Enabling Native Email, Calendar, and Contacts on Android Devices

February 25th, 2014 |
Image for FaceBook
Enabling Native Email, Calendar, and Contacts on Android Devices
Download PDFRead/Download White Paper (PDF)
For more information on Intel IT Best Practices, please visit www.intel.com/IT
 

IT Best Practices: As Intel’s bring-your-own-device (BYOD) program grows and Android devices become more popular, Intel IT wants to help employees using these devices while also keeping the enterprise secure. We are delivering a native email solution that enables employees to access their email, calendar, and contacts using the native applications on their Android devices. Our solution secures these devices to a high enough standard that employees can also use enterprise applications that require access to corporate data.

Adding support for native Android applications requires us to address three main challenges: security, fragmentation, and scalability. Our native email solution, which encompasses email, calendar, and contacts, overcomes these challenges by doing the following:

  • Mitigating security risks. We evaluated Android 4.0 and higher against a set of threats, vulnerabilities, and consequences and then developed mitigations that limited risk as much as possible.
  • Accommodating multiple devices from different manufacturers. Employees load the solution in two phases. First, they register their device with the MDM solution. Second, they manually configure their email account.
  • Enabling a majority of Android devices in use at Intel. A majority of employees use an Android device from one of three categories: Intel architecture-based devices, Android Open Source Project (AOSP) devices, and devices from a specific third-party supplier.
  • Assisting employees with setup. Written instructions complement generic automated instructions that guide employees through the device registration and email account configuration process. This helps limit the number of incident tickets submitted to our IT help desk.
Share

Posted in: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security
Tags: , , , , , , , , , , , , , , , , , , , ,


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.