What is Mobile Device Management

What is mobile device management?

Mobile Device Management(MDM) is a type of mobile security software that is implemented by IT departments to control and protect the mobile devices of employees. It is employed across multiple operating systems and various service providers.

Mobile device management software uses add on security features and services like Mobile Application Management to generate a complete Enterprise Mobile Management Solution.

Most mobile device management solutions deliver end-to-end protection for organizations. The solutions clearly denote that the mobile apps, data and network used by mobile devices are controlled by the IT department of the organization.

In certain cases, MDM solutions merge expense management with mobile security as a single product. The features of mobile device management vary from vendor to vendor. A typical Mobile Device Management Tool has the following features

  • Mobile Policy Management
  • Security Management
  • Inventory Management
  • Telecom Service Management
  • Management of Mobile Applications
  • Support of Mobile Applications

Features of Mobile Device Management

Manage All Devices from One, Centralized Console

Ensure Device and Data Security

Enforce encryption, security policies, complementary applications, and predefined actions to ensure devices and data security

Application Management

Watch all devices in real-time for proactive management of all device applications

Device Enrollment

Easily enroll devices through streamlined Over-the-Air (OTA) device enrollment process. IT administrators and employees can enroll devices

Configuration

Define customizable user profiles to configure devices, control user access, and set security policies specific to your enterprise needs. Control access to corporate email by whitelisting devices and monitoring users that are allowed to access the company mail server.

Auditing Capabilities

Obtain real-time deployment information of your mobile device management operations and compliance through Comodo dashboards

Monitoring Capabilities

Monitor complete lifecycle of the devices from enrollment to retirement

Access Control and Secure Connectivity

Comodo Mobile Device Management (MDM) allows you to define customizable user profiles that allow you to control user access, set security policies and configure devices to suit the requirements of your enterprise.

  • Create enterprise policies - whitelist devices that need to be allowed to access the enterprise mail server
  • Control and monitor users allowed to access corporate email
  • Deploy corporate configurations to all enterprise connected devices
  • Apply policies to restrict usage and access to features
  • For AndroidTM Configuration, Comodo MDM allows you to define: Antivirus settings, mail, passcode, restrictions, Wi-Fi, and VPN
  • For iOS Configurations Comodo MDM allows you to define: passcode, restrictions, Wi-Fi AirPlay, AirPrint, VPN, Per-App VPN, Mail, Exchange Active Sync, LDAP, and several more

Maintaining proper access control and secure connectivity prevents malware infection, Man-in-the-Middle (MitM) exploits and other unauthorized access of corporate resources.

MDM License Options
MDM Feature Comparison Basic Premium
Complete MDM (Mobile Device Management)
Complete MAM (Mobile Application Management)
Complete MSM (Mobile Security Management)
BYOD (Bring Your Own Device) Support
Endpoint Security Management for Windows Devices including World Best Containment Technology

1 MONTH TRIAL
Community support
Professional support for 7 days 24 hours over email and phone
Free SSL certificate for management server from Comodo CA
(if you choose to install on your own server instead of Cloud)
Free Trial Get Now

(*One premium license covers up to 5 mobile device per user or one computer)

"Get the Exclusive COMODO ITSM client application from Google Playstore"

Mobile Device Management and BYOD Policy

Comodo MDM supports Bring Your Own Device (BYOD), which is a policy to allow employees to use their own devices for enterprise work. Allowing BYOD has multiple benefits – it boosts employee satisfaction and morale, and helps the enterprise save on investment in devices.

However, allowing BYOD has some risks - it increases the burden of IT administrators in ensuring overall enterprise IT security. Devices carry different hardware, operating systems (OS), different OS versions, and software applications. All these factors have to be managed, and specific access and privileges must be given to specific group of users. The Comodo Device Enrollment feature allows you to classify employee (BYOD) and corporate-owned devices. Further, you can define customizable user profiles to control user access and configure BYOD devices.