Ultima - Mobile Data Security

T
ULTIMA – SECURE MOBILE EMAIL SOLUTIONS & SERVICES
                              Ultima is a leading provider of infrastructure solutions, with extensive deployment experience and top-tier
                              accreditations. In addition to being a Good Certified Partner, we are qualified to offer end-to-end services around
                              the Good Technologies enterprise product family, and have the ability to deliver complex solutions, backed up by
                              comprehensive lifecycle support. We maintain a dedicated Microsoft and Networking Security practices within our
                              Services Division, ensuring that our consultants have the necessary support required to become experts in their
                              chosen field. Our team of Microsoft certified professionals have years of real world technical messaging experience,
                              spanning multiple generations of the core products.


Ultima has extensive expertise in designing and delivering multi-vendor, best of breed messaging and security solutions, including those
from: Cisco, Microsoft, Check Point, Trend, RSA, Websense and Symantec. We are also able to integrate complementary products including:
WAN, LAN, Wireless, Unified Communications and Security Management.


GOOD TECHNOLOGY PRODUCT INFORMATION

                                        Corporate apps, Intranets                                         iPhone OS, Android, Palm
                                                                                    Device Support
Email Security and Remote
Access                                  Document repositories, Corporate IM                               Windows Mobile and Symbian


                                        Email, attachments                                                One place to manage and secure mobile
                                        & PIM                                                             devices
                                                                                    Simplified
                                                                                    Management            Create policy sets and assign to user
Message Delivery                        BES type message delivery                                         groups
                                                                                                          Web-based Console

                                        AES-192 encryption
                                                                                                          Works on any internet connected
Encrypted Transport Security            FIPS 140-2 certificate                      Wireless
                                                                                                          network
                                        CESG IL2

                                                                                                          Personal Data :
                                        Jailbreak/Rooted Detection
                                                                                                          Devices remain personal
                                        Hardware Model Control                      Separate Personal     Untouched by enterprise
                                                                                    and
Compliance and                                                                      Enterprise Data       Enterprise Data :
                                        OS Version control
Control                                                                                                   Enterprise data lockdown
                                        Client Version control
Management Parameters                                                                                     Data encryption

                                        Connectivity Verification
                                                                                    Remote Wipe           Advanced Remote Wipe Policies
                                        GMM Client Lock Screen Disclaimer


With over 20 years experience in providing cutting edge IT solutions, year on year growth and a consistent record of delivery, Ultima is
ideally placed to deliver end to end services and solutions to your business. We also recognise that organisations may not have the in-house
resources available or the experience necessary to implement complex IT networking and security projects, and so we have built an
experienced team of qualified Consultants that are available to complement your existing in-house IT resource with additional skills and
expertise.


Ultima Place, 448a Basingstoke Road                                                                             Enquiries: enquiries@ultimabusiness.com
Reading, Berkshire, RG2 0RX                                                                                          Visit us at www.ultimabusiness.com

Tel: 0118 9027500 | Fax: 0118 9027400                                                                                  © 2010 Ultima Business Solutions

Recomendados

Windows 7 security enhancements von
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
1.2K views37 Folien
Cat6500 Praesentation von
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
1.3K views32 Folien
Rsa Secur Id From Signify von
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
154 views2 Folien
NGN Company Profile November08 von
NGN Company Profile November08NGN Company Profile November08
NGN Company Profile November08Serdar Salepcioglu
383 views12 Folien
Lime access 2013-en von
Lime access 2013-enLime access 2013-en
Lime access 2013-enAna González Monzón
207 views10 Folien
Signify Overview von
Signify OverviewSignify Overview
Signify Overviewpjpallen
65 views2 Folien

Más contenido relacionado

Was ist angesagt?

SafeNet - Data Protection Company von
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
2.1K views35 Folien
The Context Aware Network A Holistic Approach to BYOD von
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODCisco Canada
2.2K views38 Folien
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta... von
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
674 views30 Folien
IBM Infosphere Guardium - Database Security von
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
8.4K views76 Folien
Dev004103 von
Dev004103Dev004103
Dev004103alwayson
234 views2 Folien
Aus lug lotus protector von
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protectoraosborne
812 views37 Folien

Was ist angesagt?(18)

SafeNet - Data Protection Company von ASBIS SK
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
ASBIS SK2.1K views
The Context Aware Network A Holistic Approach to BYOD von Cisco Canada
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
Cisco Canada2.2K views
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta... von Microsoft Private Cloud
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
IBM Infosphere Guardium - Database Security von ebuc
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc8.4K views
Dev004103 von alwayson
Dev004103Dev004103
Dev004103
alwayson234 views
Aus lug lotus protector von aosborne
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protector
aosborne812 views
Life & Work Online Protecting Your Identity von InnoTech
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
InnoTech409 views
Guardium value proposition for fss pn 12 02-10 von Avirot Mitamura
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura1.8K views
2p Mta Data Sheet V1.7 X1a von alwayson
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
alwayson182 views
Take Control of End User Security von anniebrowny
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
anniebrowny556 views
Micro Networks Compnay Profile von Micro Networks
Micro Networks Compnay ProfileMicro Networks Compnay Profile
Micro Networks Compnay Profile
Micro Networks354 views
IBM InfoSphere Guardium overview von nazeer325
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
nazeer32528.2K views

Similar a Ultima - Mobile Data Security

VSD Infotech von
VSD InfotechVSD Infotech
VSD InfotechVSD infotech
191 views2 Folien
Intel Cloud Summit: Greg Brown McAfee von
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
2.3K views32 Folien
Symantec Enterprise Mobility - Mobile World Congress February 2012 von
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
1.2K views14 Folien
HTLV - DSS @Vilnius 2010 von
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
597 views23 Folien
Symantec Enterprise Mobility Vision May 2012 von
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
1.2K views11 Folien
Information Security von
Information SecurityInformation Security
Information SecurityMohit8780
687 views37 Folien

