Cookie Policy
We use cookies to improve your experience on our website. If you continue without changing your cookie settings on your browser, we'll assume that you are happy to receive all cookies on the Zycko website. To learn more about how we use cookies, please see our cookie policy.
 
 
  • Overview
  • Android Security
  • iOS Security
  • Mobile Application Management

Mobile Device Management (MDM) / Enterprise Mobility Management (EMM)

Mobile Devices based on iOS and Android, are intensively used in today’s corporate environments. While being used in order to improve work efficiency, they also have contributed to an increase in security threats.

You use an iPad at home for fun but in the office it serves you as a way to be productive and communicate with customers and colleagues. The more Mobile Devices are in use, the more a security effort to keep company data protected is required. Endpoint Protector Solutions for Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) enable a safe working environment.

What we prevent?

- Face the security challenges posed by
mobile devices to your corporate data
- Device Loss
- Device Theft
- Mobile Data Loss
How we prevent?

- Offer strict security and compliance requirements
- Enforce strong data protection mechanisms 
- Monitor, Lock and Wipe mobile devices
- Locate and map mobile devices
- Report and manage remotely mobile device use
   

How It Works?

Define and enforce strong Mobile Device Security Policy for iOS and Android tablets and smartphones   Track and locate all mobile devices when needed   Detect mobile device incidents and enforce remote date wipe or device locking in case of device loss or theft   Device activity history is logged and reported
             

Android Security for smartphones and tablets

ne way or the other IT administrators have to face the new data security threat vectors. Sensitive company data is no longer stored in protected networks, but residing on employees smartphones and tablets. Android mobile devices have spread and have been adopted in many corporate environments. While increasing work efficiency, mobile devices have become an easy target for those wanting a piece of the company data cake, enhancing the risks of data leakage, data loss and data theft.

MDM by Endpoint Protector - Mobile Security Made Easy

Mobile Device Management (MDM) by Endpoint Protector comprises strong mobile security, mobile device and app management features in one simple and intuitive user interface for an easy control over company mobile devices. Through an efficient, almost seamless over-the-air enrollment and provisioning processes, companies can gain full control over their mobile devices fleet in a matter of minutes.

 

What we offer:

App based Enrollment / Provisioning Strong Security
  • Easy enrollment over E-mail / SMS
  • 3 clicks based installation of an Android app with minimum user involvement
  • Remote Wipe of device and SD-Card Data
  • Remote Lock / Password Reset
  • Wirelessly configure strong security policies
  • Enforce Password Change
Device Encryption Location Sound Alarm
  • 256-bits AES device data encryption (supported by Android Version 4+)
  • Locate lost device by playing sound
Device Tracking and Locating Apps Management
  • Tracking and reporting current and previous mobile device locations
  • Manage app inventory, enforce removal of all apps non-compliant with company policies
Streamline Asset Management Detailed Mobile Device Auditing
  • Detailed inventory of all mobile device fleet
  • Logging and reporting of all mobile device and user activity
E-Mail Accounts and Contacts Inventory Support
  • Complete inventory of all configured E-mail accounts on mobile device
  • Backup of all contacts
  • Provide remote assistance to mobile users

iOS Security for iPhone and iPad

Why Mobile Security?

With the wide adoption of the BYOD model within corporate environments, IT administrators lost control over companies computing environments and their data. Personally owned iPhones and iPads are more and more used in business meetings, for storing sales reports or checking company e-mails in coffee shops or at the airport. Data security has therefore passed the fixed endpoint boundaries towards mobile ones.

According to a recent survey conducted by Gartner*, both small businesses and enterprises are standardizing more and more on the use of iOS devices for mobility: almost 60% of companies admitted that they plan to standardize on Apple's iOS in the next 12 months, while only 20% of enterprises said that they plan to use BlackBerry devices and 9% Android.
*source ComputerWorld.com

 

MDM by Endpoint Protector - Mobile Security Made Easy

Mobile Device Management (MDM) by Endpoint Protector comprises strong mobile security, mobile device and app management features in one simple and intuitive user interface for an easy control over enterprise & personally owned iOS mobile devices. Through an efficient, almost seamless over-the-air enrollment and provisioning processes, companies can gain full control over their mobile devices fleet in a matter of minutes.

 

What we offer?

Easy Over-the-air Enrollment / Provisioning Enhanced Security
  • 3 clicks based Enrollment / Provisioning
  • Enrollment of multiple mobile devices via E-Mail / SMS / URL
  • No client app required to enroll / provision iOS devices
  • Remote Device Lock and Nuke (Wipe)
  • Configure strong security policies
  • Enforce password change
Data and Device Tracking Apps Management
  • Manage data and voice roaming usage
  • Detailed Mobile Device Tracking (additional app required)
  • Manage app inventory, enforce removal of all apps non-compliant with company policies
Streamline Asset Management Detailed Mobile Device Auditing
  • Detailed inventory of all mobile device fleet
  • Clear separation between company and personally owned devices
  • Logging and reporting of all mobile device and user activity
  • Mobile Device Profile Inventory
Support    
  • Provide remote assistance to mobile users
 

Mobile Application Management (MAM)

Enterprise mobility is determined by the rapid evolution of mobile technologies which increase productivity and act like an alternative means of communicating and doing business. The positive effects of the orientation towards mobile are clearly visible in peoples’ daily work and companies’ processes: increased productivity, new business models, etc. Yet, there are downsides which are impossible to ignore: employees’ bringing their own devices (BYOD) to work, bring their personal life with them, as well, having on these gadgets a mix of company data, business related apps, personal data and consumer apps. Thus, company’s sensitive data and corporate intellectual property are exposed to a series of threats, malware infections and data breaches being most likely to happen due to non-compliant apps that have access to phone numbers and names from the address book, location, and other confidential information.

Endpoint Protector 4 Mobile Application Management (MAM) for iOS smartphones and tablets addresses the risks associated with downloading and using mobile apps within companies’ network, without interfering with employees’ productivity.

What we prevent?

- Backup of the app data to computer
- Data loss when devices become unmanaged
- Use of non-compliant apps
- Use of undesired apps on company devices

How do we manage mobile apps?

- Creating a Catalog of Managed Apps within
the management console
- Pushing apps to enrolled iOS devices
- Remote deleting of non-compliant apps
- Keeping record of all the installed apps

 

How it works?

Select the Apps that you want to push to managed devices from the App Store   Set a policy for the Apps to protect App data (prevent App data backup, remove App and data when device becomes unmanaged)   Push the Apps to the devices   Remove/update/manage the Apps on the devices
 

 

Back to Top
For more information:
Contact our specialist teams
 
 
For a database of user manual, datasheet, or software update, please access the Resource Centre