Russian

Secret MDM

Corporate mobility management and mobile device data protection
Two possible deployment options:
  • integration into existing infrastructure
  • cloud service
Where to
buy
Download
datasheet
Secret MDM

PRODUCT MENU

Mobile device security control

Centralized security policies of Secret MDM allow setting level of device protection and quickly reacting on device compromising.

Contact Us

Data loss from staff mobile devices

User data can leak to malefactors. Information on stolen or lost mobile devices is unprotected.

Fix it

Centralized management of mobile devices

IT department determines applications that can be used for confidential data transferring, carries out device management and ensures data protection.

Contact Us

Uncontrolled use of mobile devices within the enterprise

Staff share corporate data in unprotected environment while IT and IS departments have no control over “shadow IT” use.

Fix it

Secure calls and messaging

Secure calls and messaging guarantee protection of information from malefactors.

Contact Us

Staff call and message interception

Data interception leads to confidential information leaks as well as significant financial and reputational losses.

Fix it

Remote installation of applications

Secret MDM allows remote installation of mobile applications on staff devices.

Contact Us

Staff access to corporate applications is granted manually

IT department spends a lot of time granting staff access to corporate mobile applications. Each device is set up separately.

Fix it

Mobile device security control

Centralized security policies of Secret MDM allow setting level of device protection and quickly reacting on device compromising.

Contact Us

Data loss from staff mobile devices

User data can leak to malefactors. Information on stolen or lost mobile devices is unprotected.

Fix it

Centralized management of mobile devices

IT department determines applications that can be used for confidential data transferring, carries out device management and ensures data protection.

Contact Us

Uncontrolled use of mobile devices within the enterprise

Staff share corporate data in unprotected environment while IT and IS departments have no control over “shadow IT” use.

Fix it

Secure calls and messaging

Secure calls and messaging guarantee protection of information from malefactors.

Contact Us

Staff call and message interception

Data interception leads to confidential information leaks as well as significant financial and reputational losses.

Fix it

Remote installation of applications

Secret MDM allows remote installation of mobile applications on staff devices.

Contact Us

Staff access to corporate applications is granted manually

IT department spends a lot of time granting staff access to corporate mobile applications. Each device is set up separately.

Fix it


Main Advantages
Complex solution for management and protection of mobile devices
Managing decades of thousands of devices from the single console
Secret MDM operation does not require constant internet connection on the device
Flexible deployment options: either in the cloud or in the existing infrastructure
Flexible licensing policy: by user or by device

Secret MDM Key Features

  • Offline device registration
  • Support of COPE concept (Corporate Owned, Personally Enabled)
  • Always on Wi-Fi
  • Peripheral device control (camera, Bluetooth, Wi-Fi, audio recording devices)
  • Detection of jailbreak/rooting
  • Role-based access control
  • Device encryption
  • Corporate application store
  • Selective device memory wipe (complete, complete + SD-card, container)