SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
DIVIDE FEATURES!
Android & iOS comparison
DIVIDE FOR ANDROID
Work and play on a single Android device.

Divide creates a separate, fullyencrypted work environment on
your device. Enabling you to
securely access your work
email (including Exchange
ActiveSync & Lotus Notes),
contacts and calendar.

Company Confidential © 2013 Enterproid!
DIVIDE ANDROID FEATURES
Access work data without compromising privacy.

• Secure container for enterprise data on
Android devices (AES 256 bit encryption)
• One-click install from Google Play
• Divide Files Extension which allows you to
store all of your sensitive data within the cloud
• Tunneling to securely connect to pre-existing
enterprise infrastructure
• Fully customizable interface that looks and feels
like native Android
• Access to Divide Manager, allowing remote
tracking and control of enterprise data
• Push third-party apps into the Divide container
via the Manager
• Secure dialer and messenger apps that automatically
handle calls and text from work contacts
• Timecard widget allows you to turn off work
notifications when you are off the clock

Company Confidential © 2013 Enterproid!
DIVIDE FOR iOS
Work and play on a single iOS device.

Divide for iOS evolves Apple device
to have a secure, enterprise-ready
phone or tablet. Divide leverages
dual persona technology to ensure
that your iPhone or iPad maintains
a secure corporate persona for all
of your sensitive data without
compromising your personal
freedom to use your own device as
you wish.

Company Confidential © 2013 Enterproid!
DIVIDE iOS FEATURES
Access work data without compromising privacy.

• Secure container for enterprise data on
iOS devices (AES 256 bit encryption)
• One-click install from the App Store
• Native-style layout developed specifically for Divide iOS
• Integrated, full-screen web apps for Box, LinkedIn and
Salesforce
• Real-time remote tracking and control of enterprise data
via Divide Manager
• Replaces all iOS third-party enterprise applications with
one simple, out-of-box solution
• Renders any iOS 5+ device ready for enterprise usage

Company Confidential © 2013 Enterproid!
DIVIDE FEATURES
Android vs iOS feature comparison

Installation & Activation!

Android!

iOS!

Look, Layout & Corporate Customization!

Compatible across latest versions of OS!

Customize Terms of Service!

Activates and syncs with Google Apps!

Customize Divide Launcher background!

Activates and syncs with Exchange!

Custom Divide Launcher shortcuts!

Activates and syncs with Lotus Notes!

Support for Personal Apps Shortcuts!

iOS!

Look and layout feels native to respective OS!

One-click install from Google Play/App Store!

Android!

Manual Server configuration available!

!

N/A!

Secure integration with Third--‐Party Apps!
Customize Divide Launcher layout!
Customize tips/Message of the Day widgets!

N/A!

Customize placement of widgets on Divide
Launcher screen!

N/A!

Enforce Divide Browser homepage!

Coming
soon!

Configure included Divide applications (Mail,
Contacts, Calendar)!
Configure bookmarks !

Company Confidential © 2013 Enterproid!

Coming
soon!
DIVIDE FEATURES
Android vs iOS feature comparison

Divide Enterprise App Suite!

Android!

iOS!

Divide Enterprise App Suite!

AES 256 bit encryption for all Apps!

Secure Messenger!

Support for attachment viewing in Mail
(images and documents)!

iOS!

Secure Dialer!

Secure Mail!

Android!

SMS to email support!

Attach files to outgoing messages in Mail
(from device, SD, or Divide Files)!

Coming
soon!

Tasks!

Server side email search (Lotus Notes,
Exchange)!

Meeting mode (silence phone while in
meetings)!

N/A!

Server side email search (Google Apps)!

Timecard support (block work notifications
when off the clock)!

N/A!

Out-­‐of-­‐office email auto-­‐reply set from
device (Exchange feature)!

Coming
soon!

Secure Browser!

Secure Calendar!

Divide Files (Box integration)!

Secure Contacts!

App wrapper for 3rd Party Apps (pushed by IT
from cloud to device)!

Work Contact calls/SMS routed to Divide
Dialer/SMS (policy-­‐dependent)!

