Mobile Device Management for iOS and Android devices
Posted on 06 November 2012.
CoSoSys released Mobile Device Management (MDM) for iOS and Android as a new module within Endpoint Protector 4.3 including support for iOS 6.

“With Mobile Device Management capabilities fully integrated in Endpoint Protector 4 Hardware and Virtual Appliances, IT departments can deal easily with the Bring-Your-Own-Device trend they are facing from iOS and Android users. The MDM features enable IT administrators now to monitor and manage mobile devices, while the Device Control features ensures a complete control over where these devices connect to in the network, offering overall to IT departments a powerful tool to secure data and audit the use of devices,” said Roman Foeckl, CEO of CoSoSys.

The presence of smartphones and tablets in today´s corporate environments is extending the boundaries of business processes other times confided within a company’s four walls. While there are significant benefits in adopting mobile devices as a way to increase work efficiency, there are also significant concerns for IT departments about how to keep sensitive corporate data secure wherever and on whatever device the employee accesses and stores it.

Mobile Device Management by Endpoint Protector allows businesses to embrace portability and mobility without compromising the security of their own business critical data and without burdening IT. The new module can be easily integrated in companies existing IT infrastructures, allowing for a secure and fast self or over-the-air enrollment and provision process, via E-Mail, SMS, web portal or QR code of both corporate and privately-owned devices.

Using a one-time-code enrollment mechanism, it prevents any unauthorized access and stops untrusted devices connecting to the company network.

As a complementary solution to the existing endpoint Device Control module for Desktops and Laptops, Mobile Device Management ensures a proactive protection over mobile endpoints, allowing IT administrators to efficiently manage mobile devices in a transparent manner from one intuitive web based reporting and administration interface. The new module addresses the major challenges faced by IT departments:
  • Mobile data security, to protect against the latest data loss, leakage and theft threats with key features like strong security policies enforcement, advanced password rules, device encryption, remote device lock and data wipe
  • Tracking and precise locating, offering complete reporting of where company critical business data is on devices and was at any time and for any managed device
  • Mobile apps monitoring and management, allowing a close control over the large number of unwanted apps that can easily make their way on employees mobile devices.





Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //