SlideShare a Scribd company logo
1 of 2
Download to read offline
EntErprisE on thE movE
mobile communication keeps growing. Just imagine a world without it.
But how do you keep control of your mobile workforce?




managing these mobile voice and data communications is one of the challenges
every organization has to deal with. Unmanaged smart phones with internet
connections can cause huge increases in telecom and maintenance costs. Even
with flat fee rates, it is becoming more and more important for every organization
to manage connectivity and devices. potential hazards like data loss and security
issues have to be controlled. is your organization able to meet your mobility needs
and stay in control? With the mobile Way you are!


the mobile Way is an online solution and provides managed mobile communi-
cation services. insight information about the usage of mobile voice and data
telecom services are presented to you in detail. Besides real time insight informa-
tion on voice and data consumption, the mobile Way also offers a complete set of
mobile device management and security features. All this information is presented
to you in a user friendly dashboard. the solution is independent of phone platform
or providers. You will have both control and overview on a user and global basis.
Enabling you to take action in case of overuse, loss of data or device as well as
restricting access of restricted information. With the mobile Way you can manage
your ever growing mobility needs and be sure that your mobile devices and data
are managed, secured and under control.


                           THE MOBILEWAY PLATFORM


                             %         %        %




                                                                                      Powered by   Afaria
WE sUpport
All
opErAtinGs
sYstEms




Administrator Dashboard – manage & secure mobile data & devices from a single console

Administration                                   remote Control                                 Content / Application management
 * over-the-air software distribution and          * Full and Selective wipe function in case    * Centrally distribute, install, maintain
   initial device configuration                      of stolen or lost devices                     and support frontline applications
 * Manage groups and devices by roll,              * Full remote takeover capabilities           * Trusted Applications
   geography, work group and many other              for administrators                          * document Management
   categories                                                                                     * Lockdown (camera, Sd card,
 * Update application and data as                security                                           bluetooth, wiFi)
   needed                                          * Centrally enforce corporate security         * Centralized automated backup
 * Centrally define, manage and enforce              policies                                       & restore
   connection and configuration settings           * Full disk encryption                         * Session management
 * System details & operational status             * email and PIM encryption
 * Inventory Asset Management                      * over the Air data encryption
 * Manage by groups and devices                    * Antvirus & Firewall protection



Cost Control

roaming Alert & Usage Control                    Usage & network Quality monitoring             management reports
User gets an roaming alert when roaming          Al Voice, data and SMS sessions are locally    The data from the mobile devices can
starts. This alert will also be available real   stored in a database an replicated to the      be replicated to the enterprise bI tools. All
time to IT and Telecom management. on            management portal environment. This            Voice, data and SMS sessions are logged
each voice and data session the following        provides realtime information about:           in detail on the mobile device. with this in-
data will be logged:                                                                            formation all kinds of management reports
                                                   * How many and what type of                  can be generated:
  * date/Time of session                             applications are active at what time
  * duration                                       * Match application details with traffic       * Match data usage against application
  * Country of operator                              usage                                          /service usage (Mail/SMS/MMS/Ie/Apps)
  * operator network usage                         * Status of calls (Missed/dropped/             * Top 10 users
  * Active/Inactive SIM cards                        Success)                                     * Top 10 usage application/services
  * Incoming/outgoing calls and                    * Signal strength                                (what services and application are
    data sessions                                  * Connection type (GPrS, UMTS, etc)              heavy traffic consumers?)
  * SMS Usage                                      * Speed measurement
  * Total traffic size sent/received
  * And much more…….



User services

Device management                                personal information
  * New device/application registration            * Call activity
  * Lock lost device                               * SMS activity
  * wipe data on lost device                       * data usage



Groene tuin 295 | 3078 KG rotterdam | t 010 - 258 07 00

More Related Content

What's hot

Surveillance Video Capabilities
Surveillance Video CapabilitiesSurveillance Video Capabilities
Surveillance Video Capabilitiesdesktopalert
 
Serverless Thin Client
Serverless Thin ClientServerless Thin Client
Serverless Thin Clientguestb980dc366
 
truMe for visitor management
truMe for visitor managementtruMe for visitor management
truMe for visitor managementAthulJojo1
 
Visitor management system for government buildings
Visitor management system for government buildingsVisitor management system for government buildings
Visitor management system for government buildingsAthulJojo1
 
truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access managementAthulJojo1
 
Steps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and ConsumersSteps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and ConsumersJuniper Networks
 
