Feature description

ARCHITECTURE

Cloud based or on-premises model (operated in your infrastructure)successIcn
Also available as virtual appliancesuccessIcn
Encrypted communication between client and serversuccessIcn
Bidirectional communication between client and server (Push and Pull)successIcn
LDAP integration for selection of the current structuresuccessIcn
Own certificate serversuccessIcn

CONSOLE

Policy change per drag / dropsuccessIcn
Multi-client capable architecturesuccessIcn
Role and responsibility dependent administration consolesuccessIcn
Self-service portal for end userssuccessIcn
Intuitive dashboard for first level supportsuccessIcn
Revision secure recordingsuccessIcn
Meaningful reports and analysessuccessIcn
Ticket system/Workflow for desired changessuccessIcn
Group/user/device-specific permissionsuccessIcn
Web based management consolesuccessIcn

ASSET MANAGEMENT

Inventory of the mobile devices in the companysuccessIcn

INVENTORY MANAGEMENT

Inventory of installed applicationssuccessIcn

EXPENSE MANAGEMENT

Management of contract information for the devicesuccessIcn

APPLICATION MANAGEMENT

Installing and deleting of Apps – “over the air”successIcn
Distributing of company applications via PushsuccessIcn
Enterprise App StoresuccessIcn
Black and white listing of applicationssuccessIcn
App WrappersuccessIcn
Kiosk ModesuccessIcn

CONNECTION MANAGEMENT

Configuration of guidelines for WiFi, VPN, and APNsuccessIcn

PIM MANAGEMENT

Configuration of guidelines for email, Exchange Active Sync, CalDav, Subscribed Calendars, and WebClipssuccessIcn
Secure PIM ContainersuccessIcn
Secure eMail Gateway for ExchangesuccessIcn

SECURITY MANAGEMENT

Central enforcement of complex passwordssuccessIcn
Encrypted Messaging Container for eMail, Calendar and Contacts (BYOD)successIcn
Secure web browsersuccessIcn
URL-WhitelistingsuccessIcn
Dual Persona – Full separation of work and personal datasuccessIcn
Samsung SAFE IntegrationsuccessIcn
Encryption of memory card and device memorysuccessIcn
Encryption of communication between server and clientsuccessIcn
Blocking of camera function in the companysuccessIcn
Prohibition of performing certain applicationssuccessIcn
Central certificate management for mobile devicessuccessIcn
Blocking of mobile devices from the central consolesuccessIcn
Central deletion of complex data or subareassuccessIcn
Location of mobile devices in case of theftsuccessIcn
Sending of a message to the findersuccessIcn
Establishing guidelines for limiting device and application settingssuccessIcn
Blocking of data synchronization to Apple iCloudsuccessIcn
Blocking of jailbreak or rooted devicessuccessIcn
Blocking of devices after a pre-determined inactive time periodsuccessIcn
Encrypted communication of devicessuccessIcn

CONTENT MANAGEMENT

Provisioning of corporate data – Secure Content BoxsuccessIcn

MONITORING

Display of private and company devicessuccessIcn
Display of which mobile communications provider are being usedsuccessIcn
Display of jailbreak and rooted devicessuccessIcn
Listing which device producers are being usedsuccessIcn
Listing which operating system platforms are being used in the companysuccessIcn
Listing of newly added devicessuccessIcn
Listing of pending registrationssuccessIcn
Status display of active, blocked, rolled out, defective, and lost devicessuccessIcn
Display of mobile devices with activated data roamingsuccessIcn