Mobile Device Management

gurumobility offers the only solution that provides unified management of mobile devices, Macs, PCs, and the entire network from a centralized dashboard. Enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on thousands of managed devices.
  1. Are you concerned with security in your infrastructure as it pertains to mobile devices that access corporate data?
  2. Do you allow personal mobile devices on your network?
  3. Would you like visibility of your mobile assets?
  4. Would you be interested in centralized application control and remote wipe of your mobile devices?
  5. Do you want the ability to QUICKLY send out alerts to all employees (server down, snow days, announcements)?
gurumobility

Mobile Device Management, gurumobility, mobility solution

Basic Mobile Management

Device

Streamlines the provisioning corporate-owned and employee-owned BYO devices over-the-air with features for enrollment, configuration, security policy management, and device actions such as locate, lock and wipe.
• Manage smartphones and tablets featuring iOS, Android, Windows Phone and BlackBerry
• Gain complete visibility of devices, security and network
• Enforce compliance with real-time and automated actions

Apps

• Deploy custom enterprise app catalogs for users to easily view available apps, install apps, and be alerted of app updates
• Blacklist, whitelist and require apps
• Administer app volume purchase programs

Expenses

• Monitor mobile data usage with alert thresholds and real-time alerts
• Set group and individual policies to restrict or limit data and voice roaming
• Review integrated reporting and analytics

Additional Services

Secure Mail

• Contain email text and attachments to prevent data leakage
• Enforce authentication, cut and paste restrictions, and view-only mode
• FIPS 140-2 compliant, AES-256 bit encryption for data at rest
• Restrict forwarding, moving and screen captures
• Conduct on-line and off-line compliance checks prior accessing email

Secure Browser

• Enable access to corporate intranet sites and network without device VPN
• Define URL web filters and security policies based on categories
• Block known malicious websites to prevent mobile malware
• Enforce whitelist exceptions
• Restrict cookies, downloads, copy/paste, and print features to prevent data leaks
• Disable native and 3rd party web browsers

Mobile File Access

• Secure access to internal files and folders from private SharePoint, Windows File Share, IBM Connections, CMIS repositories (Content Management Interoperability Services) and other network folders

Mobile Threat Management

Analyzes and remediates mobile risks, including malware, suspicious system configurations and compromised devices.

  • Company Sponsored App Catalog

    Enterprise Application

  • Geo Positioning

    Geo Location

  • Mobile Data Use and Management

    Mobile Data Usage

  • Easy to Use “Container”: Secure Email, Document Editing, and Browsing

    Secure portal