Keep It Contained: MDM Software Separates Personal, Corporate Data

— January 14, 2013

Tangoe, Inc., a global provider of communications lifecycle management (CLM) software, has expanded its mobile device management (MDM) offerings to include integrated mobile device containerization functionality.

The enterprise software addresses device usage, device and network access, and data and application security, for smartphones and tablets. This includes restrictions on the ability of IT administrators to access personal data and apps that reside on a networked device.

Powered by Enterproid’s Divide platform, the solution enables enterprise security and control of personal and corporate data on iOS and Android mobile devices. It places corporate data and software in secure, FIPS-validated “containers” on network mobile devices, allowing enterprises to manage data and applications without endangering employees’ personal contacts, photos, data, and apps.

The device containerization addresses several demands of enterprise networks:

  • Application control – Enterprises can prevent the download of unauthorized applications and enforce the installation of and/or prevent removal of required and recommended apps by end-users. In addition, enterprise applications and data are protected within a 256-bit encryption secure device container.
  • Data protection – IT managers have the ability to allow all corporate data to remain encrypted as well as prevent the deletion or sending of data by end-users.
Al Subbloie, president, CEO, and founder of Tangoe, says that the solution is a particular fit for the United States and Asian markets, as well as European countries where violations of data privacy rights result in huge fines.


comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

Current rating: 0 (0 ratings)



Must See


IoT 2020: How Inter-Connected Devices Will Impact the Enterprise

In realizing the vision of the IoT, we are in uncharted territory. It's happening so fast in so many separate pieces that managing and leveraging has escaped a majority of enterprises. This report provides a snapshot of the evolution of the IoT and examines what's to come to help you prepare for the impact—from the onslaught of technology and its unprecedented risk, to attaining the extraordinary value of innovative information.