InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Can You Push? |
|
Answer» To "PUSH" means to send data or configurations to an employee's device WITHOUT the employee having to take an action. MobileIron pushes security settings, application configurations and profiles. Note that no management PLATFORM can push applications to iOS or Android devices without the user’s permission, though MobileIron does publish the catalog of available apps to the user and then provisions the app at the user’s request. To "push" means to send data or configurations to an employee's device without the employee having to take an action. MobileIron pushes security settings, application configurations and profiles. Note that no management platform can push applications to iOS or Android devices without the user’s permission, though MobileIron does publish the catalog of available apps to the user and then provisions the app at the user’s request. |
|
| 2. |
What Can You Do Over The Air? |
|
Answer» "Over the air" is remote configuration with no physical CONNECTION from the EMPLOYEE device to a computer server. Any data transfer occurs over WIRELESS (WiFi or 3G). In this MODE MobileIron can provision, wipe, encrypt and lock phones, but cannot backup data or upgrade the OS. This limitation is in the process of being ADDRESSED by various OS vendors. "Over the air" is remote configuration with no physical connection from the employee device to a computer server. Any data transfer occurs over wireless (WiFi or 3G). In this mode MobileIron can provision, wipe, encrypt and lock phones, but cannot backup data or upgrade the OS. This limitation is in the process of being addressed by various OS vendors. |
|
| 3. |
What Is An Alert? |
|
Answer» An alert is a notification that is sent to a DEVICE and is TRIGGERED by a policy RULE. It can be a notification using native OS CAPABILITIES, a text message or a BADGE that appears on the MobileIron icon. One example of an alert would be a notification that the device has a banned app installed. An alert is a notification that is sent to a device and is triggered by a policy rule. It can be a notification using native OS capabilities, a text message or a badge that appears on the MobileIron icon. One example of an alert would be a notification that the device has a banned app installed. |
|
| 4. |
What Are Policies And How Do You Use Them? |
|
Answer» Policies are a SET of rules the VSP uses to SECURE, MANAGE and regulate the behavior of the smart devices. One example is a policy that blocks a device from enterprise resources if it is ROOTED or jailbroken. Policies are a set of rules the VSP uses to secure, manage and regulate the behavior of the smart devices. One example is a policy that blocks a device from enterprise resources if it is rooted or jailbroken. |
|
| 5. |
Can You Provide A Secure App Store? |
|
Answer» YES. MobileIron can determine whether or not the DEVICE is compliant with security policy at any given moment in time, ensuring that the APP store and the apps only APPEAR on DEVICES that meet enterprise standards. Yes. MobileIron can determine whether or not the device is compliant with security policy at any given moment in time, ensuring that the app store and the apps only appear on devices that meet enterprise standards. |
|
| 6. |
Can You Perform Jailbreak/root Detection? |
|
Answer» Yes. MobileIron can DETECT if an iOS or ANDROID device has been compromised and can BLOCK the device from ACCESSING corporate resources. Yes. MobileIron can detect if an iOS or Android device has been compromised and can block the device from accessing corporate resources. |
|
| 7. |
Can You Perform Selective Wipe And Restore? |
|
Answer» Yes. MOBILEIRON can WIPE and restore corporate data while KEEPING employee data intact. Yes. MobileIron can wipe and restore corporate data while keeping employee data intact. |
|
| 8. |
Which Encryption Methods Are Used And Supported? |
|
Answer» MobileIron does not provide ENCRYPTION and is AGNOSTIC to native encryption methods. DEPENDING on the operating system, MobileIron is able to create and enforce POLICIES BASED on the encryption status. MobileIron does not provide encryption and is agnostic to native encryption methods. Depending on the operating system, MobileIron is able to create and enforce policies based on the encryption status. |
|
| 9. |
How Does The Client-side Application Work? |
|
