Learn something new in an Instant! A short, fast, focused guide delivering immediate results
Install and set up XenMobile
Use Smartphones and tablets at the workplace with XenMobile
Create security policies for mobile devices
Who This Book Is For
If you want to run your mobile enterprises on XenMobile, or work on a BYOD strategy within your organization, then this is the ideal book for you. XenMobile MDM comprehensively explores how to set up and use XenMobile to provision, secure, and manage mobile devices.
Table of Contents
Chapter 1: Instant XenMobile
So, what is XenMobile?
Quick start – setting up your XenMobile server
Top 6 features you need to know about
People and places you should get to know
What You Will Learn
Install XenMobile MDM
Configure a XenMobile server
Optimize a XenMobile Server
Set up email and notifications
configure devices for MDM
Secure mobile devices using XenMobile MDM
Use custom developed applications securely in the workplace
Utilize reports to gain a clear understanding on the impact of mobile devices in your organization
XenMobile is the revolutionary new way to mobilize your business. The product offers security and compliance for IT while giving users mobile device, app, and data freedom. Users gain single-click access to all of their mobile, SaaS, and Windows apps from a unified corporate app store, including seamlessly-integrated email, browser, data sharing, and support apps.
A practical guide showing users how to implement XenMobile MDM, configure the software and server for provisioning and security policies, and deploy application stores. Readers will gain an understanding in how to manage a BYOD environment in organizations.
This book explores how mobile devices are used within organizations, and importantly identifies the common pain points that they experience. You will learn practical solutions on how address these concerns and use XenMobile to solve these problems. You will also learn how to install, configure, and optimize XenMobile MDM software. Finally, you will learn how to configure security policies to protect mobile devices, install custom applications, and configure device settings.
Aamir Lakhani is a leading cyber security architect, senior strategist, and researcher. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations. Lakhani leads projects that implement security postures for Fortune 500 companies, government organizations, major healthcare providers, educational institutions, and financial and media organizations. Lakhani has designed offensive counter-defense measures, and has assisted organizations in defending themselves from active strike-back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, advanced persistent threat (APT) research, and Dark Security. Lakhani is the author and contributor of several books that include Web Penetration Testing with Kali Linux and XenMobile MDM, both by Packt Publishing, and he has appeared on National Public Radio as an expert on cyber security.
Lakhani runs the blog DrChaos.com, which was ranked as a leading source for cyber security by FedTech Magazine. He has been named one of the top personalities to follow on social media, ranked highly as leader in his field, and he continues to dedicate his career to cyber security, research, and education.
We understand your time is important. Uniquely amongst the major publishers, we seek to develop and publish the broadest range of learning and information products on each technology. Every Packt product delivers a specific learning pathway, broadly defined by the Series type. This structured approach enables you to select the pathway which best suits your knowledge level, learning style and task objectives.
As a new user, these step-by-step tutorial guides will give you all the practical skills necessary to become competent and efficient.
Friendly, informal tutorials that provide a practical introduction using examples, activities, and challenges.
Fast paced, concentrated introductions showing the quickest way to put the tool to work in the real world.
A collection of practical self-contained recipes that all users of the technology will find useful for building more powerful and reliable systems.
Guides you through the most common types of project you'll encounter, giving you end-to-end guidance on how to build your specific solution quickly and reliably.
Take your skills to the next level with advanced tutorials that will give you confidence to master the tool's most powerful features.
Accessible to readers adopting the topic, these titles get you into the tool or technology so that you can become an effective user.
Building on core skills you already have, these titles share solutions and expertise so you become a highly productive power user.