SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
DIVIDE FEATURES!
Android & iOS comparison
DIVIDE FOR ANDROID
Work and play on a single Android device.

Divide creates a separate, fullyencrypted work environment on
your device. Enabling you to
securely access your work
email (including Exchange
ActiveSync & Lotus Notes),
contacts and calendar.

Company ConïŹdential © 2013 Enterproid!
DIVIDE ANDROID FEATURES
Access work data without compromising privacy.

‱ Secure container for enterprise data on
Android devices (AES 256 bit encryption)
‱ One-click install from Google Play
‱ Divide Files Extension which allows you to
store all of your sensitive data within the cloud
‱ Tunneling to securely connect to pre-existing
enterprise infrastructure
‱ Fully customizable interface that looks and feels
like native Android
‱ Access to Divide Manager, allowing remote
tracking and control of enterprise data
‱ Push third-party apps into the Divide container
via the Manager
‱ Secure dialer and messenger apps that automatically
handle calls and text from work contacts
‱ Timecard widget allows you to turn off work
notifications when you are off the clock

Company ConïŹdential © 2013 Enterproid!
DIVIDE FOR iOS
Work and play on a single iOS device.

Divide for iOS evolves Apple device
to have a secure, enterprise-ready
phone or tablet. Divide leverages
dual persona technology to ensure
that your iPhone or iPad maintains
a secure corporate persona for all
of your sensitive data without
compromising your personal
freedom to use your own device as
you wish.

Company ConïŹdential © 2013 Enterproid!
DIVIDE iOS FEATURES
Access work data without compromising privacy.

‱ Secure container for enterprise data on
iOS devices (AES 256 bit encryption)
‱ One-click install from the App Store
‱ Native-style layout developed specifically for Divide iOS
‱ Integrated, full-screen web apps for Box, LinkedIn and
Salesforce
‱ Real-time remote tracking and control of enterprise data
via Divide Manager
‱ Replaces all iOS third-party enterprise applications with
one simple, out-of-box solution
‱ Renders any iOS 5+ device ready for enterprise usage

Company ConïŹdential © 2013 Enterproid!
DIVIDE FEATURES
Android vs iOS feature comparison

Installation & Activation!

Android!

iOS!

Look, Layout & Corporate Customization!

Compatible across latest versions of OS!

Customize Terms of Service!

Activates and syncs with Google Apps!

Customize Divide Launcher background!

Activates and syncs with Exchange!

Custom Divide Launcher shortcuts!

Activates and syncs with Lotus Notes!

Support for Personal Apps Shortcuts!

iOS!

Look and layout feels native to respective OS!

One-click install from Google Play/App Store!

Android!

Manual Server configuration available!

!

N/A!

Secure integration with Third--‐Party Apps!
Customize Divide Launcher layout!
Customize tips/Message of the Day widgets!

N/A!

Customize placement of widgets on Divide
Launcher screen!

N/A!

Enforce Divide Browser homepage!

Coming
soon!

Configure included Divide applications (Mail,
Contacts, Calendar)!
Configure bookmarks !

Company ConïŹdential © 2013 Enterproid!

Coming
soon!
DIVIDE FEATURES
Android vs iOS feature comparison

Divide Enterprise App Suite!

Android!

iOS!

Divide Enterprise App Suite!

AES 256 bit encryption for all Apps!

Secure Messenger!

Support for attachment viewing in Mail
(images and documents)!

iOS!

Secure Dialer!

Secure Mail!

Android!

SMS to email support!

Attach ïŹles to outgoing messages in Mail
(from device, SD, or Divide Files)!

Coming
soon!

Tasks!

Server side email search (Lotus Notes,
Exchange)!

Meeting mode (silence phone while in
meetings)!

N/A!

Server side email search (Google Apps)!

Timecard support (block work notiïŹcations
when off the clock)!

N/A!

Out-­‐of-­‐ofïŹce email auto-­‐reply set from
device (Exchange feature)!

Coming
soon!

Secure Browser!

Secure Calendar!

Divide Files (Box integration)!

Secure Contacts!

