Request an Advisor
Get Listed

Products (17)

 

MDM by Tangoe

Mobile Device Control for the Way You Work

Mobile Device Management (MDM) is mission-critical for millions of IT professionals around the world. Organizations expect rapid deployment of smartphones, tablets, and applications as well as security enforcement, optimal mobile infrastructure performance, and cost avoidance polices that prevent increases in total-cost-of-ownership.

Tangoe has the most comprehensive smartphone and tablet lifecycle management solution available. End-users get fast activation on their device of choice while enterprises easily manage thousands of mobile devices and applications.

Tangoe MDM delivers a host of market-leading features including:

  • Allow-Block-Quarantine based on device, employee and application policy compliance
  • Robust client application for policy management, monitoring and enforcement
  • Mobile application deployment you can trust
  • Real-time cost avoidance policies that prevent bill shock

Mobile Device Management

The most comprehensive control for deploying mobile devices

Tangoe delivers integrated device provisioning, configuration, security, monitoring, management, and support for devices owned by your company and employees

 

Sophos Mobile Control by Sophos

Manage Mobile Requests with Simplicity

Mobile devices are like rabbits: tiny, cute and rapidly multiplying. This means much of your day is spent provisioning, securing, locating, managing and updating these devices. With Sophos Mobile Control—the Sophos Enterprise Mobility Management solution—we give you the ability to manage countless devices with a single solution. Now you’ll finally have the time to address all of those requests that were never in your job description.

Mobile Device Management (MDM)

Mobile Control provides an easy way to manage all your smartphones and tablets. Whether you deploy corporate devices, or your employees bring their own (BYOD). Our EMM solution handles them from the initial setup and enrollment, right through to device decommissioning. And our fully web-based console allows administration from any location on any device.

  • Manages and controls iOS, Android (including Samsung SAFE), Windows Phone 8 and other device types
  • Configures device policies and deploys them over-the-air
  • Enforces built-in security features such as passcodes and device encryption
  • Provides full loss and theft protection for lost or stolen devices
  • Builds group-based compliance policies

 

 

MobiControl by Soti

EMPOWER ENTERPRISE MOBILITY WITH MOBICONTROL

With over 12,000 enterprise deployments and millions of devices managed globally, SOTI’s MobiControl is the world’s most trusted Mobile Device Management (MDM) and Bring Your Own Device (BYOD) Management solution. MobiControl enables organizations to centrally manage, support, secure and track corporate-liable and employee-liable mobile devices, regardless of device type, mobile platform and location.

 

Absolute Manage by Absolute Software

The features available with Absolute Manage MDM allow you to remotely manage the iOS, Android, and Windows Phone devices in your deployment. You can wirelessly (over cellular or Wi-Fi) configure, query, and even wipe or lock managed devices. Absolute Manage MDM is available as an on-premise installation or as a cloud-based solution.

Mobile Application Management

  • Track installed apps
  • Build device records using custom data fields
  • Publish a list of approved apps onto each device and provide a single-click download/install process for users
  • Silently install/remove apps using management APIs

Security, Change & Configuration Management

  • Set longer, more complex passwords for enterprise level security
  • Lock a device, clear a password, and wipe a device clean to factory settings
  • Manage and deploy profiles to configure email, restrict apps, set up VPN, disable the camera, and deploy web clips
  • Send customized messages and communicate with the end user wirelessly
  • Use policy-locked configuration profiles to stop non-compliant devices (jailbroken, blacklisted apps installed) from accessing company email and networks
  • Schedule policies so users have a defined window of time to access secured documents and corporate networks
  • User authentication: Unlike device certificates, Absolute Manage generates unique certificates per user for Exchange email access. So instead of relying upon standard passwords, user authentication can be done seamlessly using certificates. This provides the organization with a much higher degree of security, an improved end user experience, and a significant reduction in password related security and help desk incidents.

