• ENDPOINT SECURITY MANAGEMENT

    Enforcement of IT Security Governance for all mobile EUC devices

    Contact Consultant
SERVICE Managed IT Service Managed EndPoint Security

WHY NEED END POINT SECUIRTY?

Any Device, Any Platform

You may have office computers, employee BYOD devices, company owned mobile devices and so on. All are supported within one MDM management console managing user account, password, permission, authorized applications and so on.

Device Lifecycle Management

All company owned IT asset e.g., computer and mobile devices are distributed and used by employee. MDM supports to manage the security throughout the whole life cycle. Data will removed remotely to protect company if that is lost.

Flexible in Business Use

Employee comes and left, that won't cause extra cost as the MDM solution is Pay as you go. The whole security solution can be applied to all working scenarios e.g., home office, training center or office computer.

ENFORCE IT POLICY TO ENDPOINTS

Client IT infrastructure tends to be light weight and cloud based. There is less chance to invest local on-premise server with Active Directory and Group Policy for ECU computer and mobile device management. Moving to the best option of mobile device management makes much technical flexibility of IT infrastructure design and meanwhile comes with strengthened EUC IT management, and no compromise with IT security governance. No heavy IT software investment. Pay as your business Grows.

Geofencing
EndPoint Security
Application Security
Containerization
Geofencing

Geofencing – Location based MDM restriction

Geofence functionality, in the context of an MDM, let’s the administrator define policy zones and policy-exclusion zones. Policies with admin-specified restrictions and profiles are automatically configured on to devices that enter the geofence. Geofencing is ideal for field devices that house business-sensitive data and are constantly in different locations. MDM allows creation of multiple geofences all around the world.

EndPoint Security

Data Security and Encryption

Perform full disk encryption on Windows 10 PCs using BitLocker, Microsoft’s built-in tool for encrypting system drives, data drives and removable data drives. BitLocker encrypts the entire Windows operating system, offering protection against unauthorized access of a lost or stolen Windows device.

Seamlessly separate corporate apps and data from personal apps and data by deploying “containers” on devices.

Perform seamless disc encryption on Mac devices using Apple’s full disc encryption program “FileVault” to prevent unauthorized users from retrieving the information store on Mac. Once the device is encrypted, anyone without a password or recovery key will be unable to log in to your Mac.

Application Security

Application Security

Restrict access to Google Play Store, iTunes Store, Apple’s App Store,  Microsoft  Store Apps, iBooks, podcasts, to prevent users from installing non-productive apps on corporate devices. Prevent managed app data from syncing with your iCloud account. This prevents devices from syncing corporate data with its iCloud account.

Deploy proactive internet access controls to monitor the bandwidth usage of apps on devices. Configure per-app VPN on to establish secure access to corporate data from managed device endpoints.

Containerization

Add value to your business

Secure a part of your personal device for corporate use by deploying logical “Containers” on devices.
Separate personal and corporate data on Android devices by enrolling your devices in Android Enterprise program. Push apps and install/uninstall apps silently, enforce app-specific configurations and permissions, enforce data security settings on devices and more.
Seamlessly manage corporate apps and data separately from personal apps and data with MDM’s iOS Business Container.

Seamless IT EUC Security Control

Mobile working and collaborating with teams, partners and customers through the cloud IT infrastructure brings the business convenience with hassle-free on IT security - Access Permission, Installation of Program, Data Encryption, USB Restriction, Malicious Isolation, Sandbox, Remote Data Wipe. Everything is under the direct administration from your local Virtual IT department 
Contact Consultant

SECURITY GOVERNANCE OF DATA, DEVICE AND APPS.

The end security solution supports Windows 10, Mac, Android, and Iphone

Password Policy

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

Data Encryption

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

Web content Filter

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

Enterprise Apps

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

Remote Grant Access

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

Remote Data Wipe

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

Withdraw Access

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

Remote Lockdown

Use this paragraph to describe what you do. This is a great place to let your visitors know who you are.

MDM Technologies

In the business case, BROCENT uses the combination of Technologies to achieve the business expectation of security management and flexibility.

The Technologies cover the MDM, centralized authentication, cloud infrastructure, monitoring and security audit.

Device Theft Prevention

Real Time Device Location

Device Geographic Tracking

Device location can be monitored and analyzed to track the stolen or lost devices. Remote administration is to access to a list of comprehensive reports that help keep track of the entire device lifecycle.

Remote Lockdown Device

Withdraw Permission and Settings

Once device is identified and tracked if they  are lost, the remote administration  is initialized to  withdraw access to entirety of the device and lock it down in an instant so as to prevent any unauthorized access from the lost corporate device and prevent any loss from the the vulnerability

Remote Wipe Corporate Data

Remote Wipe Corporate Data

Setup the remote wipe function to ensures that sensitive data is completely removed from the device while keeping personal data intact. Corporate wipe can be enforced on lost devices or on BYOD devices when an employee resigns.

Custom Message on Device

Custom Message on Device

It can be administrated to publish the policy to the devices and display the customized message on the lost devices from the backend management console.

DLP &Threat Management

Data Loss Prevention DLP

Mobile OS Management

BROCENT helps the enterprise establish policies related to data security that seek to mitigate inadvertent data loss. The IT administrator can ensure that sensitive data is bound within the safety of corporate devices. Restrict transfer of data from a managed device through USB, Bluetooth and tethering.

Data Copy &Paste

Mobile OS Management

Enforce copy/paste restriction to prevent data leakage into unmanaged applications. Managed open-in policies that prevent managed content and application from being opened from unmanaged sources.

Mobile OS Management

Mobile OS Management

Track the system parameters, OS versions, security updates and privilege escalations such as jailbreak or rooting.

Remote Administration

Remote Administration

Remote administration to configure corporate Wi-Fi and VPN settings to avoid connections to malicious networks. Manage the  standard list of authorized applications