Product Overview

With fast development of mobile devices, the wide use of smartphones and flat computers in enterprise working has become a kind of development trend. How to manage the users who link to internal network environment of enterprise and visit core resource? How to manage mobile devices efficiently? They are key to the success of enterprise mobilization.

BestEMM could make unified management of mobile devices in large-scale deployment and safe management of mobile devices, enterprise applications and enterprise data from multiple dimensions to make the whole lifecycle from the use of enterprise resource to the cancellation under the control of company.

The deployment of BestEMM could bring benefits for the company. It could ensure enterprise data safety, improve comprehensive operating efficiency, realize unified management of mobile terminals and mobile application and reduce operating cost.

MDM (Mobile Device Management)
MDM is the core component of BestEMM. The enterprise can securely control the hosted mobile devices through MDM and manage mobile devices efficiently, conveniently.
Device management Manage all the mobile devices allocated by enterprises and BYOD mobile devices.
Strategy management Make multiple combinations of strategy management for the mobile devices and configure remotely the functional authority and network environment of the
mobile devices.
Security management Monitor the secure state of mobile devices in real time and check the mobile
device compliance.
User management Adopt the user management system based on the roles and make full lifecycle management of users.


 
MAM (Mobile Application Management)
MAM can make unified hosting, approval, going online, pushing configuration of apps developed by enterprise itself and the third-party apps, and make comprehensive management of mobile app authority.
Enterprise app store
Enterprise app store can make unified management of multi-platform apps, and realize the unified hosting, approval, going online, update of mobile apps.
App monitoring
Scan the apps uploaded deep, check security state of apps.
App encapsulation
Inject codes into the apps, implant the enterprise security strategy. There is no need for secondary development.
App reinforcement
Add shell and encryption to original apps of enterprise to prevent apps from being analyzed reversely, cracked, and tampered.
Apps of black and white list
Support setting the black and white list strategy for apps, and forbid installing and running unauthorized apps. It is the only system that supports black and white list strategy in the industry.


 
MCM (Mobile Content Management)
MCM can store centrally, approve, push remotely, recycle enterprise documents, etc.
Enterprise document center
Exclusive mobile document center within the enterprise. Use private cloud architecture, safely and conveniently.
Strategy management
of documents
Carry out the strategy management of enterprise documents, limit and manage the document sharing, copying, etc
Document content
encryption
Encrypt the documents with high-strength encryption algorithm to prevent the risk of document leakage.
MSM (Mobile Security Management)
MSM provides comprehensive security protection for mobile device operating system.
Enterprise anti-virus
Enterprise anti-virus server. Kill viruses efficiently, deep, comprehensively.
Unknown threat monitoring technology
Unique patented technology of applied behavior analysis in the industry, monitor the abnormal behavior of mobile apps, which can effectively identify and kill
unknown viruses.
Mobile device security assessment
Make security assessment for the mobile devices connected to the enterprise intranet to prevent the invasion of malicious devices.
MIM (Mobile Information Management)
MIM provides functions of safe, inexpensive, fast enterprise internal information push and management.
Enterprise multimedia information
Support the words, pictures, videos, audios, documents, URL, etc.
Push over the air
Push and manage information remotely through the network in real time, which could replace operators’ SMS Gateway and reduce business operating costs.
Anti-tamper

The information uses high-strength encryption protection and digital signature technology to guarantee the security and credibility of information.

MSAG (Mobile Access Gateway)
MSAG establishes a safe and reliable encryption channel for mobile apps to make mobile apps have efficient, convenient access to the intranet apps and data.
Diverse access patterns
Use the specially designed secondary agent security access mode based on terminal network authority.
Comprehensive security system
Establish secure access environment for mobile terminals combined with multiple hardware password devices.
Diverse access terminals

With the cross-platform kernel secondary agent technology, the mobile security client components support iOS, Android, Windows platforms.


 
DSA (Data Security Area)
DSA adopts virtual file system technology, provides transparent file I/O operation at the simulation file system bottom, stores automatically the sensitive enterprise data and standard mobile terminal file system separately with high-strength encryption.
Data security isolation
Establish enterprise mobile device security area, isolate enterprise data from personal data effectively.
Disk space of black box
Adopt the virtual file system technology, provide transparent file access interface for enterprise mobile apps, realize the secure storage of enterprise sensitive data.
 
 
Trustmobi Software (Beijing) Co.,Ltd. @2008 - 2014