Mobile Content Management

  • Apply strict security controls for the sharing of files and media
  • Distribute sensitive or confidential files to devices without using email
  • Restrict content from being emailed, printed, or moved outside of the AbsoluteSafe repository
  • All content is managed with the same types of automated and dynamic policies used for configuration and provisioning
  • This includes scheduling the availability of content on a device so that it can be automatically deleted based on date and time (down to the minute) regardless if the device is on or off the network
  • Mobile content management includes integration with the corporate SharePoint infrastructure to locate and assign content to the AbsoluteSafe repository

Asset Inventory

  • Gather hardware and software data points for analysis
  • Display data such as serial numbers, Mac addresses, installed apps, telephone numbers, and other data with custom views, searches, and reports
  • Integrate your mobile device data with third party applications such as Microsoft SCCM

BYOD

  • Read our BYOD Policy Implementation Guide for best practices
  • Use the automated employee enrollment process to onboard employees and their personally owned devices, eliminating the manual IT work associated with BYOD programs
  • Record employee opt-in and direct a copy of each confirmation to Human Resources
  • Automatically assign BYOD-specific policies to ensure these devices only access corporate networks and data if they are compliant

 

 

Airwatch Mobile Device Management by AirWatch

Manage a Diverse Fleet of Devices in Your Enterprise

Mobile devices are proliferating in the enterprise at an exponential rate. With the growing number of device models, platforms and operating system versions available, businesses are facing new and complex mobility management challenges. Accessing corporate resources from a mobile device can introduce a significant threat to corporate security.

AirWatch® Mobile Device Management enables businesses to address challenges associated with mobility by providing a simplified, efficient way to view and manage all devices from the central admin console. Our solution enables you to enroll devices in your enterprise environment quickly, configure and update device settings over-the-air, and secure mobile devices. With AirWatch, you can manage a diverse fleet of Android, Apple iOS,BlackBerry, Mac OS, Symbian, Windows Mobile, Windows PC/RT and Windows Phone devices from a single management console.

Single Management Console

The admin console gives visibility into all enrolled corporate-owned, employee-owned and shared devices, regardless of platform or device type. Organization groups provide administrators with a streamlined way to manage all users and devices. Directory services (AD/LDAP) integration enables custom role-based groups that mimic existing corporate structure. The HTML5, web-based console integrates with existing enterprise systems and can be accessed anytime, anywhere.

Enrollment

AirWatch’s simple enrollment process provides a consistent agent-based enrollment flow for all major platforms, and allows both administrators and end users to enroll devices. When users enroll, they are authenticated and the appropriate restrictions, apps and content are pushed automatically.

Profiles

Profiles allow you to define enterprise settings, policies and restrictions for devices without requiring user interaction. You can assign profiles based on operating system or device ownership type, and deploy to an organization group, user group or individual users. Profiles can deploy automatically to devices upon enrollment, and administrators can push profiles on-demand over the air. Available profiles include passcode, restrictions, Wi-Fi, VPN, email, applications and more.

 

 

Mobile Device Management by Kaspersky Lab

Letting mobile devices access your corporate network can offer many benefits – but also introduce significant security risks. In addition to delivering multi-layered security for mobile devices, Kaspersky Security for Mobile provides a host of mobile device management (MDM) functionality that helps businesses to minimise the time they have to spend on managing mobile endpoints and mobile access.

Rigorous security 

By integrating effective mobile endpoint security capabilities and far-reaching mobile device management (MDM) functionality, Kaspersky Security for Mobile simplifies the task of protecting mobile devices from a wide range of threats – including viruses, Trojans, worms, spyware, bots, social engineering techniques, phishing attacks and more. In addition, Kaspersky Security for Mobile provides anti-theft functionality, corporate application containerisation features and the ability to manage data encryption.

Protecting multiple platforms & device types – via one centralised management console 

With support for smartphones and tablets on a wide range of platforms – including Android, iOS, Windows Phone 8, Windows Mobile, Symbian and BlackBerry – Kaspersky Security for Mobile lets you configure and manage protection for most commonly used devices. A single, intuitive-to-use management console helps you to configure and control security for each device. ‘Over the Air’ (OTA) capabilities let you enable mobile access to your corporate data and systems – including contacts, calendars, email systems and more – and also manage mobile security from a ‘single pane of glass’.

Securing your BYOD 

Bring Your Own Device (BYOD) initiatives can generate business benefits – but also create additional security risks. However, if you’re running Kaspersky Security for Mobile, it will automatically identify any new devices that appear on your network, automatically distribute mobile security technologies and simplify the configuration of data access restrictions.

Keeping corporate data and personal information separate 

Kaspersky Security for Mobile lets you set up containers within every mobile device, so each corporate application – and the sensitive corporate data associated with it – is stored in its own container and is totally separated from the user’s personal information. You can force encryption for the containerised data and also prevent corporate data from leaving its container. In addition, if a device is stolen or lost, remotely operated features make it easy for you to delete all information inside each container, without deleting any of the user’s own data. Similarly, if an employee leaves your business – taking their BYOD mobile device with them – Kaspersky Security for Mobile makes it easy for you to delete sensitive corporate data from the device.

