MDM implementation & Training

Mobile Device Management (MDM) facilitate the deployment and ongoing operation of a large number of mobile devices in an enterprise environment.

mdm logosSupported MDM systems

Services Offered

MDM System Implementation

Before each MDM system implementation, it is necessary to analyze the goals and requirements for the system:

  • Required server parameters for on-premise installation
  • Types and quantities of mobile devices
  • Versions of the operating system/firmware of the devices, if their OS update is required
  • Device connectivity (Wi-Fi, mobile data, Ethernet, USB)
  • How the initial device configuration, i.e., enrollment, will be performed
  • Installed applications and method of their updating
  • Use of remote control and device lockdown

As part of the MDM system implementation, the MDM system itself will be installed, including preparation of the database for data storage. The system is then configured to meet customer expectations. MDM system implementation typically involves the following steps:

  • Installation of the MDM system on the customer's physical or virtual machine
  • Database access setup, possibly including database installation
  • Preparation of software packages and settings for the required types of mobile devices
  • Creation of a simple enrollment device procedure
  • Functionality testing
  • Documentation creation of the installation and configuration performed
  • Production usage

Training and Support

After MDM system implementation, it is customary to train at least one administrator from the customer for basic system operation. Such training usually takes a few hours. However, it is possible to organize detailed training ranging from 1-3 days, during which administrators will be introduced to the details of MDM system configuration.

Main Benefits of Using MDM Systems in Enterprise Environments

  • Asset inventory
  • Centrally managed distribution of applications, firmware, OS updates, and settings
  • Ability to quickly and easily deploy new devices and devices returned from repair
  • Remote control of mobile devices incl. remote file access
  • Security: screen locking with user access only to a selected set of work applications (kiosk mode), antivirus control, enforcement of security settings, etc.