Answer» On platforms like IOS and Android, MobileIron makes AVAILABLE a client application that resides on the employee's device. The application allows employee access to MyPhone@Work, enabling the employee to communicate with IT, but also provides real-time application, USAGE, and SECURITY insight into the phone. Where possible, the application runs unobtrusively in the background. Battery impact, space and memory usage are nominal. Since many platforms do not prevent application removal, the MobileIron VSP automatically notifies an IT administrator if the client application has been removed from the employee's phone. On platforms like iOS and Android, MobileIron makes available a client application that resides on the employee's device. The application allows employee access to MyPhone@Work, enabling the employee to communicate with IT, but also provides real-time application, usage, and security insight into the phone. Where possible, the application runs unobtrusively in the background. Battery impact, space and memory usage are nominal. Since many platforms do not prevent application removal, the MobileIron VSP automatically notifies an IT administrator if the client application has been removed from the employee's phone. |
|
| 10. |
Do You Replace Activesync? |
|
Answer» No. The MobileIron solution is COMPLEMENTARY to ActiveSync. ActiveSync mobilizes email and PROVIDES a HANDFUL of basic management settings. MobileIron provides advanced DEVICE management, SECURITY, and application management. No. The MobileIron solution is complementary to ActiveSync. ActiveSync mobilizes email and provides a handful of basic management settings. MobileIron provides advanced device management, security, and application management. |
|
| 11. |
Do You Replace Bes? |
|
Answer» No. The MobileIron solution is complementary to BES (BLACKBERRY ENTERPRISE Server), providing ADDITIONAL features such as real-time TELECOM expense MONITORING. No. The MobileIron solution is complementary to BES (BlackBerry Enterprise Server), providing additional features such as real-time telecom expense monitoring. |
|
| 12. |
Do You Support Delegated Admin? |
|
Answer» CUSTOMERS can use Atlas, MOBILE Iron’s ADVANCED MANAGEMENT and reporting tool for delegated admin features. Customers can use Atlas, Mobile Iron’s advanced management and reporting tool for delegated admin features. |
|
| 13. |
What Is The Difference Between Professional Services And Independent Installation? |
|
Answer» MobileIron and its partners offers a VARIETY of professional SERVICES for guided ASSISTANCE in INSTALLING the MobileIron solution, including training and deployment services. MobileIron and its partners offers a variety of professional services for guided assistance in installing the MobileIron solution, including training and deployment services. |
|
| 14. |
What Is The Difference Between A Perpetual License And Subscription License? |
|
Answer» MobileIron software can be PURCHASED as either a PERPETUAL license with an additional annual SUPPORT FEE, or as a monthly subscription that INCLUDES support. MobileIron software can be purchased as either a perpetual license with an additional annual support fee, or as a monthly subscription that includes support. |
|
| 15. |
What Is The Difference Between Mobileiron's On-premise And Cloud Solution? |
|
Answer» The MobileIron Connected Cloud SOLUTIONS is a subscription-based SaaS offering that gives CUSTOMERS all VSP features and functionality WITHOUT the NEED to install the MobileIron solution in a data center. For an on-premise MobileIron VSP installation, the appliance must reside at an in-house data center or third-party DATACENTER. The MobileIron Connected Cloud solutions is a subscription-based SaaS offering that gives customers all VSP features and functionality without the need to install the MobileIron solution in a data center. For an on-premise MobileIron VSP installation, the appliance must reside at an in-house data center or third-party datacenter. |
|
| 16. |
What Is The Difference Between The Standalone And Integrated Sentry? |
|
