Mobility Management

Comodo Device Management Offers Multiple Solutions

Comodo Device Management enables system administrators to manage and secure mobile devices and endpoints that connect to the wired and wireless networks of the enterprise.

If you own a business, you know that you need security for all corporate data, but you may not realize all the difficulties associated with security. IT professional everywhere enjoy that byod programs are available but understand the complications that arise. If your IT department wants you to look into device management, you may wonder what's available. At Comodo, we offer many solutions to help, including:

  • Security Management
  • Device/Endpoint Enrollment
  • Profile Management
  • Application Management
  • Asset Management
  • Audits/Reports

Security

Managing security isn't as easy as you may think. You need one product that can work for Windows and other mobile devices, as well as desktops from one console. You'll also want antivirus features and the ability to enforce mobile policies. Our product can do all of that and more.

Device/Endpoint Enrollment

You'll want over-the-air enrollment options for mobile devices, and you'll want it to be fast. At Comodo, we can help and will also provide secure enrollment options with immediate security and control.

Profiles

With our profile management system, you can easily configure policies, restrict access to devices that don't adhere to the policies, create groups to efficiently target audiences and have corporate access that meets your needs. Instead of risking a blacklist website, you can ensure that only whitelisted sites are allowed to be opened and have secure browsers, as well.

Assets

Assets management can include monitoring the devices and users who access your mail server and others and inventory all devices so you can watch them in real time to ensure your resources and inventory stay safe. You'll also be able to capture details of the various devices, including software and hardware configurations, running processes and installed apps.

Reports

Our advanced reporting options allow you to generate reports based on need and audit users, administrative activities and more.

Contact us for more information.

Multiple Solutions mentioned below

  • Comodo Device Management
  • BYOD
  • Enterprise Mobility Management
  • Container Management
  • Laptop Management
  • Mobile Email Management
  • Mobile Threat Management
  • Identity Management
  • Mobile Application Security
  • Mobile Application Management
  • Mobile Content Management
  • Application Containerization
  • Mobile Browsing Management
  • Mobile Enterprise Gateway

1. Comodo Device Management

Comodo Device Management enables system administrators to manage and secure mobile devices and endpoints that connect to the wired and wireless networks of the enterprise.

2. BYOD

Bring Your Own Device (BYOD)
BYOD (Bring your own device) is an IT strategy followed by enterprises that permits employees to use personal devices such as laptops and smart phones to access the enterprise network, systems and data.

3. Enterprise Mobility Management

Enterprise Mobility Management (EMM) is a corporate system to manage the mobile devices used in an enterprise network.

4. Container Management

Container management software allows administrators to run programs in containment. This helps test the behavior of new, unknown, untrusted and suspicious applications and executables. Applications that run inside the containment are isolated and prevented from making any change to the rest of the device. Applications added to the containment can be made to always run in the container.

5. Laptop Management

Laptop management software enables configuration, asset tracking, distribution of applications and providing remote assistance.

6. Mobile Email Management

Mobile Email Management program (MEM) ensures security of email communication in personal devices and corporate infrastructures. MEM offers flexible options for deployment of strategies.

7. Mobile Threat Management

Mobile Threat Management (MTM) software is a cloud-based solution to address security threats. MTM scans both in-coming and out-going traffic in mobile devices, and protects them against malware attacks and blocks inappropriate content.

8. Identity Management

Identity Management is a system for managing individual principals and the authorizations, authentications and privileges needed for them within the enterprise’s boundaries, including mobile devices.

9. Mobile Application Security

Comodo mobile application security tool uses four criteria to help reduce risks - analyze, submit, quantify, enforce and inform. Newly added applications are analyzed through numerous tests to ensure that they are safe before being allowed to execute. Customized rules can be enforced to prevent user addition of new applications without due security process.

10. Mobile Application Management

Mobile Application Management (MAM) tool allows IT departments to secure, develop, deploy and manage all applications, and mobile devices (including BYOD), while continuing to protect privacy and allowing adoption of new applications.

11. Mobile Content Management

Comodo Mobile Content Management Solution helps secure and manage corporate documents, user access to documents, user access to cloud content, emails (encryption), email content and attachments, and user web browsing. Only authorized applications are allowed to access related documents.

12. Application Containerization

Mobile application containerization offers similar benefits as virtualization. It is an encrypted area in mobile devices. The containerization feature keeps apart and also secures sensitive corporate information/documents and applications from other data such as personal information and applications used by the employees. If BYOD is allowed and if a user downloads some file or application that compromises the mobile device, then the malicious code would be able to affect only outside the application containerization area. The corporate applications in the containerized area will not get affected.

13. Mobile Browsing Management

Mobile Browsing Management allows administrators to define policies for browser history, acceptance of cookies and copy/paste features. It enables whitelisting of IP addresses, restricting corporate devices to access only a pre-defined list of websites or intranet-only sites. Customized settings can be set up as required and real-time adjustments in policies can be made by the administrators.

14. Mobile Enterprise Gateway

Mobile Enterprise Gateway allows safe and secure access to corporate resources such as intranet sites, SharePoint websites and Windows File Share on mobile devices. Administrators can enforce authorization and authentication policies, and configure controls. Users will be able to retrieve or browse information from intranets and view and share corporate content.

What's new in CMDM 3.0
OTA Enrollment

Over-the-Air enrollment of mobile devices

Fast Enrollment

Quickly import mobile devices and endpoints individually or via LDAP and Active Directory

Secure Enrollment

Authenticate users with a one-time password and/or with a user's Active Directory/LDAP credentials

Immediate Control

Enforcement of default profile means devices and endpoints can be securely managed right after enrollment

Immediate Security

Ensure the safety of data on endpoints and devices by running an automatic scan straight after enrollment.