Mobile device management

Android-Malware-Delivered-Via-Botnet-SpamWith an MDM solution in place, IT administrators can securely enroll devices in an enterprise environment, configure and update settings, monitor compliance with corporate policies, and remotely wipe or lock managed devices.

Many device-oriented defenses don’t work well with smartphones and tablets.
These devices don’t provide the same kind of device information as traditional Windows or Apple-based laptops and desktop systems.

It’s harder to use location as a factor when devices are mobile.

Mobile devices are a ‘green field’ opportunity for many attackers, as most lack the anti-virus and anti-malware defenses now well established on desktop systems.
Criminals will continue to target mobile devices, including tablets, particularly as consumers
increasingly use them for online shopping.

Managed accounts.

Installation, management, and removal of accounts that provide access to corporate services.

Managed configurations.

Configuration of settings such as passcodes, restrictions, and voice and data roaming policies.

Streamlined enrollment.

Authenticate and enroll devices over the air or automate MDM enrollment during setup for company-owned devices.
Device queries.

Scheduled querying of device, network, application, and security information.

Security commands.

Ability to clear a user’s passcode, and remotely lock or wipe a lost or stolen device.

Managed apps.

Installation, configuration, management, and removal custom in-house apps.