Managing mobile devices to avoid risk

Is your staff’s mobile device usage at work within your control? Have you plans in place for when a business mobile device is lost or stolen? Do you and your team use personal phones or tablets to connect to your business network?

The problems suggested by all of these questions are easily solved with MaaS360 – a cloud-based Mobile Device Management solution that puts device security firmly in your hands.

IBM MaaS360 allows you to centrally manage all mobiles, tablets and laptops which connect to your organisation’s network regardless of where they are.

You can easily minimise risk to your business while not sacrificing any workflow momentum with our Mobile Device Management (MDM) and mobile internet security solutions.

IBM Maas360
GDPR Slider

GDPR Compliance

Non-compliance with GDPR is potentially
business-ending and we want to help ensure your
organisation’s mobile devices are protected from
cyber attacks and data breaches.

Fone Trading Zone can help ensure GDPR
Compliance for our clients by providing full MDM
combined with Mobile Threat Management (MTM)
and Secure Productivity Suite.

GDPR Mobile Phone Compliance

GDPR Compliance

Non-compliance with GDPR is potentially
business-ending and we want to help ensure your
organisation’s mobile devices are protected from
cyber attacks and data breaches.

Fone Trading Zone can help ensure GDPR
Compliance for our clients by providing full MDM
combined with Mobile Threat Management (MTM)
and Secure Productivity Suite.

MTM - Mobile Threat Management

Mobile Threat Management
(MTM)

  • Detects mobile malware and provides remediation
  • Detects apps with malware signatures
  • Detects malicious behaviour
  • Allows you to set granular policy controls to take appropriate action.
  • Provides automated remediation from a near real-time compliance rules engine
  • Alerts to malware detection and automatically uninstall the apps infected (Android devices).
  • Jailbroken and rooted devices detected
  • Discovers ‘hiders’ which attempt to mask detection of jailbroken and rooted devices
  • Uses detection logic updated over-the-air without app updates to be more responsive to fast moving hackers.
Mobile Device Management Icon

Mobile Device Management
(MDM)

  • Mobile devices enrolment fast and easy
  • Enrolment requests can be sent simply by message, email or a custom URL
  • Individual/bulk enrolment
  • Easy integration with Microsoft Exchange and Office 365 and other systems
  • Manage mobile devices centrally
  • Configure email, calendar, contacts, Wi-Fi and VPN profiles.
  • Device features can be restricted (camera, screen capture, cloud back up etc).
  • Pre-approve or blacklist specific apps on devices
  • Provide users with support from help-desk (password reset, remote control etc)
  • Register devices as corporate/employee owned
  • Set granular access control for specific mobile devices or persona policies across devices.
  • Create passcode policies and encryption settings.
  • Detect and restrict jailbroken and rooted devices
  • GPS tracking facility to locate devices
  • Remotely locate, lock and wipe lost or stolen devices
  • Limit and monitor data usage
  • View full hardware/software inventory reports
  • Authenticate against Active Directory/LDAP, one-time passcodes or Security Assertion Markup Language (SAML).
Secure Suite icon for mobile device security

Secure Productivity
Suite

  • Keep personal and corporate data separated
  • Ensure secure and compliant web browsing
  • Provide secure access to intranet sites and ensure compliance with content policies
  • Prevent data leaks by restricting sharing and copying by users (secure container policies)
  • Single authentication sign-on
  • Facility for online/offline compliance checks
  • Easily erase contents of suite container, app containers, enterprise profiles or entire device
  • Seamless workflows for iOS, Android and Windows Phone devices
  • Use granular administrative controls & interactive, graphical reports.
Mobile Threat Management (MTM)

Mobile Threat Management
(MTM)

  • Detects mobile malware and provides remediation
  • Detects apps with malware signatures
  • Detects malicious behaviour
  • Allows you to set granular policy controls to take appropriate action.
  • Provides automated remediation from a near real-time compliance rules engine
  • Alerts to malware detection and automatically uninstall the apps infected (Android devices).
  • Jailbroken and rooted devices detected
  • Discovers ‘hiders’ which attempt to mask detection of jailbroken and rooted devices
  • Uses detection logic updated over-the-air without app updates to be more responsive to fast moving hackers.
Mobile Device Management (MDM)

Mobile Device Management
(MDM)

  • Mobile devices enrolment fast and easy
  • Enrolment requests can be sent simply by message, email or a custom URL
  • Individual/bulk enrolment
  • Easy integration with Microsoft Exchange and Office 365 and other systems
  • Manage mobile devices centrally
  • Configure email, calendar, contacts, Wi-Fi and VPN profiles.
  • Device features can be restricted (camera, screen capture, cloud back up etc).
  • Pre-approve or blacklist specific apps on devices
  • Provide users with support from help-desk (password reset, remote control etc)
  • Register devices as corporate/employee owned
  • Set granular access control for specific mobile devices or persona policies across devices.
  • Create passcode policies and encryption settings.
  • Detect and restrict jailbroken and rooted devices
  • GPS tracking facility to locate devices
  • Remotely locate, lock and wipe lost or stolen devices
  • Limit and monitor data usage
  • View full hardware/software inventory reports
  • Authenticate against Active Directory/LDAP, one-time passcodes or Security Assertion Markup Language (SAML).
data Secure Productivity Suite

Secure Productivity
Suite

  • Keep personal and corporate data separated
  • Ensure secure and compliant web browsing
  • Provide secure access to intranet sites and ensure compliance with content policies
  • Prevent data leaks by restricting sharing and copying by users (secure container policies)
  • Single authentication sign-on
  • Facility for online/offline compliance checks
  • Easily erase contents of suite container, app containers, enterprise profiles or entire device
  • Seamless workflows for iOS, Android and Windows Phone devices
  • Use granular administrative controls & interactive, graphical reports.

CONTACT US TODAY ABOUT SETTING UP A FREE ACCOUNT/QUOTE

Contact Name *
Company Name *
Email *
Telephone *
Message

Contact Name *
Company Name *
Email *
Telephone *
Message