Trends Bird Limited Brings MDM Solutions In Bangladesh


It’s obvious that a lost corporate mobile device represents a significant threat. Providing the ability to locate, lock, and potentially wipe lost devices must be available for a package to call itself an effective MDM tool. Automating that process is even better. All of the vendors we tested provide the ability to return the phone to the state it was in prior to enrolling in mobile management. This includes removing sensitive settings such as WiFi passwords, configuration settings, and sensitive or protected documents. A granular selective wipe, which is what we call out in our features table above, goes beyond that ability to allow administrators to remove only specifically selected information and data elements, such as WiFi passwords or specific documents, like corporate data versus personal documents the user may have stored on the device.

Many of the products we looked at provide a geofencing capability that can generate alerts and take action should a device cross a specific boundary. This works great for a company with a local workforce where the devices should never be more than some fixed number of miles away from the home office. This feature can be tweaked for traveling employees and, in many cases, can be time restricted as well.

Policy-based security is also standard across all of the products in this review. Configuring devices to lock with a personal identification number (PIN) is just one of many policies that can be set as mandatory, meaning that even if a device is owned by the employee in a BYOD scenario, once it’s registered it’ll require a PIN to open whether the user had it set that way or not.

Other policies to restrict behavior or to lock down specific apps are also common. But the conflict between corporate-owned and personally-owned devices isn’t always so clear cut.Having the ability to restrict the gathering of location and other sensitive data from a personally-owned device helps keep employees happy while allowing them to use their own devices for company work. IT managers need to be careful and look for the ability to segment work and personal apps and data as much as possible.

Enrolling lots of devices might not seem like a big deal but can be a show stopper without some type of automated process. Providing a connection to a local Microsoft Active Directory domain to process users is one method. Most of the products also offered a way to import users and devices from a flat file to streamline enrollment in the case where either users or devices aren’t identified in a directory service. User self-registration is a key feature here, but be aware that this can be accomplished in different ways. Some of our contenders allow IT managers to create custom, branded user self-service portals that allow them to register their own devices, while others force them to go through third-party app stores to accomplish the same thing.

One of the biggest challenges in this roundup was drawing a line between MDM and any other functionality to include application management and delivery, security features like advanced threat management, and document protection.

Our MDM solutions enable you to manage small, medium and large-scale deployments of mobile devices.

How We Work

Our team will draft a comprehensive MDM strategy covering:

  • Data encryption.
  • A policy for user authentication and passwords.
  • The frequency of your security scans.
  • Optimum Anti-Virus tools.
  • Default applications on all employee devices.
  • A policy regulating the registration of an employee’s new device.
  • Lost or stolen device procedures.

Once a strategy has been agreed upon, an MDM solution which best meets its requirements will be identified. We will then work to deploy this across your workforce’s devices as soon as possible with minimum disruption to your day-to-day operations.

How You Benefited


Business-critical applications, files, and tools will be accessible across all your workforce’s devices. If required, we can both advise on, and help to supply, standardised devices to ease the transition to a MDM environment.

Remote Monitoring

Monitor, track, and record device usage across your organisation. In the event of loss or theft, devices can be tracked, located, and if needed, locked or disabled.

Easy Configuration

Easily customised permissions let you decide exactly what it accessible and by whom.

Enterprise-Grade Security

Network access controls and two-factor authentication (2FA) govern all access attempts and all data is encrypted, keeping all sensitive communications and information secure.

Centralised Management

The configuration of firewalls and the setting of policies for system inactivity is controlled by a central dashboard which also allows you to deploy software updates and patches centrally.

Control Data

Ensuring that employee’s personal data is kept separate from your business’ data is essential to complying with many industry regulations. As is the secure and regular back-up or all your network’s incoming data.