Enabling Native Email, Calendar, and Contacts on Android Devices

February 25th, 2014 |
Image for FaceBook
Download PDFRead/Download White Paper (PDF)
 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
This pdf file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the pdf file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: As Intel’s bring-your-own-device (BYOD) program grows and Android devices become more popular, Intel IT wants to help employees using these devices while also keeping the enterprise secure. We are delivering a native email solution that enables employees to access their email, calendar, and contacts using the native applications on their Android devices. Our solution secures these devices to a high enough standard that employees can also use enterprise applications that require access to corporate data.

Adding support for native Android applications requires us to address three main challenges: security, fragmentation, and scalability. Our native email solution, which encompasses email, calendar, and contacts, overcomes these challenges by doing the following:

  • Mitigating security risks. We evaluated Android 4.0 and higher against a set of threats, vulnerabilities, and consequences and then developed mitigations that limited risk as much as possible.
  • Accommodating multiple devices from different manufacturers. Employees load the solution in two phases. First, they register their device with the MDM solution. Second, they manually configure their email account.
  • Enabling a majority of Android devices in use at Intel. A majority of employees use an Android device from one of three categories: Intel architecture-based devices, Android Open Source Project (AOSP) devices, and devices from a specific third-party supplier.
  • Assisting employees with setup. Written instructions complement generic automated instructions that guide employees through the device registration and email account configuration process. This helps limit the number of incident tickets submitted to our IT help desk.

For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , , , , , , , , ,
 
Posted in: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security