It security
It securityIt security
It securityavi2607
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your FirewallSophos
 

What's hot (9)

Security Issues for Cellular Telephony
Security Issues for Cellular TelephonySecurity Issues for Cellular Telephony
Security Issues for Cellular Telephony
 
Surveillance Video Capabilities
Surveillance Video CapabilitiesSurveillance Video Capabilities
Surveillance Video Capabilities
 
Serverless Thin Client
Serverless Thin ClientServerless Thin Client
Serverless Thin Client
 
truMe for visitor management
truMe for visitor managementtruMe for visitor management
truMe for visitor management
 
Visitor management system for government buildings
Visitor management system for government buildingsVisitor management system for government buildings
Visitor management system for government buildings
 
truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access management
 
Steps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and ConsumersSteps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and Consumers
 
It security
It securityIt security
It security
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 

Viewers also liked

Planning and De-briefing for succes
Planning and De-briefing for succesPlanning and De-briefing for succes
Planning and De-briefing for succesharveyhillary
 
Trabajo bravo
Trabajo bravoTrabajo bravo
Trabajo bravoCelia
 
EInstein's Big Split
EInstein's Big Split EInstein's Big Split
EInstein's Big Split guest9973e8
 
08 Gfebbraio Rassegna Stampa
08  Gfebbraio  Rassegna  Stampa08  Gfebbraio  Rassegna  Stampa
08 Gfebbraio Rassegna Stampaalbertopriore
 
A science-gateway for workflow executions: online and non-clairvoyant self-h...
A science-gateway for workflow executions: online and non-clairvoyant self-h...A science-gateway for workflow executions: online and non-clairvoyant self-h...
A science-gateway for workflow executions: online and non-clairvoyant self-h...Rafael Ferreira da Silva
 
Reforzamiento ingles 7
Reforzamiento ingles 7Reforzamiento ingles 7
Reforzamiento ingles 7Cecilia Perez
 
Angles in MICDS Architecture
Angles in MICDS ArchitectureAngles in MICDS Architecture
Angles in MICDS Architecturejbaer
 
ELO in het Primair Onderwijs
ELO in het Primair OnderwijsELO in het Primair Onderwijs
ELO in het Primair OnderwijsArnout Vree
 
Social Networking for PGA Professionals
Social Networking for PGA ProfessionalsSocial Networking for PGA Professionals
Social Networking for PGA ProfessionalsBrendon Elliott
 

Viewers also liked (18)

Proyecto integrado
Proyecto integradoProyecto integrado
Proyecto integrado
 
Lincoln
LincolnLincoln
Lincoln
 
Planning and De-briefing for succes
Planning and De-briefing for succesPlanning and De-briefing for succes
Planning and De-briefing for succes
 
Trabajo bravo
Trabajo bravoTrabajo bravo
Trabajo bravo
 
EInstein's Big Split
EInstein's Big Split EInstein's Big Split
EInstein's Big Split
 
08 Gfebbraio Rassegna Stampa
08  Gfebbraio  Rassegna  Stampa08  Gfebbraio  Rassegna  Stampa
08 Gfebbraio Rassegna Stampa
 
A science-gateway for workflow executions: online and non-clairvoyant self-h...
A science-gateway for workflow executions: online and non-clairvoyant self-h...A science-gateway for workflow executions: online and non-clairvoyant self-h...
A science-gateway for workflow executions: online and non-clairvoyant self-h...
 
Reforzamiento ingles 7
Reforzamiento ingles 7Reforzamiento ingles 7
Reforzamiento ingles 7
 
Eclipse RCP 4
Eclipse RCP 4Eclipse RCP 4
Eclipse RCP 4
 
Dragon Ball
Dragon BallDragon Ball
Dragon Ball
 
Nuo rugsėjo savivaldybė iš tiekėjų reikalaus darbuotojams mokėti vidutinį atl...
Nuo rugsėjo savivaldybė iš tiekėjų reikalaus darbuotojams mokėti vidutinį atl...Nuo rugsėjo savivaldybė iš tiekėjų reikalaus darbuotojams mokėti vidutinį atl...
Nuo rugsėjo savivaldybė iš tiekėjų reikalaus darbuotojams mokėti vidutinį atl...
 
