baramundi Mobile Devices
Tablet PCs and smartphones are a useful supplement to notebooks, and make it easy for employees to stay in touch with the company even when they are on the move. At the same time, however, the plethora of mobile endpoints makes life difficult for the IT department, as devices also need to comply with company requirements and security regulations. Enterprise Mobility Management (EMM) is to be efficient, mobile endpoints must be made part of standardized lifecycle management.
The solution: baramundi Mobile Devices for the effective management, configuration and implementation of security policies.
- Simple management of mobile endpoints, particularly for small and medium-sized companies
- Automated management according to standardized procedures
- Valuable time saved with added security
- Support for Apple Deployment Applications and Android Enterprise
- Automated management of mobile endpoints with Android iOS and Windows Phone
- The complete lifecycle of a mobile device is covered, from enrollment through to wipe
- Simple configuration of mobile devices using cross-platform profiles
- Reliable implementation of compliance regulations and protection for valuable company data
- Blacklisting and whitelisting of apps
- Configuration of apps
- Account taken of the latest data protection regulations
- Easy and secure integration of mobile endpoints
- iOS version 9 or higher
- Android version 4.0.4 or higher
- Android Enterprise Version 7.0 or higher
- Windows Mobile 10
Find out whether baramundi Mobile Devices can help you and request a free 30-dayfully functional trial version.
We’ll happily demonstrate to you in person in your company how you can make the most of working with the baramundi Management Suite, and how you can use baramundi Mobile Devices to securely manage your mobile endpoints.
Configuring devices from different mobile platforms is complex and time-consuming. The same parameters need to be entered in a different way for each operating system. baramundi Mobile Devices provides a uniform user interface for this purpose.
A toolkit containing various profile building blocks for enterprise mobility management that can be combined makes it possible to set up devices on different platforms while taking account of the specific functions of individual platforms and device types.
Deploying Applications and Settings
This EMM solution allows you to deploy apps to mobile devices just as easily as certificates and settings using a convenient search tool in the Apple App Store. You also have the option of making the installation of apps available to users via the kiosk integrated in baramundi Mobile Agent. Even if you need to roll out a company-wide configuration for certain apps, it can be easily accomplished using baramundi Mobile Devices. A clear user interface is provided for app configuration.
Inventory and Data Protection
You can use Enterprise Mobility Management software to maintain an overview of all mobile endpoints and their configurations. Alongside the hardware configuration, you can also read out operating system version, IMEI, network data, security settings, SIM-information, installed apps, and additional information.
In accordance with data protection regulations, user data such as contacts, calendar entries, call histories, e-mails, etc., are of course not cataloged. As a product from a German vendor, baramundi Mobile Devices meets applicable data protection standards.
Define and Enforce Security Regulations
With the Enterprise Mobility Manager, you can specify the complexity and minimum length of passwords and define unwanted apps (app blacklisting and whitelisting). You can place restrictions on the use of the app store or the camera. A compliance dashboard provides an overview of conformity with freely definable security regulations and compliance guidelines, and modifications made to the operating system can also be detected (“Jailbreak”/”Root”). You can also securely erase all data from a tablet PC or smartphone at the end of the lifecycle, and remove the device from your infrastructure, in the same easy way that you integrate it into your IT environment. Just a few mouseclicks are required to unlock a device again when employees forget their PIN. Stolen devices and lost smartphones are no longer a disaster – you can simply remove them from the system remotely, and the replacement devices will be automatically populated with the correct policies and guidelines.