Feature Description
Feature Description
ARCHITECTURE
Cloud based or on-premises model (operated in your infrastructure)

Also available as virtual appliance

Encrypted communication between client and server

Bidirectional communication between client and server (Push and Pull)

LDAP integration for selection of the current structure

Own certificate server

CONSOLE
Policy change per drag / drop

Multi-client capable architecture

Role and responsibility dependent administration console

Self-service portal for end users

Intuitive dashboard for first level support

Revision secure recording

Meaningful reports and analyses

Ticket system/Workflow for desired changes

Group/user/device-specific permission

Web based management console

ASSET MANAGEMENT
Inventory of the mobile devices in the company

INVENTORY MANAGEMENT
Inventory of installed applications

EXPENSE MANAGEMENT
Management of contract information for the device

APPLICATION MANAGEMENT
Installing and deleting of Apps – “over the air”

Distributing of company applications via Push

Enterprise App Store

Black and white listing of applications

App Wrapper

Kiosk Mode

CONNECTION MANAGEMENT
Configuration of guidelines for WiFi, VPN, and APN

PIM MANAGEMENT
Configuration of guidelines for email, Exchange Active Sync, CalDav, Subscribed Calendars, and WebClips

Secure PIM Container

Secure eMail Gateway for Exchange

SECURITY MANAGEMENT
Central enforcement of complex passwords

Encrypted Messaging Container for eMail, Calendar and Contacts (BYOD)

Secure web browser

URL-Whitelisting

Dual Persona – Full separation of work and personal data

Samsung SAFE Integration

Encryption of memory card and device memory

Encryption of communication between server and client

Blocking of camera function in the company

Prohibition of performing certain applications

Central certificate management for mobile devices

Blocking of mobile devices from the central console

Central deletion of complex data or subareas

Location of mobile devices in case of theft

Sending of a message to the finder

Establishing guidelines for limiting device and application settings

Blocking of data synchronization to Apple iCloud

Blocking of jailbreak or rooted devices

Blocking of devices after a pre-determined inactive time period

Encrypted communication of devices

CONTENT MANAGEMENT
Provisioning of corporate data – Secure Content Box

MONITORING
Display of private and company devices

Display of which mobile communications provider are being used

Display of jailbreak and rooted devices

Listing which device producers are being used

Listing which operating system platforms are being used in the company

Listing of newly added devices

Listing of pending registrations

Status display of active, blocked, rolled out, defective, and lost devices

Display of mobile devices with activated data roaming
