Mobile Device Management (MDM)

Mobile device management for iOS, Android, and Windows devices.

With the growing number of mobile devices in the corporate world, you need a way to scrutinize any mobile device that accesses your enterprise's resources. Desktop Central, our flagship unified endpoint management software, can help you configure and secure your mobile devices from one central location; it's built for simplified desktop and mobile device management.  

We also offer Mobile Device Manager Plus, a standalone enterprise mobile device management solution that is available on-premises as well as on the cloud. If you're looking for a solution to manage only mobile devices (whether they're corporate-owned or personal devices), try Mobile Device Manager Plus for free.


Desktop Central's mobile device management features

 

1. Mobile application management.

Device management doesn't end with configuring policies, retrieving asset information, and securing your devices. Application management is just as important as setting up employees' mobile devices.

With Desktop Central, you can:

  • Create your own enterprise app catalog.
  • Manage and distribute both in-house and third-party applications.
  • Integrate with the Apple Volume Purchase Program (VPP) and Google's Play for Work, allowing simple distribution of commercial apps.
  • Blacklist and whitelist mobile applications.
  • Audit your app inventory.

Learn more about managing mobile apps.

2. Mobile security management

No two enterprises are the same—enforce stringent policies at various levels to suit your specific security needs.

With Desktop Central's mobile security management feature, you can:

  • Enforce device passcodes to prevent unauthorized access.
  • Remotely lock devices to prevent the misuse of lost or stolen devices.
  • Track devices in real time with geo-location tracking.
  • Wipe a device's data completely to make it as good as new.
  • Perform a corporate wipe to remove corporate data only, leaving personal data intact. This feature is most useful in bring your own device (BYOD) environments, where employees access corporate data on their personal devices.

Learn more about securing mobile devices.

3. Profile management.

Protect corporate resources by configuring and enforcing policies on mobile devices.

With Desktop Central, you can create and configure policies and profiles for different departments or roles.

With Desktop Central's profile and policy management feature, you can:

  • Configure policy and profile settings for accessing enterprise resources.
  • Restrict the use of applications such as the camera, YouTube, browsers, and more.
  • Regulate access to corporate accounts including email, Wi-Fi, and VPN accounts.
  • Create a logical group of devices based on department or location. You can also create groups to distinguish corporate devices from employees' personal devices. Apply policies or restrictions and distribute apps to all devices in a group.

Learn more about configuring policies on mobile devices.

4. Mobile content management.

When employees use mobile devices for work, they need access to corporate resources on their devices.

Desktop Central allows admins to remotely share documents to employees' devices, all without compromising security. 

With Desktop Central, you can:

  • Create a content repository to store documents.
  • Distribute documents in various formats, including DOC, PDF, PPTX, and more.
  • Restrict document sharing between unmanaged devices.

Learn more about leveraging mobile content management.

5. Email management.

Desktop Central lets you securely manage corporate emails through platform containerization and Exchange ActiveSync. With mobile email management, you can configure, secure, and manage corporate email accounts for both enterprise-owned and personal devices.

With Desktop Central, you can:

  • Set up email security policies over the air.
  • Containerize data to prevent unauthorized apps from accessing email data.
  • Restrict users from modifying or removing their corporate email account.
  • Selectively wipe corporate email accounts.

To learn more about managing email on mobile devices.

6. Containerization.

In a BYOD environment, employees can perform work-related tasks with their personal mobile devices. However, BYOD management only works if you can effectively manage these devices and protect your data from being compromised.

Desktop Central gives you the ability to set policies and restrictions to keep enterprise data safe.  Desktop Central allows you to containerize in the following ways:

  • Enroll devices based on ownership.
  • Create separate groups and define policies for BYOD and corporate devices.
  • Wipe corporate data while leaving user data untouched, and secure corporate data when employees leave your organization.

Read our white paper to learn how you can leverage BYOD.

Learn more about BYOD management.

7. Kiosk mode.

Lock down mobile devices to run a single app or a select set of apps. Desktop Central supports lockdown functions for both iOS and Android devices.

With Desktop Central, you can:

  • Permit access to only a limited selection of apps.
  • Create a customized homepage with only the permitted apps.
  • Restrict access to the task manager and status bar.

Learn more about implementing kiosk mode on mobile devices.

8. Audits and reports.

Tracking and analyzing asset information helps you protect sensitive corporate data. Desktop Central provides out-of-the-box reports that allow you to audit devices.

With Desktop Central's reporting capabilities, you can:

  • Scan devices to ensure they are compliant with company policy.
  • Obtain granular details about the apps running on managed devices.
  • Generate predefined or customized reports immediately or at a scheduled time.

Learn more about auditing mobile devices.

9. Asset management.

Unlike traditional workstations that reside within the physical workspace of an enterprise, mobile devices are used from multiple locations, complicating the process of managing and controlling them.

With Desktop Central, you can:  

  • Track and analyze asset information to protect sensitive corporate data.
  • Retrieve complete information about devices, including device details, certificates, installed apps, and more.
  • Gain complete visibility on devices with out-of-the-box reports.
  • Remotely troubleshoot mobile devices in real time.

Learn more about managing mobile devices.

10. Device enrollment.

Desktop Central serves as a unified endpoint management solution that works across many device environments, providing necessary security protocols so that unauthorized users can’t gain access to your corporate network. 

You can enroll devices manually or automatically, enroll devices in bulk, or have users self-enroll their mobile devices.

Desktop Central offers: 

  • Automatic, manual, or over-the-air (OTA) device enrollment.
  • Bulk enrollment of mobile devices using a CSV file.
  • Authentication of enrollment with a one-time passcode or users' Active Directory credentials.

Learn more about enrolling mobile devices.