Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
In today's work environment, employees, partners, and vendors operate seamlessly from any location and on various devices to upload and exchange files. Personal smartphones and tablets have now become integral components of the workplace alongside traditional desktops and laptops. Consequently, many organizations are adopting the bring your own device (BYOD) policy, acknowledging its benefits in lowering equipment expenses and enhancing overall productivity. However, without effective encryption and strict password policies, the data accessed via mobile devices—whether from corporate servers or public cloud services—remains vulnerable. Should a device be misplaced or compromised, or if data is accessed through unsecured wireless networks, there is a significant risk of theft, which could expose companies to security breaches and breaches of compliance standards. IT departments are finding it challenging to maintain a balance between safeguarding data and allowing employees the freedom to access necessary information without hindrance. To assist with this dilemma, Dell Data Protection | Mobile Edition empowers IT teams to regain control over data security, ensuring that critical information remains protected. As organizations continue to embrace mobile work, solutions that marry convenience with security will be essential in navigating the complexities of modern data protection.
Description
Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights.
Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes.
Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7.
Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
API Access
Has API
API Access
Has API
Integrations
Axonius
Bigtincan
Boomi
CentreStack
Check Point IPS
Check Point Infinity
Cynerio
Dell EMC Avamar
Dell EMC NetWorker
EMC Elastic Cloud Storage
Integrations
Axonius
Bigtincan
Boomi
CentreStack
Check Point IPS
Check Point Infinity
Cynerio
Dell EMC Avamar
Dell EMC NetWorker
EMC Elastic Cloud Storage
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$5/device and $10/user/month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Dell
Founded
1984
Country
United States
Website
i.dell.com/sites/doccontent/shared-content/data-sheets/en/Documents/Dell_Data_Protection_Mobile_Edition_Data_Sheet.pdf
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/maas360
Product Features
Mobility
App Management
Barcode Scanning
Compliance Management
Content Management
Data Collection
Data Management
File Management
Forms Automation
Mobile Messaging
Remote Access
Remote Systems Monitoring
Product Features
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Mobility
App Management
Barcode Scanning
Compliance Management
Content Management
Data Collection
Data Management
File Management
Forms Automation
Mobile Messaging
Remote Access
Remote Systems Monitoring