Apple Consultants Network

Mobility Overview
Its time to get  with Apple. The iPhone®, iPad®, and iPad Mini® are ready to meet the needs of your business on the go, with industry standard compliance and  powered by the ingenuity of technology and design that Apple is known for. Let us empower your business with style and efficiency so you can have what you need when and where you need it.  for case profiles to learn the possiblities applicable to your business.

Deploy

  • Deployment choices: on-premise, cloud, or hybrid
  • Protect data with a secure architecture (no LDAP or solution data in the DMZ, only three ports open inbound)
  • Benefit from a scalable mobile device management server architecture that features industry-standard HA with active-active clustering at all tiers

Configure

  • Establish role-based access to administrative console
  • Define and enforce allowed device types, OS, and patch levels; support all major device types
  • Differentiate between employee-owned versus company-issued devices (and establish policies for each); enable auto-tagging from asset or configuration management databases
  • Configure packages of policies and applications in an intuitive, mix-and-match way for ease of deployment, ongoing administration, and change management
  • Configure device enterprise access, including Wi-Fi, VPN, and APN, and corporate email
  • Integrate directly and in real-time with LDAP
  • Integrate with certificate services and PKI
  • Configure device security such as encryption of data-at-rest and passcodes
  • Restrict mobile device resources and applications
  • Blacklist and whitelist applications
  • Lock and prevent removal of mobile device management profile
  • Benefit from common deployment templates and default policies

Provision

  • Ensure policy compliance prior to device enrollment
  • Enable user self-service mobile device enrollment and provision profiles rapidly
  • Distribute mobile applications via an enterprise application store
  • Push to and remove mobile applications from devices
  • Distribute policies and applications by user, role, group, and device type

Secure

  • Enforce passcode policy, including length, complexity, and change parameters; ascertain passcode history
  • Enable two-factor authentication
  • Remotely locate, track, and lock device; auto-lock device after inactivity period
  • Remotely wipe or selectively wipe device; auto-wipe device after failed login attempts
  • Block or allow unauthorized or non-compliant devices from corporate network (including unmanaged, jailbroken, and ones not adhering to the blacklist/whitelist)
  • Block data synchronization to Apple iCloud
  • Gain mobile security visibility with Mobile Security Intelligence; integrate with Security Information and Event Management (SIEM) solutions
  • Securely distribute and synchronize content via secure doc containers, and protect sensitive data with Mobile DLP policies
  • Set dynamic, context-aware policies to wipe secure doc containers in the event of device jailbreak or failed logins

Monitor

  • Remotely locate and track devices
  • Remotely lock, wipe, and selectively wipe devices
  • Support and troubleshoot your iPad MDM deployment
  • Maintain inventory of hardware details, mobile applications, device details and statistics
  • Report on service details such as roaming, location, telecom expense and service, and user inactivity; disable voice and data roaming
  • Report on user-owned vs. corporate-issued devices
  • Report on unmanaged, or rogue, devices, and whether they are allowed or blocked per policy
  • Report on mobile incidents and compliance with Mobile Security Intelligence; integrate with Security Information and Event Management (SIEM) solutions
  • Support mobile business objectives with advanced mobile application performance, intelligence, and security
  • Monitor BRANAE mobiprise deployment via iPad Admin app
  • Provide global 24x7x365 customer service and support with local resources and in local language
  • Provide flexible product training options

Decomission

  • Identify inactive devices
  • Fully wipe devices, returning them to factory settings
  • Disable full wipe capability to prevent full wipe from occurring in any instance
  • Selectively wipe devices, removing business apps and data while leaving personal data intact