Enterprise security integration
July 2012
Note: This information is provided as a reference and does not imply that Juniper Systems will provide full support for the use of any specific third-party device or software with a Juniper Systems product.
Our rugged handheld computer products can be incorporated into secure enterprise / corporate networks in several ways. When first approaching such integration, you must first determine the extent to which the handheld will be incorporated. Some IT network terms and technologies that may help in that determination are listed below.
- Mobile Device Management (MDM) - http://en.wikipedia.org/wiki/Mobile_device_management
- Bring Your Own Device (BYOD) - http://en.wikipedia.org/wiki/Bring_your_own_device
- Security Suite integration
- Locking device to only allow specific apps and functions to run
- Firewall access
- Virus scan protection
- Network file share access
- Virtual Private Network (VPN) - http://en.wikipedia.org/wiki/Virtual_private_network
- Storage memory or file encryption
Some overall utilities that can be used for integrating our rugged handheld computer products into a secure enterprise system are available from the following companies and described at the following web pages.
- SOTI - http://www.soti.net/solutions/mobile-device-management/
- AirWatch - http://www.air-watch.com/solutions/mobile-device-management
- WaveLink - http://www.wavelink.com/
- Bomgar - http://www.bomgar.com/remotedesktopaccess/multi-platform/windows-mobile.htm
- Symantec (Odyssey) - http://www.symantec.com/mobile-device-security
- McAfee - http://www.mcafee.com/us/products/mobile-security/index.aspx
- Trend Micro - http://www.trendmicro.com/us/enterprise/product-security/mobile-security/index.html
- Zenprise - http://www.zenprise.com/solutions/windows-mobile-management
- MobileIron - http://www.mobileiron.com/en/multi-os-management/windows-phone-management
- Microsoft - http://technet.microsoft.com/en-us/systemcenter/bb968863
- Kapersky - http://www.kaspersky.com/mobile_downloads
- 42Gears - http://www.42gears.com/suremdm/
Virus scan and other Internet-protection only:
- http://www.bitdefender.com/oem/mobile-products.html
- http://www.bullguard.com/products/bullguard-mobile-security-10/windows-mobile-security.aspx
- http://www.airscanner.com
- http://www.f-secure.com/en/web/home_global/protection/mobile-security/overview
Memory encryption only:
- http://msdn.microsoft.com/en-us/library/bb416357.aspx
- http://www.aikosolutions.com/products/secubox-for-windows-ce/
- http://mosaicsecurity.com/products/1139-security-box-mobile
- http://www.airscanner.com/products/encrypter/
The custom system processes on the A2 (Archer 2 or Allegro 2) that we recommend should be allowed to run (not black listed) by enterprise security are as follows.
- A2_ImageSink_Helper.exe
- A2_PowerButtonMenu.exe
- A2_KeyAction.exe
- A2_ClickZoom.exe
- A2_HotDogToast.exe (pop-up warning if unit exceeds upper temperature specification)
- A2_RecordButton.exe
- A2_TimeUpdate.exe
- A2_WatchDogToast.exe
- A2_BarcodeButton.exe
- A2_Barcode.exe
- A2_GnssStream.exe
- ScreenGrabber.exe (if wanting to save screen shots)
Similar custom system processes on the Mesa Rugged Notepad are as follows.
- Mesa_GPSBreadcrumb.exe
- Mesa_ImageSink_Helper.exe
- Mesa_KeyAction.exe
- Mesa_RecordButton.exe
- PWB_Menu.exe
- AdobeReaderLE.exe (if needing to be able to view PDF files)