What is Mobile Device Management

What is mobile device management?

Mobile Device Management(MDM) is a type of mobile security software that is implemented by IT departments to control and protect the mobile devices of employees. It is employed across multiple operating systems and various service providers.

Mobile device management software uses add on security features and services like Mobile Application Management to generate a complete Enterprise Mobile Management Solution.

Most mobile device management solutions deliver end-to-end protection for organizations. The solutions clearly denote that the mobile apps, data and network used by mobile devices are controlled by the IT department of the organization.

In certain cases, MDM solutions merge expense management with mobile security as a single product. The features of mobile device management vary from vendor to vendor. A typical Mobile Device Management Tool has the following features

  • Mobile Policy Management
  • Security Management
  • Inventory Management
  • Telecom Service Management
  • Management of Mobile Applications
  • Support of Mobile Applications

Features of Mobile Device Management

Manage All Devices from One, Centralized Console

data security

Ensure Device and Data Security

Enforce encryption, security policies, complementary applications, and predefined actions to ensure devices and data security

application management

Application Management

Watch all devices in real-time for proactive management of all device applications

device enrollment

Device Enrollment

Easily enroll devices through streamlined Over-the-Air (OTA) device enrollment process. IT administrators and employees can enroll devices

device configuration


Define customizable user profiles to configure devices, control user access, and set security policies specific to your enterprise needs. Control access to corporate email by whitelisting devices and monitoring users that are allowed to access the company mail server.

auditing capabilities

Auditing Capabilities

Obtain real-time deployment information of your mobile device management operations and compliance through Comodo dashboards

monitoring capabilities

Monitoring Capabilities

Monitor complete lifecycle of the devices from enrollment to retirement

secure access connectivity

Access Control and Secure Connectivity

Comodo Mobile Device Management (MDM) allows you to define customizable user profiles that allow you to control user access, set security policies and configure devices to suit the requirements of your enterprise.

  • Create enterprise policies - whitelist devices that need to be allowed to access the enterprise mail server
  • Control and monitor users allowed to access corporate email
  • Deploy corporate configurations to all enterprise connected devices
  • Apply policies to restrict usage and access to features
  • For AndroidTM Configuration, Comodo MDM allows you to define: Antivirus settings, mail, passcode, restrictions, Wi-Fi, and VPN
  • For iOS Configurations Comodo MDM allows you to define: passcode, restrictions, Wi-Fi AirPlay, AirPrint, VPN, Per-App VPN, Mail, Exchange Active Sync, LDAP, and several more

Maintaining proper access control and secure connectivity prevents malware infection, Man-in-the-Middle (MitM) exploits and other unauthorized access of corporate resources.

MDM License Options
MDM Feature Comparison Basic Premium
Complete MDM (Mobile Device Management)
Complete MAM (Mobile Application Management)
Complete MSM (Mobile Security Management)
BYOD (Bring Your Own Device) Support
Endpoint Security Management for Windows Devices including World Best Containment Technology

Community support
Professional support for 7 days 24 hours over email and phone
Free SSL certificate for management server from Comodo CA
(if you choose to install on your own server instead of Cloud)
Free Trial Get Now

"Get the Exclusive COMODO ITSM client application from Google Playstore"

Mobile Device Management and BYOD Policy

Comodo MDM supports Bring Your Own Device (BYOD), which is a policy to allow employees to use their own devices for enterprise work. Allowing BYOD has multiple benefits – it boosts employee satisfaction and morale, and helps the enterprise save on investment in devices.

However, allowing BYOD has some risks - it increases the burden of IT administrators in ensuring overall enterprise IT security. Devices carry different hardware, operating systems (OS), different OS versions, and software applications. All these factors have to be managed, and specific access and privileges must be given to specific group of users. The Comodo Device Enrollment feature allows you to classify employee (BYOD) and corporate-owned devices. Further, you can define customizable user profiles to control user access and configure BYOD devices.

What's new in CMDM 3.0
OTA Enrollment

Over-the-Air enrollment of mobile devices

Fast Enrollment

Quickly import mobile devices and endpoints individually or via LDAP and Active Directory

Secure Enrollment

Authenticate users with a one-time password and/or with a user's Active Directory/LDAP credentials

Immediate Control

Enforcement of default profile means devices and endpoints can be securely managed right after enrollment

Immediate Security

Ensure the safety of data on endpoints and devices by running an automatic scan straight after enrollment.