App wrapper for 3rd Party Apps (pushed by IT
from cloud to device)!

Work Contact calls/SMS routed to Divide
Dialer/SMS (policy-­‐dependent)!

Full-­‐screen capable web apps for LinkedIn,
Salesforce, and Box!

Information created on device seamlessly
syncs to server!

Company ConïŹdential © 2013 Enterproid!

Coming
Soon!
N/A!
DIVIDE FEATURES
Android vs iOS feature comparison

Use Self-Service MDM (my.divide.com)!
User can quickly access registered device
through My Divide!

Android!

iOS!
Coming
Soon!

Locate device via GPS!

N/A!

Activate Beacon (loud, piercing audio alert to
help locate device)!

N/A!

User can remotely wipe corporate data!

N/A!

Device Security!

Android!

iOS!

AES 256 Bit Encrypted Application Database!
Screenlock enforcement!
Screenlock password complexity enforcement!
Screenlock password history!
Screenlock password aging!
Screenlock password blacklist!

User can remotely wipe entire device !

N/A!

Screenlock wipe on too many failed password
attempts Remote device wipe!

View & manage installed applications!

N/A!

Data Leakage Prevention!

View network usage for voice, data, and SMS
across both proïŹles!

N/A!

Device timebomb (passive wipe)!

Push URLs to Divide!

N/A!

SMS logging!
Call blacklist!

N/A!

SD card encryption!

N/A!

Anti--‐tamper (root and debugger)!

N/A!

Wipe when debugger enabled!

N/A!

Wipe if certain apps detected!

N/A!

Wipe on SIM removal!

Company ConïŹdential © 2013 Enterproid!

N/A!

N/A!
DIVIDE FEATURES
Android vs iOS feature comparison

Corporate MDM (Divide Manager)!

Android!

iOS!

Corporate MDM (Divide Manager)!

Android!

iOS!

Policy push and enforcement!

Helpdesk tools!

Override policies with ActiveSync policies!

WiïŹ (802.11x) auto-­‐conïŹguration!

N/A!

Inbound outbound phone number whitelist/
blacklist!

N/A!

Hardware/
OS only!

Device reporting (voice, data, SMS)!
Touchless OTA conïŹguration!

Push and install applications on device by
group!

Multiple devices per user!

Update ETP applications seamlessly !

Customizable trigger-­‐based alerting!

N/A!

Automated reporting!
Work-­‐mode application whitelisting!
Full device application whitelisting!

N/A!

Group management!
Multiple policy support!
Multiple domain administration!

Company ConïŹdential © 2013 Enterproid!

Coming
soon!

Coming
soon!
THANK YOU!
Learn more by visiting www.divide.com

DIVIDE NEW YORK. HONG KONG. LONDON.!
COMPANY CONFIDENTIAL © 2012 Enterproid, Inc. Enterproid, Enterproid Divide and the Divide logo are trademarks of Enterproid, Inc. All other product or company names may be
trademarks and /or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, Enterproid, Inc. does not accept liability for
any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.

Weitere Àhnliche Inhalte

Was ist angesagt?

SelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSSelfRJ - Aerogear iOS
SelfRJ - Aerogear iOS
Daniel Passos
 
1356930 634669665657537500
1356930 6346696656575375001356930 634669665657537500
1356930 634669665657537500
Muhammad Hasnain
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
WSO2
 
I pod touch 5th generation
I pod touch 5th generationI pod touch 5th generation
I pod touch 5th generation
ddouglas12
 

Was ist angesagt? (11)

Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
 
SelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSSelfRJ - Aerogear iOS
SelfRJ - Aerogear iOS
 
Nexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYODNexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYOD
 
Remote access for law firms
Remote access for law firmsRemote access for law firms
Remote access for law firms
 
1356930 634669665657537500
1356930 6346696656575375001356930 634669665657537500
1356930 634669665657537500
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
ANDROID NEW EDITION
ANDROID NEW EDITIONANDROID NEW EDITION
ANDROID NEW EDITION
 
