Partner solution

Proget

Key features

  • Device management
  • Device apps control
  • Device function control
  • Audit and reporting
  • Remote device wipe

Solution

Proget is Enterprise Mobility Management solution enabling the management of Android, iOS and Windows 10 devices. The platform also provides security for company and private data: email, calendar, notes and files.

The platform, in a simple and fast process, enroll the devices and launches remote management mode, then secures devices and performs their configurations. An additional value is to equip the device with advanced data exchange functions and the ability to integrate the corporate environment.

Application control

Proget enables organizations to take manage and control applications on mobile devices. Applications can be delivered from an application store and can be configured to be installed automatically or manually by the device user. Applications can be both white and black listed. It is important for both security and management to ensure that all applications in use are the latest version, as often version releases contain important security enhancements.

Device management

Proget enables configuration of advanced security policies which can be enforced either at a group or individual device level. Administrators also have the ability to use quick actions to lock a device, delete corporate data, wipe the device and also to use remote desktop to deliver support and assistance.

Audit and reporting

The Proget platform enables you to catalog all devices that are connected to the system Administrators can enter and get detailed information about protected devices. Thanks to the systems advanced report module, administrators can generate reports with any data from the system, along with the option of configuring cyclical reporting and sending data to specified e-mail accounts.

Containerization

Proget can create a dedicated business space on a device, which separates personal data from sensitive business data. Particularly important when users use their own device for work. As a result, administrators are able to manage and monitor the device and the business data to which it has access, whilst ensuring user privacy.

Back to top