SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
DIVIDE FEATURES!
Android & iOS comparison
DIVIDE FOR ANDROID
Work and play on a single Android device.

Divide creates a separate, fullyencrypted work environment on
your device. Enabling you to
securely access your work
email (including Exchange
ActiveSync & Lotus Notes),
contacts and calendar.

Company Confidential © 2013 Enterproid!
DIVIDE ANDROID FEATURES
Access work data without compromising privacy.

• Secure container for enterprise data on
Android devices (AES 256 bit encryption)
• One-click install from Google Play
• Divide Files Extension which allows you to
store all of your sensitive data within the cloud
• Tunneling to securely connect to pre-existing
enterprise infrastructure
• Fully customizable interface that looks and feels
like native Android
• Access to Divide Manager, allowing remote
tracking and control of enterprise data
• Push third-party apps into the Divide container
via the Manager
• Secure dialer and messenger apps that automatically
handle calls and text from work contacts
• Timecard widget allows you to turn off work
notifications when you are off the clock

Company Confidential © 2013 Enterproid!
DIVIDE FOR iOS
Work and play on a single iOS device.

Divide for iOS evolves Apple device
to have a secure, enterprise-ready
phone or tablet. Divide leverages
dual persona technology to ensure
that your iPhone or iPad maintains
a secure corporate persona for all
of your sensitive data without
compromising your personal
freedom to use your own device as
you wish.

Company Confidential © 2013 Enterproid!
DIVIDE iOS FEATURES
Access work data without compromising privacy.

• Secure container for enterprise data on
iOS devices (AES 256 bit encryption)
• One-click install from the App Store
• Native-style layout developed specifically for Divide iOS
• Integrated, full-screen web apps for Box, LinkedIn and
Salesforce
• Real-time remote tracking and control of enterprise data
via Divide Manager
• Replaces all iOS third-party enterprise applications with
one simple, out-of-box solution
• Renders any iOS 5+ device ready for enterprise usage

Company Confidential © 2013 Enterproid!
DIVIDE FEATURES
Android vs iOS feature comparison

Installation & Activation!

Android!

iOS!

Look, Layout & Corporate Customization!

Compatible across latest versions of OS!

Customize Terms of Service!

Activates and syncs with Google Apps!

Customize Divide Launcher background!

Activates and syncs with Exchange!

Custom Divide Launcher shortcuts!

Activates and syncs with Lotus Notes!

Support for Personal Apps Shortcuts!

iOS!

Look and layout feels native to respective OS!

One-click install from Google Play/App Store!

Android!

Manual Server configuration available!

!

N/A!

Secure integration with Third--‐Party Apps!
Customize Divide Launcher layout!
Customize tips/Message of the Day widgets!

N/A!

Customize placement of widgets on Divide
Launcher screen!

N/A!

Enforce Divide Browser homepage!

Coming
soon!

Configure included Divide applications (Mail,
Contacts, Calendar)!
Configure bookmarks !

Company Confidential © 2013 Enterproid!

Coming
soon!
DIVIDE FEATURES
Android vs iOS feature comparison

Divide Enterprise App Suite!

Android!

iOS!

Divide Enterprise App Suite!

AES 256 bit encryption for all Apps!

Secure Messenger!

Support for attachment viewing in Mail
(images and documents)!

iOS!

Secure Dialer!

Secure Mail!

Android!

SMS to email support!

Attach files to outgoing messages in Mail
(from device, SD, or Divide Files)!

Coming
soon!

Tasks!

Server side email search (Lotus Notes,
Exchange)!

Meeting mode (silence phone while in
meetings)!

N/A!

Server side email search (Google Apps)!

Timecard support (block work notifications
when off the clock)!

N/A!

Out-­‐of-­‐office email auto-­‐reply set from
device (Exchange feature)!

Coming
soon!

Secure Browser!

Secure Calendar!

Divide Files (Box integration)!

Secure Contacts!

App wrapper for 3rd Party Apps (pushed by IT
from cloud to device)!

Work Contact calls/SMS routed to Divide
Dialer/SMS (policy-­‐dependent)!

Full-­‐screen capable web apps for LinkedIn,
Salesforce, and Box!

Information created on device seamlessly
syncs to server!