Mobile Connections: Rhomobile Training
Mobile Connections: Rhomobile TrainingMobile Connections: Rhomobile Training
Mobile Connections: Rhomobile Training
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
I pod touch 5th generation
I pod touch 5th generationI pod touch 5th generation
I pod touch 5th generation
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 

Andere mochten auch

Andere mochten auch (20)

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Ios seminar
Ios seminarIos seminar
Ios seminar
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS security
 
New features in android m upload
New features in android m   uploadNew features in android m   upload
New features in android m upload
 
Android OS and its Features
Android OS and its FeaturesAndroid OS and its Features
Android OS and its Features
 
Application component
Application componentApplication component
Application component
 
Api List September
Api List SeptemberApi List September
Api List September
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Advance Android Application Development
Advance Android Application DevelopmentAdvance Android Application Development
Advance Android Application Development
 
Android Components
Android ComponentsAndroid Components
Android Components
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 
Android vs ios presentation detailed slides
Android vs ios presentation detailed slidesAndroid vs ios presentation detailed slides
Android vs ios presentation detailed slides
 
Android Vs iOS
Android Vs iOSAndroid Vs iOS
Android Vs iOS
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functions
 
Introduction to Android, Architecture & Components
Introduction to  Android, Architecture & ComponentsIntroduction to  Android, Architecture & Components
Introduction to Android, Architecture & Components
 
Android vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignAndroid vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and Design
 

Ähnlich wie Android vs i os features

iOS enterprise
iOS enterpriseiOS enterprise
iOS enterprise
dominion
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
WSO2
 

Ähnlich wie Android vs i os features (20)

Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Hexnode Kiosk Solution
Hexnode Kiosk SolutionHexnode Kiosk Solution
Hexnode Kiosk Solution
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
iOS enterprise
iOS enterpriseiOS enterprise
iOS enterprise
 
Hexnode iOS Management solution
Hexnode iOS Management solutionHexnode iOS Management solution
Hexnode iOS Management solution
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
 
SecureDocs: iAnnotate
SecureDocs:  iAnnotateSecureDocs:  iAnnotate
SecureDocs: iAnnotate
 
WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 - ïżŒ Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Hopedot VOS secure workspace solution
Hopedot VOS secure workspace solutionHopedot VOS secure workspace solution
Hopedot VOS secure workspace solution
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 

Mehr von Guang Ying Yuan

ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹
ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹
ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹
Guang Ying Yuan
 
Designing and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsDesigning and implementing high performance rule based applications
Designing and implementing high performance rule based applications
Guang Ying Yuan
 
螃èŸčă€çŒ«ć€Žéč°ć’Œè™è 
螃èŸčă€çŒ«ć€Žéč°ć’Œè™è   螃èŸčă€çŒ«ć€Žéč°ć’Œè™è 
螃èŸčă€çŒ«ć€Žéč°ć’Œè™è 
Guang Ying Yuan
 
Lombardi intro full
Lombardi intro  full Lombardi intro  full
Lombardi intro full
Guang Ying Yuan
 
2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my
Guang Ying Yuan
 
ćŸ·ć‹€ć·„äœœæ‰‹ć†Œ
ćŸ·ć‹€ć·„äœœæ‰‹ć†ŒćŸ·ć‹€ć·„äœœæ‰‹ć†Œ
ćŸ·ć‹€ć·„äœœæ‰‹ć†Œ
Guang Ying Yuan
 
Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2
Guang Ying Yuan
 
JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—
JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—
JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—
Guang Ying Yuan
 
64 Interview Questions
64 Interview Questions64 Interview Questions
64 Interview Questions
Guang Ying Yuan
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05
Guang Ying Yuan
 

Mehr von Guang Ying Yuan (20)

ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹
ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹
ă€èŒćœșć„łæ€§éą†ćŻŒćŠ›ă€‘ă€Šć‘ć‰äž€æ­„ă€‹
 
Pulic Speaking
Pulic SpeakingPulic Speaking
Pulic Speaking
 
Jmeter
Jmeter Jmeter
Jmeter
 
Designing and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsDesigning and implementing high performance rule based applications
Designing and implementing high performance rule based applications
 
