Feature Description
ARCHITECTURE |
|
| Cloud based or on-premises model (operated in your infrastructure) | |
| Also available as virtual appliance | |
| Encrypted communication between client and server | |
| Bidirectional communication between client and server (Push and Pull) | |
| LDAP integration for selection of the current structure | |
| Own certificate server | |
CONSOLE |
|
| Policy change per drag / drop | |
| Multi-client capable architecture | |
| Role and responsibility dependent administration console | |
| Self-service portal for end users | |
| Intuitive dashboard for first level support | |
| Revision secure recording | |
| Meaningful reports and analyses | |
| Ticket system/Workflow for desired changes | |
| Group/user/device-specific permission | |
| Web based management console | |
ASSET MANAGEMENT |
|
| Inventory of the mobile devices in the company | |
INVENTORY MANAGEMENT |
|
| Inventory of installed applications | |
EXPENSE MANAGEMENT |
|
| Management of contract information for the device | |
APPLICATION MANAGEMENT |
|
| Installing and deleting of Apps – “over the air” | |
| Distributing of company applications via Push | |
| Enterprise App Store | |
| Black and white listing of applications | |
| App Wrapper | |
| Kiosk Mode | |
CONNECTION MANAGEMENT |
|
| Configuration of guidelines for WiFi, VPN, and APN | |
PIM MANAGEMENT |
|
| Configuration of guidelines for email, Exchange Active Sync, CalDav, Subscribed Calendars, and WebClips | |
| Secure PIM Container | |
| Secure eMail Gateway for Exchange | |
SECURITY MANAGEMENT |
|
| Central enforcement of complex passwords | |
| Encrypted Messaging Container for eMail, Calendar and Contacts (BYOD) | |
| Secure web browser | |
| URL-Whitelisting | |
| Dual Persona – Full separation of work and personal data | |
| Samsung SAFE Integration | |
| Encryption of memory card and device memory | |
| Encryption of communication between server and client | |
| Blocking of camera function in the company | |
| Prohibition of performing certain applications | |
| Central certificate management for mobile devices | |
| Blocking of mobile devices from the central console | |
| Central deletion of complex data or subareas | |
| Location of mobile devices in case of theft | |
| Sending of a message to the finder | |
| Establishing guidelines for limiting device and application settings | |
| Blocking of data synchronization to Apple iCloud | |
| Blocking of jailbreak or rooted devices | |
| Blocking of devices after a pre-determined inactive time period | |
| Encrypted communication of devices | |
CONTENT MANAGEMENT |
|
| Provisioning of corporate data – Secure Content Box | |
MONITORING |
|
| Display of private and company devices | |
| Display of which mobile communications provider are being used | |
| Display of jailbreak and rooted devices | |
| Listing which device producers are being used | |
| Listing which operating system platforms are being used in the company | |
| Listing of newly added devices | |
| Listing of pending registrations | |
| Status display of active, blocked, rolled out, defective, and lost devices | |
| Display of mobile devices with activated data roaming |