Management of authorized applications for the user, tablet and smartphone locking. Secure browser
Hardware, software, registry keys, etc.
Monitoring the proper operation of a device, sending alarms in the event of an anomaly
Password, access control, blocking functions, setting up connections
On-going or one-off geolocation of managed devices, displaying maps of geolocation readings
Installation and updating of business applications, software, programs, executable files, service packs, etc.
Real-time or planned sequencing of data flows (sending and receiving files, synchronizing files and SQL)
Applications, office automation data, etc.