Company Confidential © 2013 Enterproid!

Coming
Soon!
N/A!
DIVIDE FEATURES
Android vs iOS feature comparison

Use Self-Service MDM (my.divide.com)!
User can quickly access registered device
through My Divide!

Android!

iOS!
Coming
Soon!

Locate device via GPS!

N/A!

Activate Beacon (loud, piercing audio alert to
help locate device)!

N/A!

User can remotely wipe corporate data!

N/A!

Device Security!

Android!

iOS!

AES 256 Bit Encrypted Application Database!
Screenlock enforcement!
Screenlock password complexity enforcement!
Screenlock password history!
Screenlock password aging!
Screenlock password blacklist!

User can remotely wipe entire device !

N/A!

Screenlock wipe on too many failed password
attempts Remote device wipe!

View & manage installed applications!

N/A!

Data Leakage Prevention!

View network usage for voice, data, and SMS
across both profiles!

N/A!

Device timebomb (passive wipe)!

Push URLs to Divide!

N/A!

SMS logging!
Call blacklist!

N/A!

SD card encryption!

N/A!

Anti--‐tamper (root and debugger)!

N/A!

Wipe when debugger enabled!

N/A!

Wipe if certain apps detected!

N/A!

Wipe on SIM removal!

Company Confidential © 2013 Enterproid!

N/A!

N/A!
DIVIDE FEATURES
Android vs iOS feature comparison

Corporate MDM (Divide Manager)!

Android!

iOS!

Corporate MDM (Divide Manager)!

Android!

iOS!

Policy push and enforcement!

Helpdesk tools!

Override policies with ActiveSync policies!

Wifi (802.11x) auto-­‐configuration!

N/A!

Inbound outbound phone number whitelist/
blacklist!

N/A!

Hardware/
OS only!

Device reporting (voice, data, SMS)!
Touchless OTA configuration!

Push and install applications on device by
group!

Multiple devices per user!

Update ETP applications seamlessly !

Customizable trigger-­‐based alerting!

N/A!

Automated reporting!
Work-­‐mode application whitelisting!
Full device application whitelisting!

N/A!

Group management!
Multiple policy support!
Multiple domain administration!

Company Confidential © 2013 Enterproid!

Coming
soon!

Coming
soon!
THANK YOU!
Learn more by visiting www.divide.com

DIVIDE NEW YORK. HONG KONG. LONDON.!
COMPANY CONFIDENTIAL © 2012 Enterproid, Inc. Enterproid, Enterproid Divide and the Divide logo are trademarks of Enterproid, Inc. All other product or company names may be
trademarks and /or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, Enterproid, Inc. does not accept liability for
any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.

Mais conteúdo relacionado

Mais procurados

Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
 
SelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSSelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSDaniel Passos
 
Nexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYODNexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYODSamuel Erdtman
 
Remote access for law firms
Remote access for law firmsRemote access for law firms
Remote access for law firmsGizmoFish, LLC
 
1356930 634669665657537500
1356930 6346696656575375001356930 634669665657537500
1356930 634669665657537500Muhammad Hasnain
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
Mobile Connections: Rhomobile Training
Mobile Connections: Rhomobile TrainingMobile Connections: Rhomobile Training
Mobile Connections: Rhomobile TrainingAdam Blum
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox ConfigureSamsung Business USA
 
I pod touch 5th generation
I pod touch 5th generationI pod touch 5th generation
I pod touch 5th generationddouglas12
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Samsung Biz Mobile
 

Mais procurados (11)

Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
 
SelfRJ - Aerogear iOS
SelfRJ - Aerogear iOSSelfRJ - Aerogear iOS
SelfRJ - Aerogear iOS
 
Nexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYODNexus Protocol Gateway and BYOD
Nexus Protocol Gateway and BYOD
 
Remote access for law firms
Remote access for law firmsRemote access for law firms
Remote access for law firms
 
1356930 634669665657537500
1356930 6346696656575375001356930 634669665657537500
1356930 634669665657537500
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
ANDROID NEW EDITION
ANDROID NEW EDITIONANDROID NEW EDITION
ANDROID NEW EDITION
 
