Tag: mobilemanager

Zenprise introduce a User Health Check enhancement to MobileManager


[YouTube link]

Zenprise have announced an enhancement to their MobileManager platform: the User Health Check system. With a 100 point troubleshooting checklist, IT departments can more easily deal with support issues, which will surely jump after the holiday smartphone buying blitz.

The Zenprise User Health Check runs through a 100 point checklist to diagnose and resolve, in real time, the most common user support issues. The checklist is so simple that the average smartphone user could probably run the diagnostic themselves. After performing the diagnostic, Zenrprise will identify potential hardware and software issues with the device, user configuration errors, carrier related problems, backend server issues, or device encryption problems.

Get more information about Zenprise MobileManager.

[ad#Google Adsense]

Zenprise announces MobileManager 5.0 with new features to save costs



The latest product from Zenprise, MobileManager 5.0, features a wide array of features to help an organization get the visibility they need and save costs by having a complete picture of their mobile infrastructure.

MobileManager 5.0 integrates support monitoring, expense management, security, and device management across multiple smartphone platforms including BlackBerry, iPhone, Windows Mobile and Palm.

A typical case scenario involves a large organization with a few thousand devices on the network. With MobileManager 5.0, this organization has access to the following features regarding their mobile infrastructure:

  • Identify smartphones on the network that aren’t being used. This allows the organization to reclaim significant costs by disabling these unused devices.
  • View smartphone usage details in order to optimize their employees’ wireless plans.
  • See what carriers are being used on the network. This data can be used to leverage volume discounts with the carrier of choice.
  • Identify smartphone malware and spyware in real time.

The solution also incorporates a host of features that should be standard with any mobile admin product:

  • Ensure compliance of critical corporate security policies (e.g., content encryption enabled, camera and Bluetooth disabled, etc.)
  • Remotely lock a device or wipe smartphones clean of corporate data
  • Identify all software installed on an individual smartphone or find all smartphones with particular software installed
  • Track application version information

With all of this data, Zenprise should be able to provide the industry with some really fascinating white papers and research reports.

For example, if their clients agree, we could anonymously survey thousands of BlackBerry users to see what software they carry on their device. This would provide the industry with an analysis of where the content market is heading in the enterprise space. Also, we could figure out what carriers are the cheapest for enterprise, and perhaps come to a decision on who is the leading brand. This news may also put pressure on some carriers to change their pricing in order to be more competitive.

MobileManager 5.0 will be available in October.


Security and Compliance Issues Facing Today’s Corporations



by Ahmed Datoo, VP of Marketing for Zenprise

The widespread consumerization and general adoption of smartphones in the workplace is adding another layer of IT complexity. It’s important to remember that carrying a smartphone is similar to having a computer in your pocket. Therefore, these devices face the same security threats as a PC. Along with network vulnerabilities that stem from malware embedded Websites and email attachments, applications are also at risk.

The increased popularity and availability of smartphone applications creates security implications for employees who increasingly download these apps onto their corporate phones. Today’s enterprise is ill equipped to handle the expected wave of device issues resulting from rogue applications. A rogue application could cause a security threat by pulling sensitive data from the network.
Continue reading about security and compliance issues facing today’s corporations