Answer» Standalone Sentry SITS inline between the mobile device and the email server. It may be deployed as either a virtual or physical APPLIANCE. Integrated Sentry, which only supports Exchange 2007 and 2010, does not sit inline and is instead installed on the ActiveSync server. For most customers, standalone Sentry is the PREFERRED option because it provides GREATER access control across a greater variety of email systems. The Standalone Sentry acts as a proxy between clients and the mail infrastructure. Integrated Sentry is a Windows service that connects the Microsoft Exchange Server ActiveSync service and the Mobile Iron VSP. The Integrated Sentry can be installed on a Windows 7 or Windows 2008R2 server, or a Windows 2003 server with Power shell 2.0 and .NET 3.5 installed. There is no need for Exchange Management tools to be installed on that machine. However, you need to set up a local or remote support depending on the targeted server (i.e., Local Exchange). Standalone Sentry sits inline between the mobile device and the email server. It may be deployed as either a virtual or physical appliance. Integrated Sentry, which only supports Exchange 2007 and 2010, does not sit inline and is instead installed on the ActiveSync server. For most customers, standalone Sentry is the preferred option because it provides greater access control across a greater variety of email systems. The Standalone Sentry acts as a proxy between clients and the mail infrastructure. Integrated Sentry is a Windows service that connects the Microsoft Exchange Server ActiveSync service and the Mobile Iron VSP. The Integrated Sentry can be installed on a Windows 7 or Windows 2008R2 server, or a Windows 2003 server with Power shell 2.0 and .NET 3.5 installed. There is no need for Exchange Management tools to be installed on that machine. However, you need to set up a local or remote support depending on the targeted server (i.e., Local Exchange). |
|
| 17. |
What Is The Difference Between The Virtual And Physical Vsp? |
|
Answer» The VIRTUAL VSP is a SOFTWARE image downloaded from the MOBILEIRON Support website that can be installed on customer-owned servers. MobileIron SUPPORTS VMware ESX. The physical VSP is a standalone hardware appliance that SHIPS with VSP software already installed. The virtual VSP is a software image downloaded from the MobileIron Support website that can be installed on customer-owned servers. MobileIron supports VMware ESX. The physical VSP is a standalone hardware appliance that ships with VSP software already installed. |
|
| 18. |
How Do You Make Sure A Rogue App Does Not Capture Corporate Data? |
|
Answer» MOBILEIRON AppConnect encrypts and stores all AppConnect Enabled (ACe) APP data in a virtual CONTAINER on the device. ROGUE applications cannot access the data stored in the virtual container. In addition IT administrators can also DEFINE policy on how data is shared between ACe applications. MobileIron AppConnect encrypts and stores all AppConnect Enabled (ACe) app data in a virtual container on the device. Rogue applications cannot access the data stored in the virtual container. In addition IT administrators can also define policy on how data is shared between ACe applications. |
|
| 19. |
How Does Single Sign On Work For Apps? |
|
Answer» MOBILEIRON PROVIDES time-based app-level sign-on across all APPLICATIONS secured using the APPCONNECT PLATFORM. MobileIron provides time-based app-level sign-on across all applications secured using the AppConnect platform. |
|
| 20. |
Can You Filter Web Access? |
|
Answer» Yes, iOS 6 devices supervised by APPLE's Configurator TOOL can be CONFIGURED to globally USE a third-party HTTP proxy. Yes, iOS 6 devices supervised by Apple's Configurator tool can be configured to globally use a third-party HTTP proxy. |
|
| 21. |
Can You Prevent Or Force Application Installation Or Removal? |
|
Answer» No, because most operating systems do not allow it. It is not in the interest of the OS vendor to restrict what APPLICATIONS can be INSTALLED on the device. Instead, MobileIron allows monitoring of applications that are installed on a device and inform administrators and users of non-compliance. The VSP comes pre-loaded with certain bad strings (like "porn") and disallow apps with those titles. Please note that web-clips are not applications, though they appear similar; web-clips, in CONTRAST to apps, MAY be FORCIBLY removed or installed at will. No, because most operating systems do not allow it. It is not in the interest of the OS vendor to restrict what applications can be installed on the device. Instead, MobileIron allows monitoring of applications that are installed on a device and inform administrators and users of non-compliance. The VSP comes pre-loaded with certain bad strings (like "porn") and disallow apps with those titles. Please note that web-clips are not applications, though they appear similar; web-clips, in contrast to apps, may be forcibly removed or installed at will. |
|
| 22. |
Can You Prevent Or Force Os Upgrades? |
|