螃èŸčă€çŒ«ć€Žéč°ć’Œè™è 
螃èŸčă€çŒ«ć€Žéč°ć’Œè™è   螃èŸčă€çŒ«ć€Žéč°ć’Œè™è 
螃èŸčă€çŒ«ć€Žéč°ć’Œè™è 
 
girl
girlgirl
girl
 
Lombardi intro full
Lombardi intro  full Lombardi intro  full
Lombardi intro full
 
2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my
 
ćŸ·ć‹€ć·„äœœæ‰‹ć†Œ
ćŸ·ć‹€ć·„äœœæ‰‹ć†ŒćŸ·ć‹€ć·„äœœæ‰‹ć†Œ
ćŸ·ć‹€ć·„äœœæ‰‹ć†Œ
 
IBM certification
IBM certificationIBM certification
IBM certification
 
Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2
 
JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—
JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—
JavaéąèŻ•éą˜è§Łæƒ‘çł»ćˆ—
 
Abap codebook
Abap codebookAbap codebook
Abap codebook
 
64 Interview Questions
64 Interview Questions64 Interview Questions
64 Interview Questions
 
Filenet API PDF
Filenet API PDFFilenet API PDF
Filenet API PDF
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1
 
Nw2004s What Is New
Nw2004s What Is NewNw2004s What Is New
Nw2004s What Is New
 
It Presales Happy Work Life
It Presales Happy Work LifeIt Presales Happy Work Life
It Presales Happy Work Life
 

KĂŒrzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

KĂŒrzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Android vs i os features