Angles in MICDS Architecture
Angles in MICDS ArchitectureAngles in MICDS Architecture
Angles in MICDS Architecture
 
ELO in het Primair Onderwijs
ELO in het Primair OnderwijsELO in het Primair Onderwijs
ELO in het Primair Onderwijs
 
7 dì 29 maggio 2013
7 dì   29  maggio 20137 dì   29  maggio 2013
7 dì 29 maggio 2013
 
Performance
PerformancePerformance
Performance
 
1 Orbit Overview En 150dpi
1 Orbit Overview En 150dpi1 Orbit Overview En 150dpi
1 Orbit Overview En 150dpi
 
Dragon Ball AF
Dragon Ball AFDragon Ball AF
Dragon Ball AF
 
Social Networking for PGA Professionals
Social Networking for PGA ProfessionalsSocial Networking for PGA Professionals
Social Networking for PGA Professionals
 

Similar to Mobile Way Flyer

Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraAptera Inc
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0Vladimir Nagin
 
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...Intergen
 
What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)Thinksoft Global
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 

Similar to Mobile Way Flyer (20)

Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
mobile application security
mobile application securitymobile application security
mobile application security
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
 
Knox Manage Tech Sheet
Knox Manage Tech SheetKnox Manage Tech Sheet
Knox Manage Tech Sheet
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
 
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
50320140501003
5032014050100350320140501003
50320140501003
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 

Mobile Way Flyer

  • 1. EntErprisE on thE movE mobile communication keeps growing. Just imagine a world without it. But how do you keep control of your mobile workforce? managing these mobile voice and data communications is one of the challenges every organization has to deal with. Unmanaged smart phones with internet connections can cause huge increases in telecom and maintenance costs. Even with flat fee rates, it is becoming more and more important for every organization to manage connectivity and devices. potential hazards like data loss and security issues have to be controlled. is your organization able to meet your mobility needs and stay in control? With the mobile Way you are! the mobile Way is an online solution and provides managed mobile communi- cation services. insight information about the usage of mobile voice and data telecom services are presented to you in detail. Besides real time insight informa- tion on voice and data consumption, the mobile Way also offers a complete set of mobile device management and security features. All this information is presented to you in a user friendly dashboard. the solution is independent of phone platform or providers. You will have both control and overview on a user and global basis. Enabling you to take action in case of overuse, loss of data or device as well as restricting access of restricted information. With the mobile Way you can manage your ever growing mobility needs and be sure that your mobile devices and data are managed, secured and under control. THE MOBILEWAY PLATFORM % % % Powered by Afaria
  • 2. WE sUpport All opErAtinGs sYstEms Administrator Dashboard – manage & secure mobile data & devices from a single console Administration remote Control Content / Application management * over-the-air software distribution and * Full and Selective wipe function in case * Centrally distribute, install, maintain initial device configuration of stolen or lost devices and support frontline applications * Manage groups and devices by roll, * Full remote takeover capabilities * Trusted Applications geography, work group and many other for administrators * document Management categories * Lockdown (camera, Sd card, * Update application and data as security bluetooth, wiFi) needed * Centrally enforce corporate security * Centralized automated backup * Centrally define, manage and enforce policies & restore connection and configuration settings * Full disk encryption * Session management * System details & operational status * email and PIM encryption * Inventory Asset Management * over the Air data encryption * Manage by groups and devices * Antvirus & Firewall protection Cost Control roaming Alert & Usage Control Usage & network Quality monitoring management reports User gets an roaming alert when roaming Al Voice, data and SMS sessions are locally The data from the mobile devices can starts. This alert will also be available real stored in a database an replicated to the be replicated to the enterprise bI tools. All time to IT and Telecom management. on management portal environment. This Voice, data and SMS sessions are logged each voice and data session the following provides realtime information about: in detail on the mobile device. with this in- data will be logged: formation all kinds of management reports * How many and what type of can be generated: * date/Time of session applications are active at what time * duration * Match application details with traffic * Match data usage against application * Country of operator usage /service usage (Mail/SMS/MMS/Ie/Apps) * operator network usage * Status of calls (Missed/dropped/ * Top 10 users * Active/Inactive SIM cards Success) * Top 10 usage application/services * Incoming/outgoing calls and * Signal strength (what services and application are data sessions * Connection type (GPrS, UMTS, etc) heavy traffic consumers?) * SMS Usage * Speed measurement * Total traffic size sent/received * And much more……. User services Device management personal information * New device/application registration * Call activity * Lock lost device * SMS activity * wipe data on lost device * data usage Groene tuin 295 | 3078 KG rotterdam | t 010 - 258 07 00