Answer» No, because most operating systems do not allow it. Instead, the MobileIron solution allows for real-time insight into operating system version (and policy compliance, including WHETHER a phone is jailbroken/rooted) and informs administrators of non-compliance. HOWEVER, administrators can set POLICIES based on OS version and block certain versions from ACCESSING enterprise RESOURCES. No, because most operating systems do not allow it. Instead, the MobileIron solution allows for real-time insight into operating system version (and policy compliance, including whether a phone is jailbroken/rooted) and informs administrators of non-compliance. However, administrators can set policies based on OS version and block certain versions from accessing enterprise resources. |
|
| 23. |
Can You Restrict Voice, Sms, And Data? |
|
Answer» No, because most operating systems do not ALLOW it. Restricting VOICE calls also introduces liability in an emergency situation. Instead, the MobileIron solution allows ADMINISTRATORS to set thresholds and USAGE caps for any time PERIOD, and provides real-time event monitoring and warning of non-compliance. No, because most operating systems do not allow it. Restricting voice calls also introduces liability in an emergency situation. Instead, the MobileIron solution allows administrators to set thresholds and usage caps for any time period, and provides real-time event monitoring and warning of non-compliance. |
|
| 24. |
What Is The Trust/verify Model? |
|
Answer» Lockdown security models fail in mobile because they DAMAGE the user EXPERIENCE. MOBILEIRON introduces a less autocratic and more sustainable model of security: IT sets the CENTRAL POLICY and then monitors devices for compliance. When a device falls out of compliance, IT can take several remediation actions including notifying the user, blocking access to the enterprise, or wiping the mobile device. Lockdown security models fail in mobile because they damage the user experience. MobileIron introduces a less autocratic and more sustainable model of security: IT sets the central policy and then monitors devices for compliance. When a device falls out of compliance, IT can take several remediation actions including notifying the user, blocking access to the enterprise, or wiping the mobile device. |
|
| 25. |
Why Is Having An Enterprise App Store Important? |
|
Answer» An enterprise app store is similar to other app stores, but tailor-made to the needs of a corporation by providing a centralized location for business applications. These applications can be ones that are already readily available in other app stores, or ones that have been CREATED by the enterprise for internal use. When the enterprise app store is on a REGISTERED device and tied to a specific user, not only can the user discover applications easily, but they can ALSO be notified of the APPS that are APPROPRIATE while keeping inappropriate ones from the user. An enterprise app store is similar to other app stores, but tailor-made to the needs of a corporation by providing a centralized location for business applications. These applications can be ones that are already readily available in other app stores, or ones that have been created by the enterprise for internal use. When the enterprise app store is on a registered device and tied to a specific user, not only can the user discover applications easily, but they can also be notified of the apps that are appropriate while keeping inappropriate ones from the user. |
|
| 26. |
Why Is Having An Application (or Agent) On The Device Important? |
|
Answer» An application (or agent) is a piece of software that is installed on a user’s DEVICE. In order to detect jailbroken DEVICES — and thus keep corporate data SECURE — smart devices must have an agent on the device itself, and the agent must be part of the registration PROCESS to ensure that the agent and device is identified with a specific enterprise user. The agent also can check the device and analyze its current state, monitoring for compliance with corporate policies. Without an agent, the device could be compliant during the initial registration process but non-compliant later. Based on the current state of the device, the agent can block the device from corporate resources and SEND alerts. An application (or agent) is a piece of software that is installed on a user’s device. In order to detect jailbroken devices — and thus keep corporate data secure — smart devices must have an agent on the device itself, and the agent must be part of the registration process to ensure that the agent and device is identified with a specific enterprise user. The agent also can check the device and analyze its current state, monitoring for compliance with corporate policies. Without an agent, the device could be compliant during the initial registration process but non-compliant later. Based on the current state of the device, the agent can block the device from corporate resources and send alerts. |
