MOBILE DEVICE MANAGEMENT
TRENDS BIRD LIMITED BRINGS MDM SOLUTIONS IN BANGLADESH
As a Mobility and MDM specialists with a proven track record of managing fleets and roll-outs for Thirty Five Thousand devices.
A single portal lets you manage the security of your mobile devices – and your organisation’s data. Using secure remote monitoring, you can update software from a central location, and even lock or wipe devices if they get lost, stolen or damaged. Keeping all your devices safe.
Trends Bird MDM can be deployed quickly and easily across your entire mobile estate – including personal mobiles and tablets used under Bring Your Own Device (BYOD). You can host it behind your own firewall, in our secure data centres or as a hybrid installation. Our solutions also work with Bangladeshi Local Mobile Brands & we are already deployed with many local mobile vendors.
You already know that mobile devices are proliferating in the enterprise, business and education space at an exponential rate. You need to manage a diverse range of devices – and fast. Trends Bird can assist you in gaining visibility and control over all of the devices connecting to your network and accessing your resources. Both BYOD and internally owned. Trends Bird already deployed eight thousands of managed mobile fleets for Akij Group with WE Phone handset. We have the experience you need. Manage your devices yourself, or let us do it for you. Patients simply scratch off a panel on the package to reveal the unique code, which they send via SMS to a secure global hotline for verification. Within seconds they receive a reply confirming or denying the authenticity of the medicine, as well as information about the product.
It’s obvious that a lost corporate mobile device represents a significant threat. Providing the ability to locate, lock, and potentially wipe lost devices must be available for a package to call itself an effective MDM tool. Automating that process is even better. All of the vendors we tested provide the ability to return the phone to the state it was in prior to enrolling in mobile management. This includes removing sensitive settings such as WiFi passwords, configuration settings, and sensitive or protected documents. A granular selective wipe, which is what we call out in our features table above, goes beyond that ability to allow administrators to remove only specifically selected information and data elements, such as WiFi passwords or specific documents, like corporate data versus personal documents the user may have stored on the device.
Many of the products we looked at provide a geofencing capability that can generate alerts and take action should a device cross a specific boundary. This works great for a company with a local workforce where the devices should never be more than some fixed number of miles away from the home office. This feature can be tweaked for traveling employees and, in many cases, can be time restricted as well.
Policy-based security is also standard across all of the products in this review. Configuring devices to lock with a personal identification number (PIN) is just one of many policies that can be set as mandatory, meaning that even if a device is owned by the employee in a BYOD scenario, once it’s registered it’ll require a PIN to open whether the user had it set that way or not.
Other policies to restrict behavior or to lock down specific apps are also common. But the conflict between corporate-owned and personally-owned devices isn’t always so clear cut.Having the ability to restrict the gathering of location and other sensitive data from a personally-owned device helps keep employees happy while allowing them to use their own devices for company work. IT managers need to be careful and look for the ability to segment work and personal apps and data as much as possible.
Enrolling lots of devices might not seem like a big deal but can be a show stopper without some type of automated process. Providing a connection to a local Microsoft Active Directory domain to process users is one method. Most of the products also offered a way to import users and devices from a flat file to streamline enrollment in the case where either users or devices aren’t identified in a directory service. User self-registration is a key feature here, but be aware that this can be accomplished in different ways. Some of our contenders allow IT managers to create custom, branded user self-service portals that allow them to register their own devices, while others force them to go through third-party app stores to accomplish the same thing.
One of the biggest challenges in this roundup was drawing a line between MDM and any other functionality to include application management and delivery, security features like advanced threat management, and document protection.
OUR MDM SOLUTIONS ENABLE YOU TO MANAGE SMALL, MEDIUM AND LARGE-SCALE DEPLOYMENTS OF MOBILE DEVICES.
HOW WE WORK
Our team will draft a comprehensive MDM strategy covering:
- Data encryption.
- A policy for user authentication and passwords.
- The frequency of your security scans.
- Optimum Anti-Virus tools.
- Default applications on all employee devices.
- A policy regulating the registration of an employee’s new device.
- Lost or stolen device procedures.
Once a strategy has been agreed upon, an MDM solution which best meets its requirements will be identified. We will then work to deploy this across your workforce’s devices as soon as possible with minimum disruption to your day-to-day operations.
HOW YOU BENEFITED
Business-critical applications, files, and tools will be accessible across all your workforce’s devices. If required, we can both advise on, and help to supply, standardised devices to ease the transition to a MDM environment.
Monitor, track, and record device usage across your organisation. In the event of loss or theft, devices can be tracked, located, and if needed, locked or disabled.
Easily customised permissions let you decide exactly what it accessible and by whom.
Network access controls and two-factor authentication (2FA) govern all access attempts and all data is encrypted, keeping all sensitive communications and information secure.
The configuration of firewalls and the setting of policies for system inactivity is controlled by a central dashboard which also allows you to deploy software updates and patches centrally.
Ensuring that employee’s personal data is kept separate from your business’ data is essential to complying with many industry regulations. As is the secure and regular back-up or all your network’s incoming data.