MDM – to manage security and more 

By combining world-class security capabilities and extensive mobile device management features, Kaspersky Security for Mobile helps to secure your corporate mobile endpoints, protect precious information and simplify administration.

Aiding security policy compliance 

Flexible configuration tools let you control which applications can be run on the mobile device. You’re free to create and enforce different policies for specific groups or individual users within the business.

 

Blackberry Enterprise Service 10 by Blackberry

MDM and beyond

Mobile Device Management (MDM) gives you management control over mobile devices, for example locking and wiping devices. While MDM is an important part of mobility management, your business must be able to effectively deploy and manage work apps and content to help your employees be more productive and better able to serve customers. That requires full Enterprise Mobility Management (EMM)..

BlackBerry® provides the only fully integrated enterprise mobility platform. With a full range of smartphones designed for maximum enterprise user productivity, applications, device and application management, and end-to-end security, the BlackBerry platform supports the full spectrum of EMM needs.

BlackBerry simplifies EMM.

 

 

Wavelink Avalanche by Landesk

Powerful Enterprise Mobility Management for Any Device

As mobility has shifted into the mainstream for corporations large and small, the requirements have changed. One major change has been the emergence of the customer-facing mobile workforce. This type of user is typically in a role that is revenue generating, or customer service-oriented, and is highly visible to your customers. Examples include retail associates that assist consumers with product selections, answering questions and even conducting sales transactions.

Enterprise Mobility Management must encompass all the aspects of mobility – and that includes the increasing selection of mobile devices that are being placed into the hands of mobile workers. Wavelink delivers broad consumer smart device and tablet support to customers in addition to management of rugged mobile computers traditionally used by mission-critical workers. When considering all the aspects of an enterprise mobility deployment, choosing a solution to manage that deployment also encompasses selecting the enterprise mobility management utility that can handle not just the mobile device but all the aspects that maximize worker productivity—mobile applications, content access, and more.

Wavelink Avalanche ensures workers leverage the most from mobility, and also eases mobile deployment management for the administrator, delivering the most efficient means to update mobile applications on workers’ devices. What’s more, Wavelink Avalanche provides IT the flexibility to manage mission-critical deployments across device types—from rugged mobile computers to consumer smart devices and tablets. Avalanche also offers choice of deployment methods. You can choose SaaS deployment for speedy delivery and updates, maintenance, and efficiency. Alternatively, deploy Avalanche on-premise for complete control and compliance with internal security requirements.

 

Advanced Mobile Management by Mobile Iron

The MobileIron Platform combines traditional mobile device management (MDM) capabilities with comprehensive security, mobile application management, and mobile content management capabilities. An IT administrator can manage the lifecycle of the device and its applications, from registration to retirement, and rapidly accelerate operationalizing and scaling their Mobile IT infrastructure. We also enable customers to derive additional value from apps created by application vendors or internally, using our SDKs or our AppConnect application wrappers to leverage our application security services.

 

Symantec Mobile Management Suite by Symantec

Symantec Mobile Management Suite

One solution for all your enterprise mobility needs

Symantec Mobile Management Suite is a comprehensive mobile security and management solution that provides the critical capabilities enterprises need to embrace mobility. The suite delivers innovative application management, scalable device management and trusted threat protection that enables anytime, any place productivity without sacrificing data protection or the user experience.

 

MaaS360 - Mobile Device Management by Fiberlink, an IBM company

How MaaS360 Supports the MDM Lifecycle

MaaS360 simplifies MDM with rapid deployment, and comprehensive visibility and control that spans across mobile devices, applications, and documents. MaaS360 supports all devices including the iPhone, iPad, Android, Windows Phone, BlackBerry, and Kindle Fire.

Rapidly Enroll Mobile Devices

MaaS360 MDM streamlines the platform set-up and device enrollment process to make life simple for IT and employees.

  • Select MDM services and configure device enrollment settings
  • Send enrollment requests over the air using SMS, email, or a custom URL
  • Authenticate against Active Directory/LDAP, one-time passcode, or SAML
  • Create and distribute customized acceptable use policies and EULAs
  • Register corporate and employee owned (BYOD) devices
  • Initiate individual or bulk device enrollments
  • Apply or modify default device policy settings

Integrate Mobile Devices with Enterprise Systems

MaaS360 makes integration easy. 