  • 1. DIVIDE FEATURES! Android & iOS comparison
  • 2. DIVIDE FOR ANDROID Work and play on a single Android device. Divide creates a separate, fullyencrypted work environment on your device. Enabling you to securely access your work email (including Exchange ActiveSync & Lotus Notes), contacts and calendar. Company ConïŹdential © 2013 Enterproid!
  • 3. DIVIDE ANDROID FEATURES Access work data without compromising privacy. ‱ Secure container for enterprise data on Android devices (AES 256 bit encryption) ‱ One-click install from Google Play ‱ Divide Files Extension which allows you to store all of your sensitive data within the cloud ‱ Tunneling to securely connect to pre-existing enterprise infrastructure ‱ Fully customizable interface that looks and feels like native Android ‱ Access to Divide Manager, allowing remote tracking and control of enterprise data ‱ Push third-party apps into the Divide container via the Manager ‱ Secure dialer and messenger apps that automatically handle calls and text from work contacts ‱ Timecard widget allows you to turn off work notifications when you are off the clock Company ConïŹdential © 2013 Enterproid!
  • 4. DIVIDE FOR iOS Work and play on a single iOS device. Divide for iOS evolves Apple device to have a secure, enterprise-ready phone or tablet. Divide leverages dual persona technology to ensure that your iPhone or iPad maintains a secure corporate persona for all of your sensitive data without compromising your personal freedom to use your own device as you wish. Company ConïŹdential © 2013 Enterproid!
  • 5. DIVIDE iOS FEATURES Access work data without compromising privacy. ‱ Secure container for enterprise data on iOS devices (AES 256 bit encryption) ‱ One-click install from the App Store ‱ Native-style layout developed specifically for Divide iOS ‱ Integrated, full-screen web apps for Box, LinkedIn and Salesforce ‱ Real-time remote tracking and control of enterprise data via Divide Manager ‱ Replaces all iOS third-party enterprise applications with one simple, out-of-box solution ‱ Renders any iOS 5+ device ready for enterprise usage Company ConïŹdential © 2013 Enterproid!
  • 6. DIVIDE FEATURES Android vs iOS feature comparison Installation & Activation! Android! iOS! Look, Layout & Corporate Customization! Compatible across latest versions of OS! Customize Terms of Service! Activates and syncs with Google Apps! Customize Divide Launcher background! Activates and syncs with Exchange! Custom Divide Launcher shortcuts! Activates and syncs with Lotus Notes! Support for Personal Apps Shortcuts! iOS! Look and layout feels native to respective OS! One-click install from Google Play/App Store! Android! Manual Server configuration available! ! N/A! Secure integration with Third--‐Party Apps! Customize Divide Launcher layout! Customize tips/Message of the Day widgets! N/A! Customize placement of widgets on Divide Launcher screen! N/A! Enforce Divide Browser homepage! Coming soon! Configure included Divide applications (Mail, Contacts, Calendar)! Configure bookmarks ! Company ConïŹdential © 2013 Enterproid! Coming soon!
  • 7. DIVIDE FEATURES Android vs iOS feature comparison Divide Enterprise App Suite! Android! iOS! Divide Enterprise App Suite! AES 256 bit encryption for all Apps! Secure Messenger! Support for attachment viewing in Mail (images and documents)! iOS! Secure Dialer! Secure Mail! Android! SMS to email support! Attach ïŹles to outgoing messages in Mail (from device, SD, or Divide Files)! Coming soon! Tasks! Server side email search (Lotus Notes, Exchange)! Meeting mode (silence phone while in meetings)! N/A! Server side email search (Google Apps)! Timecard support (block work notiïŹcations when off the clock)! N/A! Out-­‐of-­‐ofïŹce email auto-­‐reply set from device (Exchange feature)! Coming soon! Secure Browser! Secure Calendar! Divide Files (Box integration)! Secure Contacts! App wrapper for 3rd Party Apps (pushed by IT from cloud to device)! Work Contact calls/SMS routed to Divide Dialer/SMS (policy-­‐dependent)! Full-­‐screen capable web apps for LinkedIn, Salesforce, and Box! Information created on device seamlessly syncs to server! Company ConïŹdential © 2013 Enterproid! Coming Soon! N/A!
  • 8. DIVIDE FEATURES Android vs iOS feature comparison Use Self-Service MDM (my.divide.com)! User can quickly access registered device through My Divide! Android! iOS! Coming Soon! Locate device via GPS! N/A! Activate Beacon (loud, piercing audio alert to help locate device)! N/A! User can remotely wipe corporate data! N/A! Device Security! Android! iOS! AES 256 Bit Encrypted Application Database! Screenlock enforcement! Screenlock password complexity enforcement! Screenlock password history! Screenlock password aging! Screenlock password blacklist! User can remotely wipe entire device ! N/A! Screenlock wipe on too many failed password attempts Remote device wipe! View & manage installed applications! N/A! Data Leakage Prevention! View network usage for voice, data, and SMS across both proïŹles! N/A! Device timebomb (passive wipe)! Push URLs to Divide! N/A! SMS logging! Call blacklist! N/A! SD card encryption! N/A! Anti--‐tamper (root and debugger)! N/A! Wipe when debugger enabled! N/A! Wipe if certain apps detected! N/A! Wipe on SIM removal! Company ConïŹdential © 2013 Enterproid! N/A! N/A!
  • 9. DIVIDE FEATURES Android vs iOS feature comparison Corporate MDM (Divide Manager)! Android! iOS! Corporate MDM (Divide Manager)! Android! iOS! Policy push and enforcement! Helpdesk tools! Override policies with ActiveSync policies! WiïŹ (802.11x) auto-­‐conïŹguration! N/A! Inbound outbound phone number whitelist/ blacklist! N/A! Hardware/ OS only! Device reporting (voice, data, SMS)! Touchless OTA conïŹguration! Push and install applications on device by group! Multiple devices per user! Update ETP applications seamlessly ! Customizable trigger-­‐based alerting! N/A! Automated reporting! Work-­‐mode application whitelisting! Full device application whitelisting! N/A! Group management! Multiple policy support! Multiple domain administration! Company ConïŹdential © 2013 Enterproid! Coming soon! Coming soon!
  • 10. THANK YOU! Learn more by visiting www.divide.com DIVIDE NEW YORK. HONG KONG. LONDON.! COMPANY CONFIDENTIAL © 2012 Enterproid, Inc. Enterproid, Enterproid Divide and the Divide logo are trademarks of Enterproid, Inc. All other product or company names may be trademarks and /or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, Enterproid, Inc. does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.