Smartphones, tablet PCs and other devices are popular, and the use authority of network environment should get more attention.
• The system openness of mobile devices and the convenience of application development without meticulous regulations will alert cyber security risks and upgrade data leakage risks.
• How to develop BYOD/COPE management regulations
• MDM, by combining the network access control technology, sets application regulation policies by group after compliance inspection and identity authentication when mobile devices are connecting to an organization network to strictly protect organizational information security.
• Managers can set management policies by region, with regulatory items of WiFi connection setting, setting password strength, restriction of photograph and screenshots, etc.; and can realize remote (ROM) control of devices in the management interface for screen locking, agent program uninstalling, factory data resetting, unlocking password setting and clearing, ringing and silent mode, information push.
• It supports iOS/Android operating systems.