2. What is Mobile Device
Management?
Gartner defines MDM – Mobile Device Management as
a range of products and services that enables
organizations to deploy and support corporate
applications to mobile devices, such as smartphones
and tablets, possibly for personal use-- enforcing policies
and maintaining the desired level of IT control across
multiple platforms.
3. Why MDM?
Use of personal IT mobile devices to conduct company
business has become an everyday occurrence in most
organizations. The BYOD or "bring your own device" to
work model continues to gain momentum in 2012
Whether devices are personally owned or company
provided, employees are happy to enjoy the benefits of
remote connectivity without concerns about liability
and relying mostly on their employers for safety policies
and secure environments.
4. Our Approach
Enroll devices over-the-air
(OTA) quickly and securely
Configure one or multiple
devices using common
connection settings
Collect critical network and
device information including
hardware and installed Apps
Secure customers’
environments through policy
profiles and restrictions
Manage devices through a
centralized management
console for maximum visibility
5. Part1: Enroll
Easily register new or existing devices.
Simplified enrollment procedure for bulk
registration of existing devices.
Self-registration procedure for new devices.
Enrollment methods include SMS, email, quick
reference (QR code), and web.
6. Part 2: Configure
Instantly setup authorized configurations across all
managed mobile devices.
Safely apply corporate settings including Microsoft
Exchange, Wi-Fi, VPN, LDAP, as well as configure and
apply third party email such as POP and IMAP
Configure smartphones and tablets with standardized
configuration profiles, and configure certificates for
secure distribution and management of profiles.
7. Part 3: Collect
Easily track systems’ inventory and identify mobile
device types.
Collect detailed information on device type,
name, model, serial number, and more.
Capture carrier network, phone number, and data
roaming settings.
Collect hardware data including processor,
memory, hard drive space, and battery life.
View and manage inventory of installed
applications.
8. Part 4: Secure
Provision and enforce security policies.
Set and enforce passcode complexity levels and
history tracking.
Define and enforce device auto-lock after inactivity
period and/or apply grace periods.
Program auto-wipe following a specified number of
failed login attempts.
Enforce restrictions such as access to App store,
camera, and browser security.
9. Part 5: Service
Centrally manage all mobile devices across all
customer sites from a single interface (or single-pane-
of-glass).
Apply profiles to a single device, or globally to a group
of devices, based on location or device type.
Create dynamic groups that enable auto-wipe or
auto-lock actions in case of misplaced or stolen
device.
Easily group devices by department or business unit.
10. Device Features
Apple Hand-held Devices (iPhone®,
iPad®) Using iOS 4 or Higher
Hand-held Devices Using Google
Android™ 1.6 or Higher