Full-­‐screen capable web apps for LinkedIn,
Salesforce, and Box!

Information created on device seamlessly
syncs to server!

Company Confidential © 2013 Enterproid!

Coming
Soon!
N/A!
DIVIDE FEATURES
Android vs iOS feature comparison

Use Self-Service MDM (my.divide.com)!
User can quickly access registered device
through My Divide!

Android!

iOS!
Coming
Soon!

Locate device via GPS!

N/A!

Activate Beacon (loud, piercing audio alert to
help locate device)!

N/A!

User can remotely wipe corporate data!

N/A!

Device Security!

Android!

iOS!

AES 256 Bit Encrypted Application Database!
Screenlock enforcement!
Screenlock password complexity enforcement!
Screenlock password history!
Screenlock password aging!
Screenlock password blacklist!

User can remotely wipe entire device !

N/A!

Screenlock wipe on too many failed password
attempts Remote device wipe!

View & manage installed applications!

N/A!

Data Leakage Prevention!

View network usage for voice, data, and SMS
across both profiles!

N/A!

Device timebomb (passive wipe)!

Push URLs to Divide!

N/A!

SMS logging!
Call blacklist!

N/A!

SD card encryption!

N/A!

Anti--‐tamper (root and debugger)!

N/A!

Wipe when debugger enabled!

N/A!

Wipe if certain apps detected!

N/A!

Wipe on SIM removal!

Company Confidential © 2013 Enterproid!

N/A!

N/A!
DIVIDE FEATURES
Android vs iOS feature comparison

Corporate MDM (Divide Manager)!

Android!

iOS!

Corporate MDM (Divide Manager)!

Android!

iOS!

Policy push and enforcement!

Helpdesk tools!

Override policies with ActiveSync policies!

Wifi (802.11x) auto-­‐configuration!

N/A!

Inbound outbound phone number whitelist/
blacklist!

N/A!

Hardware/
OS only!

Device reporting (voice, data, SMS)!
Touchless OTA configuration!

Push and install applications on device by
group!

Multiple devices per user!

Update ETP applications seamlessly !

Customizable trigger-­‐based alerting!

N/A!

Automated reporting!
Work-­‐mode application whitelisting!
Full device application whitelisting!

N/A!

Group management!
Multiple policy support!
Multiple domain administration!

Company Confidential © 2013 Enterproid!

Coming
soon!

Coming
soon!
THANK YOU!
Learn more by visiting www.divide.com

DIVIDE NEW YORK. HONG KONG. LONDON.!
COMPANY CONFIDENTIAL © 2012 Enterproid, Inc. Enterproid, Enterproid Divide and the Divide logo are trademarks of Enterproid, Inc. All other product or company names may be
trademarks and /or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, Enterproid, Inc. does not accept liability for
any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.

Contenu connexe

Tendances

Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
 
SelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSSelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSDaniel Passos
 
Nexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYODNexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYODSamuel Erdtman
 
Remote access for law firms
Remote access for law firmsRemote access for law firms
Remote access for law firmsGizmoFish, LLC
 
1356930 634669665657537500
1356930 6346696656575375001356930 634669665657537500
1356930 634669665657537500Muhammad Hasnain
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
Mobile Connections: Rhomobile Training
Mobile Connections: Rhomobile TrainingMobile Connections: Rhomobile Training
Mobile Connections: Rhomobile TrainingAdam Blum
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox ConfigureSamsung Business USA
 
I pod touch 5th generation
I pod touch 5th generationI pod touch 5th generation
I pod touch 5th generationddouglas12
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Samsung Biz Mobile
 

Tendances (11)

Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
 
SelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSSelfRJ - Aerogear iOS
SelfRJ - Aerogear iOS
 
Nexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYODNexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYOD
 
Remote access for law firms
Remote access for law firmsRemote access for law firms
Remote access for law firms
 
1356930 634669665657537500
1356930 6346696656575375001356930 634669665657537500
1356930 634669665657537500
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
ANDROID NEW EDITION
ANDROID NEW EDITIONANDROID NEW EDITION
ANDROID NEW EDITION
 