|
| 27. |
Why Is Jailbreak And Root Detection Important? |
|
Answer» To jailbreak (or ROOT) a phone CIRCUMVENTS the built-in security and PROTECTION of the operating system, opening up the phone to malware and unsupported USES. Jailbroken devices also ALLOW any application to be installed on the phone and malicious applications to steal contacts and corporate data. To jailbreak (or root) a phone circumvents the built-in security and protection of the operating system, opening up the phone to malware and unsupported uses. Jailbroken devices also allow any application to be installed on the phone and malicious applications to steal contacts and corporate data. |
|
| 28. |
Why Is Preserving The “native Experience” Important? |
|
Answer» “Native experience” refers to the PARTICULAR design choices, user interaction paradigms, and feature sets chosen by operating system developers to promote and enhance their respective platforms. It is these “native” features that make a Blackberry a Blackberry and an iPhone an iPhone. A crucial factor in the use and adoption of mobile TECHNOLOGY are these individual design decisions and interfaces chosen by operating system developers and embraced by users. For example the native experience of the iPhone includes the Apple email app for COMMUNICATION, the Safari app for browsing, the iTunes app for media, and the ability to download a wide range of other apps to the device. If the user can’t use these features, they can’t take ADVANTAGE of the full potential of the device and will generally be unhappy. There are mobile device management solutions that do not preserve the native experience because they create an artificial, closed environment on the device. Users are forced to use enterprise CAPABILITIES only within this closed environment -- email, browsing and apps are limited to what’s in this walled garden, detracting from the user experience. In addition, these “container-based” solutions often don’t follow industry standards. “Native experience” refers to the particular design choices, user interaction paradigms, and feature sets chosen by operating system developers to promote and enhance their respective platforms. It is these “native” features that make a Blackberry a Blackberry and an iPhone an iPhone. A crucial factor in the use and adoption of mobile technology are these individual design decisions and interfaces chosen by operating system developers and embraced by users. For example the native experience of the iPhone includes the Apple email app for communication, the Safari app for browsing, the iTunes app for media, and the ability to download a wide range of other apps to the device. If the user can’t use these features, they can’t take advantage of the full potential of the device and will generally be unhappy. There are mobile device management solutions that do not preserve the native experience because they create an artificial, closed environment on the device. Users are forced to use enterprise capabilities only within this closed environment -- email, browsing and apps are limited to what’s in this walled garden, detracting from the user experience. In addition, these “container-based” solutions often don’t follow industry standards. |
|
| 29. |
What Is The Enterprise App Storefront? |
|
Answer» The MobileIron enterprise APP storefront provides the employee a catalog of mobile applications tailored to the NEEDS of the enterprise. These apps are either APPROVED by IT and AVAILABLE in commercial app stores or created by IT for internal BUSINESS use. When the enterprise app storefront is on a device registered with MobileIron, it is tied to a specific user so the user can discover applications easily and IT can secure the distribution of enterprise apps. The MobileIron enterprise app storefront provides the employee a catalog of mobile applications tailored to the needs of the enterprise. These apps are either approved by IT and available in commercial app stores or created by IT for internal business use. When the enterprise app storefront is on a device registered with MobileIron, it is tied to a specific user so the user can discover applications easily and IT can secure the distribution of enterprise apps. |
|
| 30. |
What Is Myphone@work? |
|
