Menu

Enterprise Mobility Management
(Android Enterprise)

Enterprises empower their employees by allowing the use of mobile devices under a Company Owned Devices (COD) policy or by implementing Bring Your Own Device (BYOD) policy for work operations. The use of Android devices in the workplace increases the risk of data loss and unauthorized data access. Therefore, it is necessary to keep personal and work data secure and separate, as well as to configure restriction policies on the devices.

Our Android Enterprise solution plays a vital role in the management of Android devices as a COD or BYOD within the organizations infrastructure. eScan EMM keeps personal and enterprise data separate and secure by enforcing required security controls on the devices. EMM introduces a single centralized platform to secure data from a diverse range of mobile devices. With policy-based controls and sophisticated threat protection, it allows proactively enable mobile productivity without compromising enterprise security.

To purchase this product, please mail us at sales@escanav.com.

Language Versions


English, French, Russian, German and Japanese


Benefits

Device Management

Device Management

Today, most of the employees are using mobile devices to perform corporate tasks and access corporate data from anywhere and anytime. Use of mobile devices improves productivity and allows employees to work in a favorable and flexible environment. With improved productivity, mobile devices may be harmful if hacked, stolen, or lost. Thus, the management of devices is a crucial part of any enterprise. eScan EMM helps the IT Administrator to manage the mobile devices within an organization, the devices are enrolled either as COD or BYOD.

Company Owned Device - COD

Company Owned Device - COD

In this case the device is provided by the enterprise, it will be enroll as COD (Company Owned Device), and the security policies will be applied on them to safeguard corporate data. These devices are centrally managed by IT admins through the eScan Management Console with security protocols and business applications.

Bring Your Owned Device - BYOD

Bring Your Owned Device - BYOD

On the other hand, employees can use their personal devices for enterprise work without compromising their own privacy. In this scenario, devices are enrolled as BYOD by applying security policies to avoid data confliction and loss. In the case of BYOD, a work profile will be created on the employee’s device to allow them to use same device for both work and personal purposes. It ensures the users privacy as well as enterprise security, keeping enterprise data and applications separated from personal data and applications. The work profile is indicated by a suitcase symbol. Containerization and its benefits are available for BYOD.

Bring Your Owned Device - BYOD

Kiosk Mode

The Kiosk Mode policy empowers IT administrators to enforce strict usage controls on enterprise devices, ensuring they are used exclusively for business purposes. By configuring devices to run in Single App Mode or allowing access to a predefined set of applications, Kiosk Mode minimizes distractions and enhances workforce productivity. Additionally, administrators can restrict hardware key functions such as volume and power buttons further locking down the device environment and ensuring consistent, secure operation within the intended use case.

Features of Enterprise Mobility Management (Android Enterprise)

Mobile Device Management

Mobile Device Management

This module allows you to create a new group, task, and policy template as per requirement. Admin can add one or more new devices to single group and deploy policies for both Android and iOS based devices that are enrolled in the group. Admin can move devices from one group to another and also remove them from the group.

Mobile Threat Defense (MTD)

Mobile Threat Defense (MTD)

Mobile Threat Defense (MTD) offers proactive protection by detecting and analyzing security risks on mobile devices, including malware, phishing attempts, and OS vulnerabilities. It provides real-time threat alerts with detailed statistics, categorized by severity, empowering IT teams to quickly prioritize and respond to potential threats. With MTD, organizations can stay ahead of mobile security risks and ensure continuous protection of corporate data and devices.

App Store

Two-Factor Authentication (2FA)

Two-Factor Authentication (2FA) enhances the security of your eScan Cloud web console by requiring two-step verification before granting access. Unlike single-factor authentication methods, 2FA adds an extra layer of protection, significantly reducing the risk of unauthorized access and safeguarding your sensitive data against potential threats.

Enterprise Play Store

Enterprise Play Store

This module enables direct app deployment from the Enterprise Play Store and iOS App Store within the enterprise environment. IT administrators can define and apply custom Managed Configurations for each app to align with organizational policies. Apps can be silently installed or uninstalled on managed devices without user interaction, ensuring a streamlined user experience. Additionally, in-house apps can be securely uploaded and distributed to managed endpoints for complete control over the mobile app ecosystem.

Content Library

Content Library

This will allow the administrator to deploy documents to the managed devices through the web console. The document types that are supported for deployment are PDF, DOC, DOCX, XLS, XLSX, PPT, PPTX, TXT, JPG, JPEG, PNG, and BMP. You can use this feature to share work related documents across multiple devices at the same time.

Anti-Theft

Anti-Theft

eScan EMM’s Anti-Theft feature make it possible to recovery of device in case of loss/ stolen preventing it from being misused. Admin can remotely wipe all the data available on device and also block a device. It allows to send a message on stolen device as per requirement. Additionally admin can remotely execute commands such as Scream and Locate through eScan Anti-Theft Portal.

Geo-Fencing

Geo-Fencing

The Geo-fencing feature in eScan's EMM allows administrators to set virtual boundaries ranging from 100 to 5000 meters. When a device enters this area, the configured security policies are automatically activated and are deactivated as soon as the device leaves, ensuring real-time and flexible protection.

LOAD MORE FEATURES

Other Highlights

  • Deploy, manage, and protect Company-Owned Devices (COD) and Bring Your Own Devices (BYOD).
  • Implement various device controls on user’s device remotely.
  • Install/Uninstall applications on devices without user intervention.
  • It allows admin to define and set the customized passcode policy for the enrolled devices and work profile.
  • Allows enrolled devices to connect only to the listed Wi-Fi networks.
  • Secure data and resources and enhance user’s productivity.

*Note: Not all features are available on all platforms.

 

Will Your System Support This Software? You can find it here…

Pre-requisites for eScan Enterprise Mobility Management (Android Enterprise)
Server


Before installing eScan ensure that the following pre-requisites are met:

  • Access to computer as an Administrator.
  • Uninstall the existing Anti-Virus software, if any.
  • Check for free space on the hard disk/partition, for installing eScan.
  • Public IP address for eScan server.
  • SSL and CA certificate
  • A Google Account.
Note: Note: This account should be a personal account, not an account associated with G Suite or other managed domain accounts.

Operating Systems:

Android Endpoints Platforms Supported:

  • Android version: 7.0 and above
  • Storage: 50-60 MB

iOS Endpoints Platforms Supported:

  • iOS version: 12.0 and above
  • Storage: 50-60 MB
Note: Rooted and Jailbroken devices are not supported.

Windows Server and Endpoints:

  • Microsoft® Windows® 2022 / 2019 / 2016 / 2012 / SBS 2011 / Essential / 2008 R2 / 2008 / 2003 R2 / 2003 / 10 / 8.1 / 8 / 7 / Vista / XP SP 2 / 2000 Service Pack 4 and Rollup Pack 1 (For 32-bit and 64-bit Editions)

Hardware Requirements for eScan Server:

  • CPU: 2GHz Intel™ Core™ Duo processor or equivalent
  • Memory: 4 GB and above
  • Disk Space: 8 GB and above

eScan Management Console can be accessed by using following browsers:

  • Internet Explorer 9 and above
  • Firefox 14 and above
  • Google Chrome latest version
Live Chat
Top