  • Discover devices accessing enterprise systems
  • Integrate with Microsoft Exchange, Lotus Notes, and Microsoft Office 365
  • Leverage existing Active Directory/LDAP and Certificate Authorities

Centrally Manage Mobile Devices

MaaS360 provides a unified console for smartphones and tablets with centralized policy and control across multiple platforms.

  • Configure email, calendar, contacts, Wi-Fi and VPN profiles over-the-air (OTA)
  • Approve or quarantine new mobile devices on the network
  • Distribute and manage public and corporate applications
  • Securely share and update documents and content

Proactively Secure Mobile Devices

Dynamic security and compliance features continuously monitor devices and take action.

  • Specify passcode policies
  • Enforce encryption settings
  • Detect and restrict jailbroken and rooted devices
  • Remotely locate, lock and wipe lost or stolen devices
  • Selectively wipe corporate data leaving personal data intact
  • Create real-time compliance rules with automated actions
  • Use geo-fencing rules to enforce location-related compliance

Streamline Mobile Device Management Support

MaaS360 helps you diagnose and resolve device, user or app issues in real time.

  • Use device views to diagnose and resolve issues
  • Locate lost or stolen devices
  • Reset forgotten passcodes
  • Help users help themselves with a self-service portal

Monitor and Report on Mobile Devices

MI360™ (Mobility Intelligence) dashboards deliver an interactive, graphical summary of your operations and compliance, allowing IT to report in real-time across the entire enterprise.

  • Detailed hardware and software inventory reports
  • Privacy settings block collection of personally identifiable information
  • Mobile expense management for real-time data usage monitoring and alerting
 

Good® Mobile Device Management by Good Technology

Mobile Device Management

Automated device lifecycle management.

Good provides mobile device management (MDM) to support the complete device lifecycle. IT can easily control device settings on any managed device – corporate liable, BYO or COPE – , and ensure safe access to proprietary business information. MDM is a basic capability for enabling enterprise mobility, and is included in Good for Enterprise, the Good Collaboration Suite, and the Good Dynamics Secure Mobility Platform.

Easily Setup & Manage Devices

Permit self-enrollment of iOS, Android and Windows mobile devices for use within the enterprise to minimize setup time, increase productivity and reduce support costs. Automatically configure devices, deploy apps, and, if necessary, wipe data – either all data or just corporate data – based on an employee’s status in the corporate directory system (e.g., Active Directory). Control ongoing support costs via a self-service portal that allows users to handle common tasks (e.g., add a device, lock device, wipe device, password reset) immediately on their own.

Automate Policy Enforcement

A rich set of policy controls over password, device encryption, camera, Wi-Fi, VPN, app whitelisting and blacklisting and more, provides IT with the required management for MDM-enrolled devices. Integration with corporate directory systems enables no-touch operations via continual enforcement of policies based on corporate directory groups.

Report on Assets and Compliance

Pre-built charts enable easy tracking of asset-related metrics – e.g., device status, installed apps, utilization, etc., and expense management reports. Full Governance, Risk and Compliance (GRC) reporting provides visibility into compliance violations, audit reports, IT policy history and IT policy inventory.

Take Advantage of New iOS 7

Features Centrally manage the heterogeneous enterprise mobile landscape, across device models and mobile operating systems. Take advantage of the latest MDM features including new iOS 7 business-oriented capabilities such as “open in” restrictions, hide notification center on the lock screen, disallow fingerprint-based unlock and more; single sign-on authentication across corporate apps on managed devices; and wirelessly configure and set policies for managed apps.

 

McAfee Enterprise Mobility Management (EMM) by McAfee

Security and Management for Mobile Devices, Data, and Applications

McAfee Enterprise Mobility Management (McAfee EMM) manages and secures the mobile workforce. McAfee EMM delivers a simplified, streamlined way to enable productivity with confidence in a world where users, and their devices, go everywhere and anywhere.

Comprehensive Mobile Security

Mobile productivity presents risks to mobile devices and data, including malware, loss, theft, and unauthorized access. Businesses work hard to develop their intellectual property, partner and customer lists, and trade secrets so it’s a top priority to protect that mobile data. This is achieved through policy-based security, including malware and app protection, that’s easy to use and manage.

Support for Bring Your Own Device (BYOD)

Employee device choice can reduce costs, however it adds complication for IT. When an employee-owned, consumer-oriented device is used for business, additional privacy, control, usage, policy, security, and data protection issues need to be addressed to ensure that business data is protected.