Answer» MyPhone@Work is the employee's interface to MobileIron, and operates in conjunction with the VSP and Sentry. It can be accessed in two ways: through a web browser or through the MobileIron application on the employee's SMART device. With MyPhone@Work an employee can perform basic administrative tasks without CONTACTING the IT department, such as registering NEW devices and wiping lost devices. On iOS and Android, MyPhone@Work provides an ENTERPRISE app storefront for the DISCOVERY and distribution of enterprise apps and the recommendation of external third-party apps. MyPhone@Work is the employee's interface to MobileIron, and operates in conjunction with the VSP and Sentry. It can be accessed in two ways: through a web browser or through the MobileIron application on the employee's smart device. With MyPhone@Work an employee can perform basic administrative tasks without contacting the IT department, such as registering new devices and wiping lost devices. On iOS and Android, MyPhone@Work provides an enterprise app storefront for the discovery and distribution of enterprise apps and the recommendation of external third-party apps. |
|
| 31. |
What Is Web@work? |
|
Answer» Web@Work is an ENTERPRISE Mobile Browser that enables immediate, secure access to INTERNAL websites and web applications, while preserving a native and high-fidelity web BROWSING experience. Web@Work is an Enterprise Mobile Browser that enables immediate, secure access to internal websites and web applications, while preserving a native and high-fidelity web browsing experience. |
|
| 32. |
Does An App Developer Need To Do Anything Different To Enable The App To Be Appconnect Ready? |
|
Answer» Mobile APPS can be made AppConnect ENABLED by either using the AppConnect SDK or wrapper for IOS and the AppConnect wrapper for Android. Mobile Apps can be made AppConnect enabled by either using the AppConnect SDK or wrapper for iOS and the AppConnect wrapper for Android. |
|
| 33. |
What Kind Of Apps Does Appconnect Work With? Html5, Etc. |
|
Answer» AppConnect can secure both in-house and 3rd party applications. Apps can be made AppConnect ENABLED through EITHER an SDK and wrapper for iOS or a wrapper for ANDROID. SECURITY for HTML5 app is PROVIDED by the AppConnect enabled Web@Work secure browser. AppConnect can secure both in-house and 3rd party applications. Apps can be made AppConnect enabled through either an SDK and wrapper for iOS or a wrapper for Android. Security for HTML5 app is provided by the AppConnect enabled Web@Work secure browser. |
|
| 34. |
What Is Appconnect? |
|
Answer» MOBILEIRON AppConnect creates a secure app CONTAINER through EITHER an SDK and wrapper for iOS or a wrapper for Android. This container is connected to other secure app containers and to the MobileIron console for ongoing management. Security features provided by the AppConnect platform include data-at-rest encryption, SSO, DLP controls, dynamic configuration/ policy updates and selective WIPE of app-specific data. MobileIron AppConnect creates a secure app container through either an SDK and wrapper for iOS or a wrapper for Android. This container is connected to other secure app containers and to the MobileIron console for ongoing management. Security features provided by the AppConnect platform include data-at-rest encryption, SSO, DLP controls, dynamic configuration/ policy updates and selective wipe of app-specific data. |
|
| 35. |
Does Docs@work Support Editing? |
|
Answer» The current version of Docs@Work does not support DOCUMENT EDITING. The current version of Docs@Work does not support document editing. |
|
| 36. |
What Cms Software Does Docs@work Support? |
|
Answer» MOBILEIRON DOCS@WORK WORKS with all CMS SYSTEMS that support IIS and Apache based WebDAV interfaces. MobileIron Docs@Work works with all CMS systems that support IIS and Apache based WebDAV interfaces. |
|
| 37. |
Can You View Documents Offline With Docs@work? |
|
Answer» If enabled by the admin, end-users can SAVE content LOCALLY, within the Docs@Work container for OFFLINE VIEWING. If enabled by the admin, end-users can save content locally, within the Docs@Work container for offline viewing. |
|
| 38. |
How Is Using Docs@work Different From Using The Vpn Client On My Device? |
|