Mobile Connections: Rhomobile Training
Mobile Connections: Rhomobile TrainingMobile Connections: Rhomobile Training
Mobile Connections: Rhomobile Training
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
I pod touch 5th generation
I pod touch 5th generationI pod touch 5th generation
I pod touch 5th generation
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 

Destaque

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS securitySumanth Veera
 
New features in android m upload
New features in android m   uploadNew features in android m   upload
New features in android m uploadBin Yang
 
Android OS and its Features
Android OS and its FeaturesAndroid OS and its Features
Android OS and its FeaturesHarshad Lokhande
 
Application component
Application componentApplication component
Application componenthome
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Advance Android Application Development
Advance Android Application DevelopmentAdvance Android Application Development
Advance Android Application DevelopmentRamesh Prasad
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveRaj Pratim Bhattacharya
 
Android vs ios presentation detailed slides
Android vs ios presentation detailed slidesAndroid vs ios presentation detailed slides
Android vs ios presentation detailed slidesMuhammad Arslan Khan
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsDipesh Bhatiya
 
Introduction to Android, Architecture & Components
Introduction to  Android, Architecture & ComponentsIntroduction to  Android, Architecture & Components
Introduction to Android, Architecture & ComponentsVijay Rastogi
 
Android vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignAndroid vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignJeremy Johnson
 

Destaque (20)

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Ios seminar
Ios seminarIos seminar
Ios seminar
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS security
 
New features in android m upload
New features in android m   uploadNew features in android m   upload
New features in android m upload
 
Android OS and its Features
Android OS and its FeaturesAndroid OS and its Features
Android OS and its Features
 
Application component
Application componentApplication component
Application component
 
Api List September
Api List SeptemberApi List September
Api List September
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Advance Android Application Development
Advance Android Application DevelopmentAdvance Android Application Development
Advance Android Application Development
 
Android Components
Android ComponentsAndroid Components
Android Components
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 
Android vs ios presentation detailed slides
Android vs ios presentation detailed slidesAndroid vs ios presentation detailed slides
Android vs ios presentation detailed slides
 
Android Vs iOS
Android Vs iOSAndroid Vs iOS
Android Vs iOS
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functions
 
Introduction to Android, Architecture & Components
Introduction to  Android, Architecture & ComponentsIntroduction to  Android, Architecture & Components
Introduction to Android, Architecture & Components
 
Android vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignAndroid vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and Design
 

Semelhante a Android vs i os features

Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
Hexnode Kiosk Solution
Hexnode Kiosk SolutionHexnode Kiosk Solution
Hexnode Kiosk SolutionHexnode
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
iOS enterprise
iOS enterpriseiOS enterprise
iOS enterprisedominion
 
Hexnode iOS Management solution
Hexnode iOS Management solutionHexnode iOS Management solution
Hexnode iOS Management solutionHexnode
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineNCCOMMS
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solutionHexnode
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)DivyaKS12
 
SecureDocs: iAnnotate
SecureDocs:  iAnnotateSecureDocs:  iAnnotate
SecureDocs: iAnnotategenasun
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Hopedot VOS secure workspace solution
Hopedot VOS secure workspace solutionHopedot VOS secure workspace solution
Hopedot VOS secure workspace solutionHopedotvostech
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 

Semelhante a Android vs i os features (20)

Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
Hexnode Kiosk Solution
Hexnode Kiosk SolutionHexnode Kiosk Solution
Hexnode Kiosk Solution
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
iOS enterprise
iOS enterpriseiOS enterprise
iOS enterprise
 
Hexnode iOS Management solution
Hexnode iOS Management solutionHexnode iOS Management solution
Hexnode iOS Management solution
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineO365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
 
SecureDocs: iAnnotate
SecureDocs:  iAnnotateSecureDocs:  iAnnotate
SecureDocs: iAnnotate
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Hopedot VOS secure workspace solution
Hopedot VOS secure workspace solutionHopedot VOS secure workspace solution
Hopedot VOS secure workspace solution
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 

Mais de Guang Ying Yuan

【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》Guang Ying Yuan
 
Designing and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsDesigning and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsGuang Ying Yuan
 
螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠  螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠 Guang Ying Yuan
 
2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_myGuang Ying Yuan
 
Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Guang Ying Yuan
 
Java面试题解惑系列
Java面试题解惑系列Java面试题解惑系列
Java面试题解惑系列Guang Ying Yuan
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Guang Ying Yuan
 
Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Guang Ying Yuan
 
It Presales Happy Work Life
It Presales Happy Work LifeIt Presales Happy Work Life
It Presales Happy Work LifeGuang Ying Yuan
 

Mais de Guang Ying Yuan (20)

【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》【职场女性领导力】《向前一步》
【职场女性领导力】《向前一步》
 
Pulic Speaking
Pulic SpeakingPulic Speaking
Pulic Speaking
 
Jmeter
Jmeter Jmeter
Jmeter
 
Designing and implementing high performance rule based applications
Designing and implementing high performance rule based applicationsDesigning and implementing high performance rule based applications
Designing and implementing high performance rule based applications
 
螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠  螃蟹、猫头鹰和蝙蝠
螃蟹、猫头鹰和蝙蝠
 
girl
girlgirl
girl
 
Lombardi intro full
Lombardi intro  full Lombardi intro  full
Lombardi intro full
 
2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my2010 06 28_2357_savor_the_blue_volume_ii_my
2010 06 28_2357_savor_the_blue_volume_ii_my
 
德勤工作手册
德勤工作手册德勤工作手册
德勤工作手册
 
IBM certification
IBM certificationIBM certification
IBM certification
 
Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2Agile Software Development Overview 1231560734008086 2
Agile Software Development Overview 1231560734008086 2
 
Java面试题解惑系列
Java面试题解惑系列Java面试题解惑系列
Java面试题解惑系列
 
Abap codebook
Abap codebookAbap codebook
Abap codebook
 
64 Interview Questions
64 Interview Questions64 Interview Questions
64 Interview Questions
 
Filenet API PDF
Filenet API PDFFilenet API PDF
Filenet API PDF
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1
 
Nw2004s What Is New
Nw2004s What Is NewNw2004s What Is New
Nw2004s What Is New
 
It Presales Happy Work Life
It Presales Happy Work LifeIt Presales Happy Work Life
It Presales Happy Work Life
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Android vs i os features

