關閉選單
2023/07/04
EMM solution typically includes the following set of features
  • Application Management controls which apps can be downloaded to the device, access corporate networks, and interact with accessed information.
  • Content Management controls how organizational policies apply to the data stored in the device. Produces audit trails for activity around sensitive business information.
  • Network Management controls network access, data transfer limitations, geofencing, and other Virtual Private Network (VPN) connections for enrolled devices connecting with the corporate network remotely. Devices can be remotely configured to the correct network settings.
  • Service Management administers self-service and push-updates of apps, configurations, settings, and IT service requests as controlled by IT admins. The technology integrated with the organization’s ITSM tools can consistently apply the service management policies to mobile devices. It also helps control how devices consume the services, in the form of data usage and roaming cellular connectivity.
  • Unified Endpoint Management manages and secures all endpoints from a unified platform. The centralized EMM platform can be used to manage devices including phones, tablets, laptops, mobile workstations, and IoT, enabling a unified experience for end-users with capabilities such as single sign-on management and Identity & Access Management (IAM).
  • Analytics and Intelligence captures granular information on device, app, content and network activities, transforming that information into intuitive reports and intelligence on the productivity and performance of a mobile workforce.
  • Device and App Lifecycle Management offers endpoint lifecycle management features, ranging from device onboarding and service provisioning to decommissioning and remote security measures such as data wipe.
  • Data Security and Access Management applies additional layers of security to secure information, including encryption, password protection, and patching. This features helps control how devices and apps access corporate networks and sensitive data stored on the devices.