Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

7/19/2012
04:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SOTI Offers Advanced Management And Security For Android Devices

Currently, Android provides limited management and security APIs for MDM vendors to leverage

MISSISSAUGA, ONTARIO ­ July 16, 2012 ­ SOTI Inc., world-leader in Enterprise Mobility Device Management (MDM), has unveiled new technology that enables corporations to consistently manage security policies across Android devices from all manufacturers.

Currently, Android provides limited management and security APIs for MDM vendors to leverage. As a result, OEMs need to create their own APIs in order for MDM vendors to build tools to manage their devices. This creates disparity as each OEM adds functionality in varying degrees and forms.

Today, although MDM solutions say that they can manage Android devices, their ability to do so varies based on the level of support provided by each OEM. For example, one popular MDM provider claims to be able to manage and secure all Android devices, but can only set a password complexity policy on these devices.

SOTI has taken a different approach from other MDM vendors, and has built unique technology that provides advanced and consistent management for all Android devices regardless of the manufacturer. The advanced management features that SOTI¹s MobiControl MDM provides include: - Full suite of Help desk tools, including real-time remote control - Secure Content Locker - Silent installation of applications and updates - Policies for controlling access to corporate email - Device Lockdown/Kiosk functionality - Location based automatic management (i.e. Geofencing) - Remote wipe of corporate data or full device wipe - Enterprise App Store - Self Service Management Portal - And much moreŠ

SOTI is the only MDM vendor in the world that currently has advanced management features for Android devices, such as real-time remote control, lockdown/kiosk functionality, geofencing, etc.

Carl Rodrigues, President and CEO of SOTI said, ³There is a lot of talk by the analysts these days about the need for management tools for Bring-Your-Own Device (BYOD) policies. Most MDM vendors cannot provide consistent management across all Android devices, making BYOD implementation impossible. MobiControl¹s unique deep management functionality across all Android devices allows IT departments to set consistent BYOD security and management policies on Android, iOS and other platforms.²

Recent survey data from Strategy Analytics shows escalating BYOD adoption of Android devices into the enterprise. Over the next 12, months, enterprises worldwide are planning to purchase 44% more Android tablets and 34% more iPads. With enterprises having to pay 78.7% of related smartphone costs and replace them every 13 months, the need for comprehensive MDM is essential to optimize device efficiency and security.

Backed by over 10 years of experience and numerous awards in the MDM space, SOTI MobiControl is the Mobile Device Management and Help desk solution of choice for organizations looking to manage and secure their devices across all platforms. It is the only MDM solution today that offers enhanced management functionality for Android devices from all OEMs.

About SOTI Inc. SOTI Inc. develops industry-leading technology that solves the unique challenges involved in managing, securing, supporting, and tracking remote mobile and desktop computing devices. Today, over 80,000 customers around the world in retail, manufacturing, health care, government, logistics, hospitality and other industries rely on SOTI products to reduce the total cost of ownership associated with their mobile devices. For more information, visit us at http://www.soti.net, contact us by email at [email protected] or phone us at +1-905-624-9828.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...