Mobile Device Management

Protect Smartphones, Tables & Laptops

Call for FREE trial

Mobile Device Management for Tablets

What is Mobile Device Management?

Mobile device management (MDM) is an industry term for the administration of mobile devices, such as smartphones, tablet computers, laptops and desktop computers. MDM is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.

IGTech365 utilizes MaaS 360™ from IBMMaaS360® Mobile Device Management helps simplify mobile device management by providing visibility and control of smartphones and tablets in the enterprise. The software supports devices such as iPhone, iPad, Android and Windows Phone. Read more

Contact IGTech365 for a FREE trial. 

Penetration Point

Mobile devices represent an unprotected, open door to your network. Employees are working hard keeping up with emails and other information on their phones, tablets, and laptops, but who and what are protecting these mobile devices from outside intrusions? Something as simple as leaving a phone unlocked can subject your network to cyber attacks.

Phones and laptops get lost and stolen all the time. However, most data leakage comes from current and former employees. IGTech365’s Managed IT Services provides industry-leading tools to protect your network and prevent data loss from the inside out. A key component of an overall security strategy is a good MDM.

“MDM is a way to ensure employees stay productive and do not breach corporate policies. Many organizations control activities of their employees using MDM products/services. MDM primarily deals with corporate data segregation, securing emails, securing corporate documents on device, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.” (Wikipedia)

Maas360 from IBM

PC Magazine MDM Review

MaaS 360™ MDM Features

General Features
  • Fast enrollment of mobile devices to streamline setup and deployment.
  • Integration with enterprise systems to use existing IT investments for mobile devices.
  • Centralized management to provide full visibility and control of mobile devices in your network.
  • Compliance and security to help you safeguard devices and data.
  • Monitoring and reporting to track, diagnose and resolve device and user issues.
Fast Enrollment
  • Customize configuration by selecting services and configure enrollment settings.
  • Send enrollment requests over-the-air using message services, email or a custom URL.
  • Authenticate against Active Directory/LDAP, one-time passcodes or Security Assertion Markup Language (SAML).
  • Create and distribute customized acceptable use policies and license agreements.
  • Register corporate and employee owned (BYOD) devices.
  • Initiate individual or bulk device enrollments.
  • Apply or modify default device policy settings.
Enterprise Integrations
  • Discover devices that are accessing enterprise systems.
  • Integrate with Microsoft Exchange and Office 365, IBM Lotus Notes® and other systems.
  • Apply existing Active Directory/LDAP certificate authorities and Network Access Control (NAC) systems.
Central Management
  • Configure email, calendar, contacts, Wi-Fi and VPN profiles.
  • Approve or quarantine new mobile devices on the network.
  • Restrict device features such as camera, screen capture, cloud backup and more.
  • Enable device sharing and kiosk mode features.
  • Provide help desk support such as password reset and remote control.
Compliance and Security
  • Set granular security policies for specific devices or persona policies that span across devices.
  • Specify pass-code policies and encryption settings.
  • Detect and restrict jailbroken and rooted devices.
  • Remotely locate, lock and wipe lost or stolen devices; selectively wipe corporate data while leaving personal data intact.
  • Create near real-time compliance rules with automated actions.
Monitoring and Reporting
  • Use device views to diagnose and resolve issues.
  • Allow users to help themselves with a self-service portal.
  • Use mobility intelligence dashboards to gain a graphical summary of operations and compliance.
  • View detailed hardware and software inventory reports.
  • Use bring-your-own-device (BYOD) privacy settings to block collection of personally identifiable information.
Typical Features of Any MDM
  • Secure email
  • Secure browser
  • Secure apps
  • Policy Enforcing: MDM users can enforce several types of policies:
    1. Personal Policy: highly customizable policies for the corporate environment.
    2. Device Platform specific: policies for advanced management of Android, IOS, Windows, and Blackberry devices.
    3. Compliance Policies/Rules.
  • VPN configuration
  • Application Catalogue
  • Pre-defined Wi-Fi and Hotspot settings
  • Jailbreak/Root detection
  • Remote Wipe of corporate data
  • Remote Wipe of entire device
  • Device remote locking
  • Remote messaging/buzz
  • Disabling native apps on device
Microsoft Certified Partner
wesley chapel chamber
Tampa Better Business Bureau

Pin It on Pinterest

Share This