Mobile Device Management for iOS, Android, and Windows devices

With the growing number of mobile devices in the corporate world, you need a way to scrutinize any mobile device that accesses your enterprise's resources. Endpoint Central, our flagship unified endpoint management software, can help you configure and secure your mobile devices from one central location; it's built for simplified desktop and mobile device management.

Endpoint Central's MDM capabilities include the following:

We also offer Mobile Device Manager Plus, a standalone enterprise mobile device management solution that is available on-premises as well as on the cloud. If you're looking for a solution to manage only mobile devices (whether they're corporate-owned or personal devices), try Mobile Device Manager Plus for free.

Endpoint Central's mobile device management features


1. Mobile application management

Device management doesn't end with configuring policies, retrieving asset information, and securing your devices. Application management is just as important as setting up employees' mobile devices.

You can:

  • Create your own enterprise app catalog.
  • Manage and distribute both in-house and third-party applications.
  • Integrate with the Apple Volume Purchase Program (VPP) and Google's Play for Work, allowing simple distribution of commercial apps.
  • Blocklist and allowlist mobile applications.
  • Audit your app inventory.

Learn more about managing mobile apps.

2. Mobile security management

No two enterprises are the same—enforce stringent policies at various levels to suit your specific security needs.

With the mobile security management feature, you can:

  • Enforce device passcodes to prevent unauthorized access.
  • Remotely lock devices to prevent the misuse of lost or stolen devices.
  • Track devices in real time with geo-location tracking.
  • Wipe a device's data completely to make it as good as new.
  • Perform a corporate wipe to remove corporate data only, leaving personal data intact. This feature is most useful in bring your own device (BYOD) environments, where employees access corporate data on their personal devices.

Learn more about securing mobile devices.

3. Profile management

Protect corporate resources by configuring and enforcing policies on mobile devices. You can create and configure policies and profiles for different departments or roles.

With the profile and policy management feature, you can:

  • Configure policy and profile settings for accessing enterprise resources.
  • Restrict the use of applications such as the camera, YouTube, browsers, and more.
  • Regulate access to corporate accounts including email, Wi-Fi, and VPN accounts.
  • Create a logical group of devices based on department or location. You can also create groups to distinguish corporate devices from employees' personal devices. Apply policies or restrictions and distribute apps to all devices in a group.

Learn more about configuring policies on mobile devices.

4. Mobile content management

When employees use mobile devices for work, they need access to corporate resources on their devices. The application allows admins to remotely share documents to employees' devices, all without compromising security. 

You can:

  • Create a content repository to store documents.
  • Distribute documents in various formats, including DOC, PDF, PPTX, and more.
  • Restrict document sharing between unmanaged devices.

Learn more about leveraging mobile content management.

5. Email management

You will be able to securely manage corporate emails through platform containerization and Exchange ActiveSync. With mobile email management, you can configure, secure, and manage corporate email accounts for both enterprise-owned and personal devices.

You can:

  • Set up email security policies over the air.
  • Containerize data to prevent unauthorized apps from accessing email data.
  • Restrict users from modifying or removing their corporate email account.
  • Selectively wipe corporate email accounts.

To learn more about managing email on mobile devices.

6. Containerization

In a BYOD environment, employees can perform work-related tasks with their personal mobile devices. However, BYOD management only works if you can effectively manage these devices and protect your data from being compromised.

The application gives you the ability to set policies and restrictions to keep enterprise data safe. You will be able to containerize in the following ways:

  • Enroll devices based on ownership.
  • Create separate groups and define policies for BYOD and corporate devices.
  • Wipe corporate data while leaving user data untouched, and secure corporate data when employees leave your organization.

Read our white paper to learn how you can leverage BYOD.

Learn more about BYOD management.

7. Kiosk mode

Lock down mobile devices to run a single app or a select set of apps. The application supports lockdown functions for both iOS and Android devices.

You can:

  • Permit access to only a limited selection of apps.
  • Create a customized homepage with only the permitted apps.
  • Restrict access to the task manager and status bar.

Learn more about implementing kiosk mode on mobile devices.

8. Audits and reports

Tracking and analyzing asset information helps you protect sensitive corporate data. The application provides out-of-the-box reports that allow you to audit devices.

With the reporting capabilities, you can:

  • Scan devices to ensure they are compliant with company policy.
  • Obtain granular details about the apps running on managed devices.
  • Generate predefined or customized reports immediately or at a scheduled time.

Learn more about auditing mobile devices.

9. Asset management

Unlike traditional workstations that reside within the physical workspace of an enterprise, mobile devices are used from multiple locations, complicating the process of managing and controlling them.

You can:  

  • Track and analyze asset information to protect sensitive corporate data.
  • Retrieve complete information about devices, including device details, certificates, installed apps, and more.
  • Gain complete visibility on devices with out-of-the-box reports.
  • Remotely troubleshoot mobile devices in real time.

Learn more about managing mobile devices.

10. Device enrollment

The application serves as a unified endpoint management solution that works across many device environments, providing necessary security protocols so that unauthorized users can’t gain access to your corporate network. You can enroll devices manually or automatically, enroll devices in bulk, or have users self-enroll their mobile devices.

You are offered: 

  • Automatic, manual, or over-the-air (OTA) device enrollment.
  • Bulk enrollment of mobile devices using a CSV file.
  • Authentication of enrollment with a one-time passcode or users' Active Directory credentials.

Learn more about enrolling mobile devices.

What is Mobile Device Management (MDM)?

Mobile Device Management is a set of practices that involve enrolling, managing, monitoring, updating, securing and troubleshooting mobile devices such as smartphones, tablets, laptops, etc, in both LAN and WAN, from a central location.

The Need for Mobile Device Management

Enterprises today own and manage a diverse set of mobile devices, and this has two direct implications:

  • Requirement for a solution that allows system administrators to maintain and keep track of these devices centrally.
  • Mobile devices are progressively being used to access corporate network/resources which increases the attack surface and poses a serious security risk.

Hence, to manage devices centrally and to ensure security, system administrators need a Mobile Device Management Solution that caters to all their needs.