top of page

Mobile Device Management

Tablets and laptops are everywhere in business. The problem is how to manage so many devices that are rarely in your office. Software compliance, email configurations, system maintenance, or just keeping everything up to date- it's a logistical nightmare.

Western Data partners with IBM/ MaaS 360 to provide state-of-the-art remote management for all mobile platforms. Create custom app catalogs for users. Restrict personal storage and data leaks. Lock and restore devices immediately when lost or stolen. You will never again have to touch a tablet, laptop, or phone to have complete control.

Fast enrollment of mobile devices

  • Quickly select mobile device management services and configure enrollment settings.

  • Send enrollment requests over-the-air using message services, email or a custom URL.

  • Authenticate against Active Directory/LDAP, one-time passcodes or Security Assertion Markup Language (SAML).

  • Create and distribute customized acceptable use policies and license agreements.

  • Register corporate and employee owned (BYOD) devices.

  • Initiate individual or bulk device enrollments.

  • Apply or modify default device policy settings.

Integration with enterprise systems

  • Discover devices that are accessing enterprise systems.

  • Integrate with Microsoft Exchange and Office 365, IBM Lotus Notes® and other systems.

  • Apply existing Active Directory/LDAP certificate authorities and Network Access Control (NAC) systems.

Centralized management

  • Configure email, calendar, contacts, Wi-Fi and VPN profiles.

  • Approve or quarantine new mobile devices on the network.

  • Restrict device features such as camera, screen capture, cloud backup and more.

  • Enable device sharing and kiosk mode features.

  • Provide help desk support such as password reset and remote control.

Compliance and security

  • Set granular security policies for specific devices or persona policies that span across devices.

  • Specify passcode policies and encryption settings.

  • Detect and restrict jailbroken and rooted devices.

  • Remotely locate, lock and wipe lost or stolen devices; selectively wipe corporate data while leaving personal data intact.

  • Create near real-time compliance rules with automated actions.

Monitoring and reporting

  • Use device views to diagnose and resolve issues.

  • Allow users to help themselves with a self-service portal.

  • Use mobility intelligence dashboards to gain a graphical summary of operations and compliance.

  • View detailed hardware and software inventory reports.

  • Use bring-your-own-device (BYOD) privacy settings to block collection of personally identifiable information.

bottom of page