Mobile Connections: Rhomobile Training
Mobile Connections: Rhomobile TrainingMobile Connections: Rhomobile Training
Mobile Connections: Rhomobile Training
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
I pod touch 5th generation
I pod touch 5th generationI pod touch 5th generation
I pod touch 5th generation
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 

En vedette

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS securitySumanth Veera
 
New features in android m upload
New features in android m   uploadNew features in android m   upload
New features in android m uploadBin Yang
 
Android OS and its Features
Android OS and its FeaturesAndroid OS and its Features
Android OS and its FeaturesHarshad Lokhande
 
Application component
Application componentApplication component
Application componenthome
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Advance Android Application Development
Advance Android Application DevelopmentAdvance Android Application Development
Advance Android Application DevelopmentRamesh Prasad
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveRaj Pratim Bhattacharya
 
Android vs ios presentation detailed slides
Android vs ios presentation detailed slidesAndroid vs ios presentation detailed slides
Android vs ios presentation detailed slidesMuhammad Arslan Khan
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsDipesh Bhatiya
 
Introduction to Android, Architecture & Components
Introduction to  Android, Architecture & ComponentsIntroduction to  Android, Architecture & Components
Introduction to Android, Architecture & ComponentsVijay Rastogi
 
Android vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignAndroid vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignJeremy Johnson
 

En vedette (20)

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Ios seminar
Ios seminarIos seminar
Ios seminar
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS security
 
New features in android m upload
New features in android m   uploadNew features in android m   upload
New features in android m upload
 
Android OS and its Features
Android OS and its FeaturesAndroid OS and its Features
Android OS and its Features
 
Application component
Application componentApplication component
Application component
 
Api List September
Api List SeptemberApi List September
Api List September
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Advance Android Application Development
Advance Android Application DevelopmentAdvance Android Application Development
Advance Android Application Development
 
Android Components
Android ComponentsAndroid Components
Android Components
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 
Android vs ios presentation detailed slides
Android vs ios presentation detailed slidesAndroid vs ios presentation detailed slides
Android vs ios presentation detailed slides
 
Android Vs iOS
Android Vs iOSAndroid Vs iOS
Android Vs iOS
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functions
 
Introduction to Android, Architecture & Components
Introduction to  Android, Architecture & ComponentsIntroduction to  Android, Architecture & Components
Introduction to Android, Architecture & Components
 
Android vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignAndroid vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and Design
 

Similaire à Android vs i os features

Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
Hexnode Kiosk Solution
Hexnode Kiosk SolutionHexnode Kiosk Solution
Hexnode Kiosk SolutionHexnode
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
iOS enterprise
iOS enterpriseiOS enterprise
iOS enterprisedominion
 
Hexnode iOS Management solution
Hexnode iOS Management solutionHexnode iOS Management solution
Hexnode iOS Management solutionHexnode
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineNCCOMMS
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solutionHexnode
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)DivyaKS12
 
SecureDocs: iAnnotate
SecureDocs:  iAnnotateSecureDocs:  iAnnotate
SecureDocs: iAnnotategenasun
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
Hopedot VOS secure workspace solution
Hopedot VOS secure workspace solutionHopedot VOS secure workspace solution
Hopedot VOS secure workspace solutionHopedotvostech
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 

Similaire à Android vs i os features (20)

Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Hexnode Kiosk Solution
Hexnode Kiosk SolutionHexnode Kiosk Solution
Hexnode Kiosk Solution
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
iOS enterprise
iOS enterpriseiOS enterprise
iOS enterprise
 
Hexnode iOS Management solution
Hexnode iOS Management solutionHexnode iOS Management solution
Hexnode iOS Management solution
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
 
SecureDocs: iAnnotate
SecureDocs:  iAnnotateSecureDocs:  iAnnotate
SecureDocs: iAnnotate
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
Hopedot VOS secure workspace solution
Hopedot VOS secure workspace solutionHopedot VOS secure workspace solution
Hopedot VOS secure workspace solution
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 

Plus de Guang Ying Yuan

【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》Guang Ying Yuan
 
Designing and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsDesigning and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsGuang Ying Yuan
 
螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠  螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠 Guang Ying Yuan
 
2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_myGuang Ying Yuan
 
Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Guang Ying Yuan
 
Java面试题解惑系列
Java面试题解惑系列Java面试题解惑系列
Java面试题解惑系列Guang Ying Yuan
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Guang Ying Yuan
 
Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Guang Ying Yuan
 
It Presales Happy Work Life
It Presales Happy Work LifeIt Presales Happy Work Life
It Presales Happy Work LifeGuang Ying Yuan
 

Plus de Guang Ying Yuan (20)

【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》
 
Pulic Speaking
Pulic SpeakingPulic Speaking
Pulic Speaking
 
Jmeter
Jmeter Jmeter
Jmeter
 
Designing and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsDesigning and implementing high performance rule based applications
Designing and implementing high performance rule based applications
 
螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠  螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠
 
girl
girlgirl
girl
 
Lombardi intro full
Lombardi intro  full Lombardi intro  full
Lombardi intro full
 
2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my
 
德勤工作手册
德勤工作手册德勤工作手册
德勤工作手册
 
IBM certification
IBM certificationIBM certification
IBM certification
 
Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2
 
Java面试题解惑系列
Java面试题解惑系列Java面试题解惑系列
Java面试题解惑系列
 
Abap codebook
Abap codebookAbap codebook
Abap codebook
 
64 Interview Questions
64 Interview Questions64 Interview Questions
64 Interview Questions
 
Filenet API PDF
Filenet API PDFFilenet API PDF
Filenet API PDF
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1
 
Nw2004s What Is New
Nw2004s What Is NewNw2004s What Is New
Nw2004s What Is New
 
It Presales Happy Work Life
It Presales Happy Work LifeIt Presales Happy Work Life
It Presales Happy Work Life
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Android vs i os features

