s

Episode 49: Ahmed Datoo of Zenprise

I was delighted to sit down and hear about how things are going with Z...

  • Duration:
    5m 8s

MDM 2.0 is Here. Let's Put Mobile to Work.

Hear from Senior Vice President of Products Ahmed Datoo on the why Zen...

  • Duration:
    2m 31s

Zenprise at Gartner Symposium/ITxpo 2012

Ahmed Datoo, Zenprise's CMO and SVP of Products, discusses trending to...

  • Duration:
    1m 12s

Googleplus

Ahmed Datoo Photo 2

Ahmed Datoo

Ahmed Datoo Photo 3

Ahmed Datoo


Get Report for Ahmed B Datoo from San Dimas, CA, age ~52
Control profile