Single Pane of Glass for Managing and Securing All Endpoints

McAfee EMM is fully managed by McAfee ePolicy Orchestrator (McAfee ePO) management software. McAfee EMM and McAfee ePO software enable enterprises to manage and secure mobile users and devices right alongside traditional endpoints like laptops, workstations, and servers, using the same familiar console and infrastructure.

 

Mobile Security and App Management for BYOD by Trend Micro

Mobile Security Allows You to Take Control of BYOD

By integrating with the Trend Micro Control Manager console, Mobile Security allows you to centralize policy and management across Trend Micro OfficeScan™ endpoint security and other Trend Micro solutions—for a holistic security strategy.

Now, you can take control of the “bring-your-own-device” consumerization of your workspace. Secure, track, monitor, and manage your employee’s consumer-grade mobile devices, mobile apps, and company data.

Mobile Security:

  • Extends protection to mobile devices, apps, and data
  • Enables IT to configure, manage and monitor threat and data protection through a single console
  • Allows you to run as a standalone solution or integrate it with other Trend Micro products via Trend Micro Control Manager
  • Reduces IT costs and complexity by enabling a unified endpoint security platform
  • Secures the broad range of mobile platforms: iOS, Android, Blackberry, Symbian, and Windows Phone

Our 4-in-1 solution allows you to balance employee enablement with IT control. It features:

Mobile Device Management (MDM)

  • Improves visibility and control with instant views of compliance, inventory, protection, and health of devices
  • Enables IT to remotely enroll, provision, de-provision, and track devices
  • Allows cross-device and group policies for consistent enforcement of security requirements

Mobile Application Management

  • Offers application black listing and white listing to prevent or allow the use of mobile apps
  • Enables IT to manage and block specific types of apps based on categories
  • Identifies and blocks risky Android apps using the Trend Micro Mobile Application Reputation Service, part of the Smart Protection Network
  • Pushes apps to end-user devices through a corporate app store to accelerate the use of optional or required business apps
  • Provides inventory management and reporting for better visibility of apps used across devices, groups, company
  • Enables tracking, management and deployment of volume purchase programs on iOS devices

Data Protection

  • Protects data on lost or stolen devices with remote lock and wipe, selective wipe, and device locate capabilities
  • Enforces encryption, and compliance, blocking jail broken or unencrypted devices
  • Empowers IT to lock risky mobile device features such as cameras, Bluetooth®, and SD card readers. These locks can be applied based on when the device is connected to a specific area.

 

 

IBM Endpoint Manager for Mobile Devices by IBM

IBM® Endpoint Manager for Mobile Devices provides a completely integrated approach for managing, securing, and reporting on laptops, desktops, servers, smartphones, tablets, and even specialty devices such as point-of-sale terminals. This provides customers with unprecedented real-time visibility and control over all devices employees use in their daily job functions; reducing costs, increasing productivity, and improving compliance.

Endpoint Manager for Mobile Devices helps you address the issues of security, complexity and bring your own device (BYOD) policies that challenge support for an increasingly mobile workforce.

  • Safeguard enterprise data—with advanced security and compliance features.
  • Gain enterprise visibility—with a consolidated inventory of employee- and corporate-owned devices.
  • Manage from a unified infrastructure—using a single platform to manage all your enterprise devices.
 

Enterprise Mobility Management by SAP

Secure mobile devices, apps, and content with SAP Mobile Secure enterprise mobility management software

Meet the diverse challenges of enterprise mobility head on - with the SAP Mobile Secure enterprise mobility management portfolio. Ensure your mobile devices, mobile apps, and content can be secured on iOS, Android and Windows Phone 8 devices. Rely on SAP’s robust mobile device management, mobile application management, and mobile content management solutions..

  • Protect critical corporate data with the most scalable, secure architecture
  • Manage your mobile deployments in the Cloud or On-Premise
  • Secure personally owned and Bring Your Own Device (BYOD) scenarios

 

 

XenMobile by Citrix

Deliver the most complete Enterprise Mobility Management solution

XenMobile delivers complete Enterprise Mobility Management (EMM) – mobile device management, mobile application management and enterprise-grade productivity apps – in one comprehensive solution. XenMobile enhances the user experience on BYO or corporate devices without compromising security.

Product Overview

Demo

Datasheet

White Paper

Case Study