Inside Zenprise's Newest BYOD Tools
By Michael Endler
InformationWeek
Zenprise intends to help users preserve this balance with two new products announced Tuesday: MobileManager 8.0 (MM8), the newest iteration of the company's MDM platform, and Zensuite, a collection of productivity tools built on the MM8 foundation.
The new offerings follow an industry trend of defining mobile devices in terms of opportunities rather than risks. IBM underscored this angle, for instance, when it announced new mobility products earlier week. Zenprise, though, has been espousing this view for some time. September's release of MobileManager 7.0, for example, included standard fare such as policy controls and encryption -- but also productivity boosters, such as native SharePoint integration and annotation support.
Zensuite preserves these existing features while adding several new capabilities designed to keep mobile devices both secure and appealing. Chief among these is a maturation of the company's app tunneling implementation, which creates a secure, VPN-like pathway between the corporate intranet and the device.
[ Read BYOD Security Tops Doctors' Mobile Device Worries. ]
Though not ubiquitous, tunnels are supported by other mobile enterprise management (MEM) providers, such as MobileIron, which incorporated the function into its product earlier this month. Even so, Zenprise hopes to differentiate its takes on the technology by associating it with specific uses and benefits.
"Some companies provide IT with a toolbox and say, 'You put together a solution,'" Zenprise CMO Ahmed Datoo said in an interview. "The productivity suite is not a series of technologies. It's driven by use cases."
Those use cases include the need to collaborate through browser-based tools and apps. Zensuite offers a secure browser that filters inappropriate or malicious content, and over which IT has many controls, including the ability to selectively wipe caches of intranet data; push approved bookmarks; and set content-specific, role-based policies. More novel, though, is the browser's compression capabilities; somewhat like Windows Phone 8's Data Sense, the Zenprise browser is designed to reduce data transfer costs by translating webpages into smaller packages. Datoo said some pages' data footprints can be reduced by as much as 95%.
Amit Pandey, the company's CEO and president, said in an interview that the browser is not only more data conscious but, because less information is being pushed around, it's also speedier. This benefit should extend to all apps within the Zenprise wrapper, he said. "We can make apps look faster than they are," he said. "If you can't make the apps fast, no one's going to use them."
Pandey emphasized that the browser preserves the look and feel of the OS's native UI without skimping on security. He said that deploying a full VPN could allow every app to tap the intranet "by making [the tunnel] specific to the app itself." Zensuite "reduces the chances that rogue apps have access," he said.
Productivity is not impeded by the individual pathways, noted Datoo -- all apps within the Zensuite container can interact with one another to the extent that they comply with IT policy, eliminating the need for cumbersome extra steps, such as unique authentication for every app. The tunnels provide additional cost-minimizing controls, noted Datoo. An administrator can allow a user to transfer data across a cellular network in certain situations; for example, while limiting transfers to Wi-Fi in others.
The new product also gives emails and attached documents a boost. Like the browser, the Zensuite email interface maintains the UI of the native client -- but it applies encryption that can make popular-but-risky collaboration tools more secure. Services such as Dropbox are "petrifying to IT," but Zensuite reduces these concerns, said Pandey, because files are encrypted within the suite and read within a secure container. As a result, if they're saved to Dropbox and then accessed by an unauthorized device, the content will "show up garbled."
Despite the new features, Zenprise still faces stiff competition from other MEM vendors, particularly now that huge companies such as IBM and Dell are trying harder to muscle in on the BYOD action.
Chris Hazelton, a research director at 451 Research, likes Zenprise's odds. Not all players within the MEM space are going to survive, said Hazelton in an interview. "Zenprise will be one of the few because they've rolled with the punches the MDM market has taken," he said. While many vendors play catch-up, Zenprise often has been at the vanguard, said Hazelton, citing the company's shift from device management to app management earlier than many of its competitors. Another example is the benefits of Zenprise's SDK, which allows developers to, among other things, apply app-wrapping while complying with user agreements and policies.
Zensuite offers immediate support for iOS and Android. Windows Phone 8 is currently supported by Zenprise's management tools and will be integrated into the productivity suite in the first quarter of 2013.
Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new Holes In BYOD issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).

| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.



Subscribe to RSS