Feature Description
ARCHITECTURE
Cloud based or on-premises model (operated in your infrastructure)
Also available as virtual appliance
Encrypted communication between client and server
Bidirectional communication between client and server (Push and Pull)
LDAP integration for selection of the current structure
Own certificate server
CONSOLE
Policy change per drag / drop
Multi-client capable architecture
Role and responsibility dependent administration console
Self-service portal for end users
Intuitive dashboard for first level support
Revision secure recording
Meaningful reports and analyses
Ticket system/Workflow for desired changes
Group/user/device-specific permission
Web based management console
ASSET MANAGEMENT
Inventory of the mobile devices in the company
INVENTORY MANAGEMENT
Inventory of installed applications
EXPENSE MANAGEMENT
Management of contract information for the device
APPLICATION MANAGEMENT
Installing and deleting of Apps – “over the air”
Distributing of company applications via Push
Enterprise App Store
Black and white listing of applications
App Wrapper
Kiosk Mode
CONNECTION MANAGEMENT
Configuration of guidelines for WiFi, VPN, and APN
PIM MANAGEMENT
Configuration of guidelines for email, Exchange Active Sync, CalDav, Subscribed Calendars, and WebClips
Secure PIM Container
Secure eMail Gateway for Exchange
SECURITY MANAGEMENT
Central enforcement of complex passwords
Encrypted Messaging Container for eMail, Calendar and Contacts (BYOD)
Secure web browser
URL-Whitelisting
Dual Persona – Full separation of work and personal data
Samsung SAFE Integration
Encryption of memory card and device memory
Encryption of communication between server and client
Blocking of camera function in the company
Prohibition of performing certain applications
Central certificate management for mobile devices
Blocking of mobile devices from the central console
Central deletion of complex data or subareas
Location of mobile devices in case of theft
Sending of a message to the finder
Establishing guidelines for limiting device and application settings
Blocking of data synchronization to Apple iCloud
Blocking of jailbreak or rooted devices
Blocking of devices after a pre-determined inactive time period
Encrypted communication of devices
CONTENT MANAGEMENT
Provisioning of corporate data – Secure Content Box
MONITORING
Display of private and company devices
Display of which mobile communications provider are being used
Display of jailbreak and rooted devices
Listing which device producers are being used
Listing which operating system platforms are being used in the company
Listing of newly added devices
Listing of pending registrations
Status display of active, blocked, rolled out, defective, and lost devices
Display of mobile devices with activated data roaming