[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

3LM

Company

Owners

History

2011

Company 3LM, Motorola Mobility affiliated enterprise, provided on October 10 console software for control of corporate servers, designed to ensure safety of mobile phones and tablets on a basis of the operating system Google Android.

The market is captivated by dozens of decision makers for control of corporate devices (enterprise device management — EDM), including such players as Good Technology, MobileIron, Enterproid and Zenprise. Research in Motion company provided popularity of this segment, having released software for control of corporate BlackBerry Enterprise Server devices together with the BlackBerry smartphones.

However many enterprises pass to the iPhone smartphones of development Apple or to Android device of Samsung, HTC and Motorola companies which gradually force out BlackBerry. Sometimes it is not a question of the choice: the staff of many organizations often forced IT managers to create EDM providing, using the personal iPhone and Android smartphones for the corporate purposes.

Naturally, all leading players of this market already make EDM providing for Android and iPhone (and even for iPad). However if solutions of these producers ensure safety of devices at the level of applications, then founders of 3LM Tom Moss and Gorav Matur decided to develop software at the level of the operating system that means the improved opportunities for management and security of devices.

Here some functional characteristics of solution 3LM:

  • enciphering of the device, including complete enciphering of an internal memory and the SD carrier and also selective enciphering of corporate applications;
  • setup of "white" and "black" lists of applications and access control of annexes to corporate resources;
  • forced application of passwords;
  • complete and spot erasing of data on devices;
  • integrated management of devices, OS and applications and ensuring their security;
  • possibility of remote installation of corporate applications and ensuring their permanent presence on the device and also remote uninstallation and shutdown of applications;
  • determination of location of the device and tracking of navigation;
  • remote access to internal resources of the enterprise and chosen domains;
  • remote check of a status and status of the device;
  • appointment to each device of the unique IP address for its tracking as endpoint of network.