Professional Documents
Culture Documents
Security Solution
1 Overview
In 2012, 20% of global employees brought their own mobile devices to work, such as the iPhone, iPad, or Android based devices.
Along with huge IT consumption, Bring Your Own Device (BYOD) is gradually becoming the new norm. Originally thought to be just
a trend concept, BYOD is now changing the way people work with quite an unstoppable momentum. With our own devices, we can
exchange emails, conduct research and follow-up on potential sales opportunities more flexibly, promote information management
over enterprise, flatten user interfaces, increase response times, and enhance decision-making efficiency. However, the openness
of BYOD comes with enormous security and management risks. Therefore, is your enterprise ready for today's BYOD challenges?
Mobile devices are mostly of a small size and are prone to loss or theft. 47% of the companies interviewed say that large amounts
of data are stored on mobile devices, including sensitive client information and classified data from emails. The loss of a single mobile
office device not only indicates the potential leaking of confidential business information, but also possibly incurs law violations.
Terminal
Access
DMZ
Office-based
Intranet
Security
management
Asset
management
3G/4G
Unified policy
Management
Platform*
Firewall/UTM
AnyOffice client
Development platform
Business object
Workflow
Application
interface
SSL
Mobile Security
Access Gateway
AnyOffice SVN
Application compilation
Application release and
maintenance
LDAP
AnyOffice client
Non-Office-based
UI design
Application
integration
Device interface
Enterprise
WiFi
Application
distribution
IT services
Supporting platform
Firewall/UTM
MEAP
Public Wi-Fi
OA and other
servers
Privacy
Access control
Mobile NAC*
Link security
SSL or UDP tunnel
encryption
L3/L4 VPN
Threat defense
DDoS
Network antivirus
Network IDS/IPS
Compliance
Data protection
Mobile sandbox
Web, email, and DLP
Anti-theft
* indicates a feature to be supported by later versions of Huawei AnyOffice Mobile Security Solution.
Application security
Management security
Application
Control
Security management
Application management
Assets management
IT services
4 Highlights
C
I
Identity
Unified network
access control
Compliance
Whole lifecycle device
management
Privacy
Comprehensive
data security and
threat prevention
Personal Application
Enterprise Application
Personal Data
Create
Forcible separation
Storage encryption
OA
CRM
Enterprise Data
Operate
Behavior monitoring
Log off
Trace cleaning after logoff
Prevent threats between mobile devices at the LAN and the server side: Control over unauthorized access to the intranet
server, malicious intrusion of employees, and the spread of network viruses, worms and Trojan horses.
Prevent information from being leaked between the mobile office terminal and the Internet
ui
p
De
re
lo
Ac
q
e
tir
Re
Device
Lifecycle
Ru
4.3.1 Acquire
Huawei AnyOffice mobile security solution complies with the ITIL Asset Management Standards, supports the discovery,
registration, and password initialization of standard devices and personal devices, and provides the customized templates of
the letter of commitment of mobile device usage.
4.3.2 Deploy
Enterprises must ensure the level of security and standard compliance of mobile devices. Huawei AnyOffice mobile
security solution supports and enforces security policies, configuration and management delivery over a host firewall,
VPN, and WiFi network.
The core of the solution is the secure allocation of mobile applications. Huawei AnyOffice mobile security solution
integrates company App stores and secures allocation, installation, and configuration of applications. Moreover,
companies can use AnyOffice to define policies for whitelisted and blacklisted applications, ensuring that the right person
accesses the right application and data. AnyOffice provides signature authentication. Authorized services cannot be
tampered or uninstalled, which adds extra protection and maintains the application integrity on the mobile device.
4.3.3 Run
Much attention must be paid to the security of data and applications during daily business operations. Huawei
AnyOffice supports password policies, jail breaking detection and isolation, and control over possible data leaking
channel, including the SIM card, SD card, camera, Bluetooth, WIFI, USB, GPS, and recording. Mobile device is
vulnerable to loss. AnyOffice provides key data encryption, remote data backup/recovery/synchronization, and remote
lock and data wiping options. What's more, IT departments can enhance application security by remote upgrading
and patching. On the management back end, IT departments can query and audit the model, operating system, and
6 Choosing Huawei
Huawei provides enterprise and industry clients with a leading mobile office security solution. Mobile office involves the
terminal device, lower layer firmware, system software, and applications. It is an integrated ecological chain that requires
the cooperation between the upstream and downstream vendors. Huawei, with great openness, works with OEM vendors,
integrators, and mobile and wireless carriers to realize the unique value of AnyOffice, provide device-based and applicationlevel security, facilitate enterprise mobile office, and enhance ROI.
With Huawei AnyOffice, you can:
Create a secure zone that separates the enterprise and personal environment, reaching the equilibrium between the
security and efficiency of mobile office.
Prevent E2E leak of sensitive data that is stored, transmitted, and accessed.
Employ the industry-leading secure access and unified security policy management platform.
Implement device-based and application-level security control.
Manage mobile devices through the whole lifecycle, including the acquisition, deployment, running, and recycling.
Components
Component
Product
Mobile client
AnyOffice Agent
USG 2000/5000
AnyOffice Manager
Platform Version
iPad / iPhone
* Huawei AnyOffice mobile security solution will support the platform marked with "*" in the in the later version.
10
Other trademarks, product, service and company names mentioned are the property of their respective owners.
General Disclaimer
THE INFORMATION IN THIS DOCUMENT MAY CONTAIN PREDICTIVE STATEMENTS
INCLUDING, WITHOUT LIMITATION, STATEMENTS REGARDING THE FUTURE FINANCIAL
AND OPERATING RESULTS, FUTURE PRODUCT PORTFOLIO, NEW TECHNOLOGY, ETC.
THERE ARE A NUMBER OF FACTORS THAT COULD CAUSE ACTUAL RESULTS AND
DEVELOPMENTS TO DIFFER MATERIALLY FROM THOSE EXPRESSED OR IMPLIED IN THE
PREDICTIVE STATEMENTS. THEREFORE, SUCH INFORMATION IS PROVIDED FOR REFERENCE
www.huawei.com