Answer» Docs@Work provides VPN-less access to corporate content repositories like SharePoint via the MobileIron Sentry. End-users have SEAMLESS connectivity to enterprise resources behind the firewall. TRADITIONAL VPN clients require end-users to manually establish a remote CONNECTION to the enterprise to access corporate resources. In addition to seamless access, Docs@Work also provides additional security. Since Docs@Work connects to the intranet via MobileIron Sentry, other applications on the device cannot access sensitive corporate information. Traditional device level VPNs provide device level access to corporate resources. Once the VPN tunnel is ESTABLISHED any application on the device can access sensitive corporate resources. Docs@Work provides VPN-less access to corporate content repositories like SharePoint via the MobileIron Sentry. End-users have seamless connectivity to enterprise resources behind the firewall. Traditional VPN clients require end-users to manually establish a remote connection to the enterprise to access corporate resources. In addition to seamless access, Docs@Work also provides additional security. Since Docs@Work connects to the intranet via MobileIron Sentry, other applications on the device cannot access sensitive corporate information. Traditional device level VPNs provide device level access to corporate resources. Once the VPN tunnel is established any application on the device can access sensitive corporate resources. |
|
| 39. |
What Is Docs@work? |
|
Answer» Docs@Work is a solution for securely MANAGING mobile access to enterprise CONTENT. It gives the END user an INTUITIVE way to access, store, and view documents from email and SharePoint and lets the administrator establish data loss prevention controls to protect these documents from unauthorized distribution. Docs@Work is a solution for securely managing mobile access to enterprise content. It gives the end user an intuitive way to access, store, and view documents from email and SharePoint and lets the administrator establish data loss prevention controls to protect these documents from unauthorized distribution. |
|
| 40. |
What Is The Connected Cloud? |
|
Answer» The MobileIron Connected Cloud solution is a subscription-based SaaS SERVICE that allows the customer to administer the MobileIron solution using a WEB browser over the Internet. There is a Connector, which sits on-premise in the customer's data center and ensures that Connected Cloud syncs with enterprise resources such as LDAP. Sentry, which provides access control for EMAIL, is OPTIONAL and not REQUIRED. The MobileIron Connected Cloud solution is a subscription-based SaaS service that allows the customer to administer the MobileIron solution using a web browser over the Internet. There is a Connector, which sits on-premise in the customer's data center and ensures that Connected Cloud syncs with enterprise resources such as LDAP. Sentry, which provides access control for email, is optional and not required. |
|
| 41. |
What Is Sentry? |
|
Answer» MobileIron Sentry provides access control for email. Sentry connects to Microsoft ActiveSync-enabled email systems such as Microsoft Exchange, IBM LOTUS Notes, Google Gmail, and Microsoft Office 365. Like the VSP, it may be DEPLOYED as a physical hardware appliance or a virtual appliance using VMware ESX. MobileIron Sentry is included in the MobileIron Advanced MANAGEMENT package, THOUGH the hardware appliance is sold separately. MobileIron Sentry provides access control for email. Sentry connects to Microsoft ActiveSync-enabled email systems such as Microsoft Exchange, IBM Lotus Notes, Google Gmail, and Microsoft Office 365. Like the VSP, it may be deployed as a physical hardware appliance or a virtual appliance using VMware ESX. MobileIron Sentry is included in the MobileIron Advanced Management package, though the hardware appliance is sold separately. |
|
| 42. |
How Many Devices Can You Support On One Vsp? |
|
Answer» MOBILEIRON VSP has been tested to manage up to 100,000 devices PER server and up to 200 SIMULTANEOUS DEVICE registrations. MobileIron VSP has been tested to manage up to 100,000 devices per server and up to 200 simultaneous device registrations. |
|
| 43. |
What Is The Virtual Smartphone Platform (vsp)? |
|
Answer» The MobileIron Virtual SMARTPHONE Platform ("VSP") is the central hub of the MobileIron solution. It may be deployed as a physical hardware APPLIANCE or as a virtual appliance USING VMware ESX or Hyper-V. The VSP interfaces with the MobileIron application and enterprise RESOURCES such as LDAP, Exchange ActiveSync, certificate AUTHORITIES. The MobileIron Virtual Smartphone Platform ("VSP") is the central hub of the MobileIron solution. It may be deployed as a physical hardware appliance or as a virtual appliance using VMware ESX or Hyper-V. The VSP interfaces with the MobileIron application and enterprise resources such as LDAP, Exchange ActiveSync, certificate authorities. |
|