  • 1. DIVIDE FEATURES! Android & iOS comparison
  • 2. DIVIDE FOR ANDROID Work and play on a single Android device. Divide creates a separate, fullyencrypted work environment on your device. Enabling you to securely access your work email (including Exchange ActiveSync & Lotus Notes), contacts and calendar. Company Confidential © 2013 Enterproid!
  • 3. DIVIDE ANDROID FEATURES Access work data without compromising privacy. • Secure container for enterprise data on Android devices (AES 256 bit encryption) • One-click install from Google Play • Divide Files Extension which allows you to store all of your sensitive data within the cloud • Tunneling to securely connect to pre-existing enterprise infrastructure • Fully customizable interface that looks and feels like native Android • Access to Divide Manager, allowing remote tracking and control of enterprise data • Push third-party apps into the Divide container via the Manager • Secure dialer and messenger apps that automatically handle calls and text from work contacts • Timecard widget allows you to turn off work notifications when you are off the clock Company Confidential © 2013 Enterproid!
  • 4. DIVIDE FOR iOS Work and play on a single iOS device. Divide for iOS evolves Apple device to have a secure, enterprise-ready phone or tablet. Divide leverages dual persona technology to ensure that your iPhone or iPad maintains a secure corporate persona for all of your sensitive data without compromising your personal freedom to use your own device as you wish. Company Confidential © 2013 Enterproid!
  • 5. DIVIDE iOS FEATURES Access work data without compromising privacy. • Secure container for enterprise data on iOS devices (AES 256 bit encryption) • One-click install from the App Store • Native-style layout developed specifically for Divide iOS • Integrated, full-screen web apps for Box, LinkedIn and Salesforce • Real-time remote tracking and control of enterprise data via Divide Manager • Replaces all iOS third-party enterprise applications with one simple, out-of-box solution • Renders any iOS 5+ device ready for enterprise usage Company Confidential © 2013 Enterproid!
  • 6. DIVIDE FEATURES Android vs iOS feature comparison Installation & Activation! Android! iOS! Look, Layout & Corporate Customization! Compatible across latest versions of OS! Customize Terms of Service! Activates and syncs with Google Apps! Customize Divide Launcher background! Activates and syncs with Exchange! Custom Divide Launcher shortcuts! Activates and syncs with Lotus Notes! Support for Personal Apps Shortcuts! iOS! Look and layout feels native to respective OS! One-click install from Google Play/App Store! Android! Manual Server configuration available! ! N/A! Secure integration with Third--‐Party Apps! Customize Divide Launcher layout! Customize tips/Message of the Day widgets! N/A! Customize placement of widgets on Divide Launcher screen! N/A! Enforce Divide Browser homepage! Coming soon! Configure included Divide applications (Mail, Contacts, Calendar)! Configure bookmarks ! Company Confidential © 2013 Enterproid! Coming soon!
  • 7. DIVIDE FEATURES Android vs iOS feature comparison Divide Enterprise App Suite! Android! iOS! Divide Enterprise App Suite! AES 256 bit encryption for all Apps! Secure Messenger! Support for attachment viewing in Mail (images and documents)! iOS! Secure Dialer! Secure Mail! Android! SMS to email support! Attach files to outgoing messages in Mail (from device, SD, or Divide Files)! Coming soon! Tasks! Server side email search (Lotus Notes, Exchange)! Meeting mode (silence phone while in meetings)! N/A! Server side email search (Google Apps)! Timecard support (block work notifications when off the clock)! N/A! Out-­‐of-­‐office email auto-­‐reply set from device (Exchange feature)! Coming soon! Secure Browser! Secure Calendar! Divide Files (Box integration)! Secure Contacts! App wrapper for 3rd Party Apps (pushed by IT from cloud to device)! Work Contact calls/SMS routed to Divide Dialer/SMS (policy-­‐dependent)! Full-­‐screen capable web apps for LinkedIn, Salesforce, and Box! Information created on device seamlessly syncs to server! Company Confidential © 2013 Enterproid! Coming Soon! N/A!
  • 8. DIVIDE FEATURES Android vs iOS feature comparison Use Self-Service MDM (my.divide.com)! User can quickly access registered device through My Divide! Android! iOS! Coming Soon! Locate device via GPS! N/A! Activate Beacon (loud, piercing audio alert to help locate device)! N/A! User can remotely wipe corporate data! N/A! Device Security! Android! iOS! AES 256 Bit Encrypted Application Database! Screenlock enforcement! Screenlock password complexity enforcement! Screenlock password history! Screenlock password aging! Screenlock password blacklist! User can remotely wipe entire device ! N/A! Screenlock wipe on too many failed password attempts Remote device wipe! View & manage installed applications! N/A! Data Leakage Prevention! View network usage for voice, data, and SMS across both profiles! N/A! Device timebomb (passive wipe)! Push URLs to Divide! N/A! SMS logging! Call blacklist! N/A! SD card encryption! N/A! Anti--‐tamper (root and debugger)! N/A! Wipe when debugger enabled! N/A! Wipe if certain apps detected! N/A! Wipe on SIM removal! Company Confidential © 2013 Enterproid! N/A! N/A!
  • 9. DIVIDE FEATURES Android vs iOS feature comparison Corporate MDM (Divide Manager)! Android! iOS! Corporate MDM (Divide Manager)! Android! iOS! Policy push and enforcement! Helpdesk tools! Override policies with ActiveSync policies! Wifi (802.11x) auto-­‐configuration! N/A! Inbound outbound phone number whitelist/ blacklist! N/A! Hardware/ OS only! Device reporting (voice, data, SMS)! Touchless OTA configuration! Push and install applications on device by group! Multiple devices per user! Update ETP applications seamlessly ! Customizable trigger-­‐based alerting! N/A! Automated reporting! Work-­‐mode application whitelisting! Full device application whitelisting! N/A! Group management! Multiple policy support! Multiple domain administration! Company Confidential © 2013 Enterproid! Coming soon! Coming soon!
  • 10. THANK YOU! Learn more by visiting www.divide.com DIVIDE NEW YORK. HONG KONG. LONDON.! COMPANY CONFIDENTIAL © 2012 Enterproid, Inc. Enterproid, Enterproid Divide and the Divide logo are trademarks of Enterproid, Inc. All other product or company names may be trademarks and /or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, Enterproid, Inc. does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.