Similar a Ultima - Mobile Data Security(20)

Intel Cloud Summit: Greg Brown McAfee von IntelAPAC
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC2.3K views
Symantec Enterprise Mobility - Mobile World Congress February 2012 von Symantec
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec1.2K views
Symantec Enterprise Mobility Vision May 2012 von Symantec
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
Symantec1.2K views
Information Security von Mohit8780
Information SecurityInformation Security
Information Security
Mohit8780687 views
An Introduction to South Seas Corporation von Ed Mohr
An Introduction to South Seas CorporationAn Introduction to South Seas Corporation
An Introduction to South Seas Corporation
Ed Mohr92 views
Maintaining Trust & Control of your Data in the Cloud von Amazon Web Services
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Managed vs customer presentation von hemanth102030
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
hemanth102030251 views
Desktop as a Service DaaS in India by BSNL SIS von SATYAVEER PAL
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
SATYAVEER PAL1.9K views
Signify Passcode On Demand von kate_holden
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
kate_holden229 views
Signify Passcode On Demand von pjpallen
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
pjpallen106 views
Trend micro data protection von Andrew Wong
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong1.9K views
Panda Cloud Protection - protectie maxima, costuri reduse von IDG Romania
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
IDG Romania695 views
Security and Privacy in the AWS Cloud - AWS India Summit 2012 von Amazon Web Services
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Amazon Web Services2.2K views
Securing Your Cloud Applications with Novell Cloud Security Service von Novell
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
Novell489 views
Consumerization of IT MSL Jumpstart Keynote von David Tesar
Consumerization of IT MSL Jumpstart KeynoteConsumerization of IT MSL Jumpstart Keynote
Consumerization of IT MSL Jumpstart Keynote
David Tesar756 views

Último

Transcript: The Details of Description Techniques tips and tangents on altern... von
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
130 views15 Folien
Understanding GenAI/LLM and What is Google Offering - Felix Goh von
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
41 views33 Folien
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV von
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
88 views20 Folien
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu... von
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...NUS-ISS
37 views54 Folien
Throughput von
ThroughputThroughput
ThroughputMoisés Armani Ramírez
36 views11 Folien
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... von
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...Vadym Kazulkin
75 views64 Folien

Último(20)

Transcript: The Details of Description Techniques tips and tangents on altern... von BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada130 views
Understanding GenAI/LLM and What is Google Offering - Felix Goh von NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS41 views
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV von Splunk
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk88 views
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu... von NUS-ISS
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS37 views
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... von Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin75 views
Special_edition_innovator_2023.pdf von WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 views
Empathic Computing: Delivering the Potential of the Metaverse von Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 views
.conf Go 2023 - Data analysis as a routine von Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk93 views
Spesifikasi Lengkap ASUS Vivobook Go 14 von Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 views
RADIUS-Omnichannel Interaction System von RADIUS
RADIUS-Omnichannel Interaction SystemRADIUS-Omnichannel Interaction System
RADIUS-Omnichannel Interaction System
RADIUS15 views
Perth MeetUp November 2023 von Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price15 views
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... von NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 views
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software225 views

Ultima - Mobile Data Security

  • 1. ULTIMA – SECURE MOBILE EMAIL SOLUTIONS & SERVICES Ultima is a leading provider of infrastructure solutions, with extensive deployment experience and top-tier accreditations. In addition to being a Good Certified Partner, we are qualified to offer end-to-end services around the Good Technologies enterprise product family, and have the ability to deliver complex solutions, backed up by comprehensive lifecycle support. We maintain a dedicated Microsoft and Networking Security practices within our Services Division, ensuring that our consultants have the necessary support required to become experts in their chosen field. Our team of Microsoft certified professionals have years of real world technical messaging experience, spanning multiple generations of the core products. Ultima has extensive expertise in designing and delivering multi-vendor, best of breed messaging and security solutions, including those from: Cisco, Microsoft, Check Point, Trend, RSA, Websense and Symantec. We are also able to integrate complementary products including: WAN, LAN, Wireless, Unified Communications and Security Management. GOOD TECHNOLOGY PRODUCT INFORMATION Corporate apps, Intranets iPhone OS, Android, Palm Device Support Email Security and Remote Access Document repositories, Corporate IM Windows Mobile and Symbian Email, attachments One place to manage and secure mobile & PIM devices Simplified Management Create policy sets and assign to user Message Delivery BES type message delivery groups Web-based Console AES-192 encryption Works on any internet connected Encrypted Transport Security FIPS 140-2 certificate Wireless network CESG IL2 Personal Data : Jailbreak/Rooted Detection Devices remain personal Hardware Model Control Separate Personal Untouched by enterprise and Compliance and Enterprise Data Enterprise Data : OS Version control Control Enterprise data lockdown Client Version control Management Parameters Data encryption Connectivity Verification Remote Wipe Advanced Remote Wipe Policies GMM Client Lock Screen Disclaimer With over 20 years experience in providing cutting edge IT solutions, year on year growth and a consistent record of delivery, Ultima is ideally placed to deliver end to end services and solutions to your business. We also recognise that organisations may not have the in-house resources available or the experience necessary to implement complex IT networking and security projects, and so we have built an experienced team of qualified Consultants that are available to complement your existing in-house IT resource with additional skills and expertise. Ultima Place, 448a Basingstoke Road Enquiries: enquiries@ultimabusiness.com Reading, Berkshire, RG2 0RX Visit us at www.ultimabusiness.com Tel: 0118 9027500 | Fax: 0118 9027400 © 2010 Ultima Business Solutions