Page 68 - index
P. 68
Remotely Control Devices
With a comprehensive MDM solution, you can remotely monitor and manage files on your
device from any browser. It is very easy to drag and drop files between a device and your
browser. From a centralized location, you can remotely edit contacts and take control of the
device’s camera. When a device is stolen, you can use the device camera to take a picture of
the thief, and submit it to the relevant authorities before remotely wiping the data from the
device.
Mobile Security
In a BYOD environment, it is very important to have a strong password policy. However, it is a
tedious task to enforce this policy on multiple devices manually. With an MDM program, you can
automatically apply password policies on multiple devices, saving time.
You can enforce password specifications such as the length of the password, as well as number
of failed attempts and time lapse before auto-lock. When a device is lost or stolen, the password
can be changed remotely, data and settings can be remotely wiped off, and the device can be
reset to factory settings. The device can be controlled even through an SMS.
MDM solutions allow you to remotely monitor apps installed on any device, and easily remove
rogue applications. With an app whitelist, you can allow specific apps to be installed on a
device.
You can create a blacklist of apps for the entire organization or for a specific group of
employees. When a blacklisted app is installed, IT administrators and the user are immediately
notified; an instant alert is generated along with the details of the devices involved.
Find & Track Devices
With a comprehensive MDM solution, the location of each device can be tracked and a
complete location history created. While this feature facilitates staff routing and improves
customer service, it also allows businesses to keep track of device location and be in
compliance with government regulations.
Location history can be enabled for a group, department or role, and the time periods during
which records should be logged can be specified as well.
Easy Management
The mix of BYOD and cloud networks creates a high level of complexity for IT staff. However,
by means of a centralized dashboard an MDM solution makes it easy to manage thousands of
mobile devices. By grouping devices according to a department, role or job function, security
settings can be customized according to group policies.
68 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide