Radix Mobile Device Management (MDM) March 2015

Similar documents
Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.2

Feature List for Kaspersky Security for Mobile

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Symantec Mobile Management 7.2

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

What We Do: Simplify Enterprise Mobility

Cortado Corporate Server

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

WHITE PAPER. Extending the Reach of the Help Desk With Web-based Asset Management Will Significantly Improve Your Support Operations

Kaspersky Security for Mobile

Bell Mobile Device Management (MDM)

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Sophos Mobile Control User guide for Apple ios. Product version: 4

Kaspersky Security 10 for Mobile Implementation Guide

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Enterprise Mobile Device Management

Bell Mobile Device Management (MDM)

AVeS Cloud Security powered by SYMANTEC TM

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Hands on, field experiences with BYOD. BYOD Seminar

Enterprise Mobility Management

Cloud Services MDM. ios User Guide

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Securing Health Data in a BYOD World

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

For Businesses with more than 25 seats.

Systems Manager Cloud Based Mobile Device Management

IBM Endpoint Manager for Mobile Devices

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Data Loss Prevention & Mobile Device Management

Securing Enterprise Mobility for Greater Competitive Advantage

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

IBM United States Software Announcement , dated February 3, 2015

Trust Digital Best Practices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Addressing NIST and DOD Requirements for Mobile Device Management

Mobile Device Management

CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT

Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise PRODUCT BROCHURE.

BENEFITS OF MOBILE DEVICE MANAGEMENT

CA Enterprise Mobility Management MSO

Sophos Mobile Control User guide for Apple ios

Total Enterprise Mobility. Norbert Elek

ios Enterprise Deployment Overview

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

Guideline on Safe BYOD Management

Complete Patch Management

M a as3 6 0 fo r M o bile D evice s

Designing Enterprise Mobility

Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

Mobile First Government

ESET Mobile Security Business Edition for Windows Mobile

ManageEngine Desktop Central Training

Windows Phone 8.1 in the Enterprise

Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).

Process Solutions. Uniformance Process History Database (PHD) Product Information Note

Mobile Device Management Version 8. Last updated:

When enterprise mobility strategies are discussed, security is usually one of the first topics

BYOD (Bring Your Own Device)

Mobile Device Management for CFAES

Copyright 2013, 3CX Ltd.

Choosing an MDM Platform

ForeScout MDM Enterprise

RES PowerFuse Version Comparison Chart (1/9)

PMDP is simple to set up, start using, and maintain

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

The ForeScout Difference

Quick Start Guide. Version R9. English

M O B I L E E A M E Q U I P M E N T M A I N T E N A N C E

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Dell World Software User Forum 2013


Kaspersky Security for Mobile Administrator's Guide

4 Steps to Effective Mobile Application Security

Sophos Mobile Control Administrator guide. Product version: 3

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

11 Best Practices for Mobile Device Management (MDM)

10 Quick Tips to Mobile Security

Tuesday, June 5, 12. Mobile Device Usage

Desktop Management for the Small Enterprise

Secure Mobile Solutions

Sophos Mobile Control user help. Product version: 6.1

Workspace Manager 2014 Module Comparison Chart

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Seqrite Mobile Device Management

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Enterprise Mobility as a Service

A guide to enterprise mobile device management.

Product & Market Segments

LabTech Mobile Device Management Overview

Transcription:

Radix Mobile Device Management (MDM) March 2015 Worldwide, organizations operating in every field of activity are integrating hardware and software technology into their systems. Scenarios range from enterprises giving smart phones to their employees, to school districts providing students and teachers with tablets. As a result many new technology structures are emerging. No matter what the structure, in order to run smoothly and accommodate ongoing technology advancements, a management platform is required. From here all devices and apps can be monitored and supported in a user-friendly environment. Radix MDM allows

administrators to manage and control devices remotely from a cloud-based platform for centralized remote support. Radix MDM enables help desks, IT administrators and project leaders to centrally manage and support thousands of device owners wherever they are. Reaching well beyond the local network boundaries, Radix MDM delivers a bird's-eye view of the entire device fleet. Administrators are empowered to give the best support possible with optimal conditions for decision-making. Whatever the environment municipality, university, school, help desk centers or enterprises - Radix MDM can most effectively cater to the requirements of each case. Why do you need an MDM? Every organization wants to capitalize on their existing technology investment, while safely integrating the mass of smartphones and mobile computing devices flooding their borders. Whether looking for business scalability, or 21st century education opportunities, employees and students operating independently outside the local network is a reality that must be centrally managed. Otherwise, smartphones, laptops and tablets risk policy violations, network infrastructure disruptions and security threats that can destroy any potential gains.

Radix MDM selected features Remote control 1:1 Perform technical support tasks without limits, controlling remote clients and assisting users. Work alongside or take over the screen all from the comfort of your web browser console. Control over multiple remote clients Balance speed and quality in full screen or customized windows Share the clipboard for convenient text and script transfers Open and work on a shell remotely, without interrupting users Execute remote commands, tasks and complex scripting Perform bidirectional file transfer (File Explorer) Policy imposing Impose policies, working models and create different interface scenarios - such as limiting Internet or software usage, device settings, communication ports and more. Impose security and usage policies and prevent unauthorized data exposure Create encapsulated environments (kiosks) based on preconfigured policies Lock apps (locked and hidden) and whitelist others to remove distractions

Create customized desktop environments Restrict access to local and external storage Restrict access to the Internet and web via white and/or black lists Restrict tablet usage by schedules or triggers Enable/disable Wi-Fi, Bluetooth and other hardware elements Software distribution and update Optimize software installation, create distribution packages and push applications silently etc. Distribute and install apps silently with no user intervention Distribute software directly from a web link or the MDM server repository Dispatch and collect files from a central repository to and from clients Distribute large files in slices to reduce network overload Device tracking and locking (anti-theft) Easy tracking and effective protection in case your device is lost or falls into the wrong hands. Simply lock device access, wipe the content and unlock when found. Device tracking by GPS, cell data or Wi-Fi Lock and unlock device to render it useless Wipe device data by remote command

Monitoring and alerts Achieve proactive and effective screen, application and hardware component monitoring via selected alerts, system messages and configuration performance. Detect and alert in case of failure, tampering or an unusual event Monitor connection status Generate automatic responses to planned events Execute automatic tasks on multiple systems and fix problems before they become critical or even noticed by users Activate alerts by predefined criteria and parameters Activate alerts on monitored components Activate alerts on collected reports Send alerts to a mailing list Record alert history Record connections log and remark history Fact-based decisions and reports Make educated choices, based on facts and up-to-date information. Create detailed usage reports that include software, locations, internet and device usage.

Collect software and hardware usage stats Maximize resources and secure ROI with automatic inventories Create detailed text and graphics reports Apply advanced filters on collected reports Store, retrieve, manage and print reports Export reports in various formats Grouping and tagging Automatically group devices according to different criteria based on a comprehensive set of rules. Apply name, location work groups and user description tags per device.