익스트러스

  • home
  • contact us
  • sitemap
  • Korean
  • About us
  • Products
  • PR Cente
제품소개
  • EXAFE series
  • MDM
  • mPKI
  • Vaccine
  • KeySec
  • ApDefence
  • Web-i
  • Wall
  • Products
  • MDM Smart Security Service Leader Extrus
  • Home > Products > MDM
  • EXAFE MDM


    • 제품소개서 다운로드받기

      What is Mobile Device Management (MDM)?

      MDM refers to a series of processes managing secured information of mobile devices, such as smartphones, tablets, and laptops.As corporations become more and more interested every day in the development of mobile office systems and work-related applications for public institutions using mobile devices, the management and security of mobile devices related to these matters are also a factor of interest.

      Exafe MDM allows advanced prevention of personal or company information being exposed and/or misused.Mobile devices with secure transcription solutions and related security can be further enhanced.


      MDM의 장점 리스트입니다.

      Obey NIS Guidelines + Financial Supervisory Service’s
      information protection guideline

      - Management through user authentication
      - Response to the latest malicious code
      - Important data protection (Storage media controls, screen
        capture, prevent loss and theft measures)
      - Mobile OS protection
      - Resource Management (Only authorized GPS,camera,etc can be
        used)
      - Allow only authorized software to be installed
      - Prohibit connecting to the internet byusing unauthorized
        devices.

      Mobile data protection system established

      - Improvement of company’s liability through the configuration
        of security-enhanced smart work environment
      - Primed for external and/or internal audit through implementing
        prevention systems regarding security threats within mobile
        devices
      - Augmentation of individual’s protection through employees’
        progressive continuation in security-enhancement.
      - Minimize discontents of customers via tailored mandates to
        each individual companies accompanied by
        the corporation’s policy.
      - Pre-prevention of information leakage while using mobile
        device.
      - Improve company’s productivity through management of
        work-related applications.


      • Management of smart devices
      • Management of smart devices

        - Smart device authentication and user authentication is performed
        - Check the installation of smart devices in the MDM
        - Check routing of smart devices
        - OS check(iOS, Android, etc.)
        - Support backup recovery for key records and information of smart devices

      • Control devices and apps
      • Control devices and apps

        - Network Block (3G, Wi-Fi, Bluetooth, etc.)
        - User apps restriction(camera, screen capture, recording, etc.)
        - Business app installation and update management
        - Prevent from deleting specific app and prevent forgery app
        - Configure and manage work-related app
        - Control the access of non-business apps and web browser

      • Correspond to Lost/stolen
      • Correspond to Lost/stolen

        - Lost / stolen status report
        - GPS / WPS-based location lookup
        - Remote control commands (factory reset, remote lock, etc.)
        - Emergency call setup, search USIM information
        - Set password forcedly and screen control
        - Remote screen lock

      • Condition-based security policy management
      • Condition-based security policy management

        - Location-based Policy Management (Cell ID / GPS / WPS / Wi-Fi AP)
        - Work-based policy management (access control system linked)
        - User-Based policy Management (human resource DB link)
        - Permission-based policy management (allow authoized app)
        - Black list or White list based app management

      • Statistics and reportingfunctions
      • Statistics and reportingfunctions

        - Lost / stolen status monitoring
        - Backup and recovery status monitoring
        - Client installation status monitoring
        - Last log status monitoring