  • 1. DIVIDE FEATURES! Android & iOS comparison
  • 2. DIVIDE FOR ANDROID Work and play on a single Android device. Divide creates a separate, fullyencrypted work environment on your device. Enabling you to securely access your work email (including Exchange ActiveSync & Lotus Notes), contacts and calendar. Company Confidential © 2013 Enterproid!
  • 3. DIVIDE ANDROID FEATURES Access work data without compromising privacy. • Secure container for enterprise data on Android devices (AES 256 bit encryption) • One-click install from Google Play • Divide Files Extension which allows you to store all of your sensitive data within the cloud • Tunneling to securely connect to pre-existing enterprise infrastructure • Fully customizable interface that looks and feels like native Android • Access to Divide Manager, allowing remote tracking and control of enterprise data • Push third-party apps into the Divide container via the Manager • Secure dialer and messenger apps that automatically handle calls and text from work contacts • Timecard widget allows you to turn off work notifications when you are off the clock Company Confidential © 2013 Enterproid!
  • 4. DIVIDE FOR iOS Work and play on a single iOS device. Divide for iOS evolves Apple device to have a secure, enterprise-ready phone or tablet. Divide leverages dual persona technology to ensure that your iPhone or iPad maintains a secure corporate persona for all of your sensitive data without compromising your personal freedom to use your own device as you wish. Company Confidential © 2013 Enterproid!
  • 5. DIVIDE iOS FEATURES Access work data without compromising privacy. • Secure container for enterprise data on iOS devices (AES 256 bit encryption) • One-click install from the App Store • Native-style layout developed specifically for Divide iOS • Integrated, full-screen web apps for Box, LinkedIn and Salesforce • Real-time remote tracking and control of enterprise data via Divide Manager • Replaces all iOS third-party enterprise applications with one simple, out-of-box solution • Renders any iOS 5+ device ready for enterprise usage Company Confidential © 2013 Enterproid!
  • 6. DIVIDE FEATURES Android vs iOS feature comparison Installation & Activation! Android! iOS! Look, Layout & Corporate Customization! Compatible across latest versions of OS! Customize Terms of Service! Activates and syncs with Google Apps! Customize Divide Launcher background! Activates and syncs with Exchange! Custom Divide Launcher shortcuts! Activates and syncs with Lotus Notes! Support for Personal Apps Shortcuts! iOS! Look and layout feels native to respective OS! One-click install from Google Play/App Store! Android! Manual Server configuration available! ! N/A! Secure integration with Third--‐Party Apps! Customize Divide Launcher layout! Customize tips/Message of the Day widgets! N/A! Customize placement of widgets on Divide Launcher screen! N/A! Enforce Divide Browser homepage! Coming soon! Configure included Divide applications (Mail, Contacts, Calendar)! Configure bookmarks ! Company Confidential © 2013 Enterproid! Coming soon!
  • 7. DIVIDE FEATURES Android vs iOS feature comparison Divide Enterprise App Suite! Android! iOS! Divide Enterprise App Suite! AES 256 bit encryption for all Apps! Secure Messenger! Support for attachment viewing in Mail (images and documents)! iOS! Secure Dialer! Secure Mail! Android! SMS to email support! Attach files to outgoing messages in Mail (from device, SD, or Divide Files)! Coming soon! Tasks! Server side email search (Lotus Notes, Exchange)! Meeting mode (silence phone while in meetings)! N/A! Server side email search (Google Apps)! Timecard support (block work notifications when off the clock)! N/A! Out-­‐of-­‐office email auto-­‐reply set from device (Exchange feature)! Coming soon! Secure Browser! Secure Calendar! Divide Files (Box integration)! Secure Contacts! App wrapper for 3rd Party Apps (pushed by IT from cloud to device)! Work Contact calls/SMS routed to Divide Dialer/SMS (policy-­‐dependent)! Full-­‐screen capable web apps for LinkedIn, Salesforce, and Box! Information created on device seamlessly syncs to server! Company Confidential © 2013 Enterproid! Coming Soon! N/A!
  • 8. DIVIDE FEATURES Android vs iOS feature comparison Use Self-Service MDM (my.divide.com)! User can quickly access registered device through My Divide! Android! iOS! Coming Soon! Locate device via GPS! N/A! Activate Beacon (loud, piercing audio alert to help locate device)! N/A! User can remotely wipe corporate data! N/A! Device Security! Android! iOS! AES 256 Bit Encrypted Application Database! Screenlock enforcement! Screenlock password complexity enforcement! Screenlock password history! Screenlock password aging! Screenlock password blacklist! User can remotely wipe entire device ! N/A! Screenlock wipe on too many failed password attempts Remote device wipe! View & manage installed applications! N/A! Data Leakage Prevention! View network usage for voice, data, and SMS across both profiles! N/A! Device timebomb (passive wipe)! Push URLs to Divide! N/A! SMS logging! Call blacklist! N/A! SD card encryption! N/A! Anti--‐tamper (root and debugger)! N/A! Wipe when debugger enabled! N/A! Wipe if certain apps detected! N/A! Wipe on SIM removal! Company Confidential © 2013 Enterproid! N/A! N/A!
  • 9. DIVIDE FEATURES Android vs iOS feature comparison Corporate MDM (Divide Manager)! Android! iOS! Corporate MDM (Divide Manager)! Android! iOS! Policy push and enforcement! Helpdesk tools! Override policies with ActiveSync policies! Wifi (802.11x) auto-­‐configuration! N/A! Inbound outbound phone number whitelist/ blacklist! N/A! Hardware/ OS only! Device reporting (voice, data, SMS)! Touchless OTA configuration! Push and install applications on device by group! Multiple devices per user! Update ETP applications seamlessly ! Customizable trigger-­‐based alerting! N/A! Automated reporting! Work-­‐mode application whitelisting! Full device application whitelisting! N/A! Group management! Multiple policy support! Multiple domain administration! Company Confidential © 2013 Enterproid! Coming soon! Coming soon!
  • 10. THANK YOU! Learn more by visiting www.divide.com DIVIDE NEW YORK. HONG KONG. LONDON.! COMPANY CONFIDENTIAL © 2012 Enterproid, Inc. Enterproid, Enterproid Divide and the Divide logo are trademarks of Enterproid, Inc. All other product or company names may be trademarks and /or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, Enterproid, Inc. does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.