Uncategorized

Third-Party App Analytics Reporting in 42Gears UEM

App analytics is a critical feature to gauge application performance and usage across devices, locations and customers. Understanding application activity has now been made easier with Analytics Report option for third-party app integration offered by 42Gears UEM – SureMDM. 42Gears UEM offers app analytics and device data usage analytics at one place, negating the need…

Read More

Remotely control your Linux-based IoT Gateways

42Gears UEM started supporting Linux devices in August, 2017 and have been enabling IT pros to manage Linux-based devices remotely and it now supports remote management of IoT endpoints through Linux-based IoT gateways with its latest update. Once an IoT gateway is set up on a Linux device and SureMDM Nix Agent has been installed…

Read More

EMM Security with Multi-Factor Authentication and Single Sign-On

Enterprise setup where multiple business applications are used, often face data security and app management related issues. Company-wide security policies can ensure compliance, enhance security and also provide digital convenience for employees. Two security policies which offer comprehensive, yet flexible business and data security are Single Sign-On and Multi Factor Authentication. Single Sign-On (SSO) is…

Read More

Evolution of iOS platform for Enterprises

Apple began its journey with consumer focus products such as iPad and iPhone in 2007. But as these devices find their way in workplaces, Apple began to also increase their focus towards enterprise adoption. With the first iPhone released in Jan 2007, Apple added few features for corporate use like built-in VPN client, but it…

Read More

How to restrict FaceTime on iPhones and iPads using SureMDM

FaceTime, the audio-video calling application were developed by Apple for iPhones, iPads, and Macs. It is often used as an alternative to Skype and other video calling applications by many businesses as it doesn’t require a specific username and can function right out-of-the box with it’s built-in setup. FaceTime facilitates high definition videos and requires heavy…

Read More

42Gears Commitment to General Data Protection Regulation (GDPR)

On May 25, 2018, the European Union’s new privacy law, General Data Protection Regulation (GDPR) comes into effect and will apply to the EU individuals, no matter where their data may reside. GDPR applies if any organization collects, records, organizes, stores, or performs any operation on personal data of individuals in the European Union —…

Read More

Why Enterprises Should Make the Move to Android Fast

The rugged handheld device industry is undergoing a major shift. Windows has been the mainstay OS for rugged devices for more than a decade. However, with Windows announcing its decision to wind down support for legacy operating systems such as Windows Embedded CE 6.0 and Windows Embedded handheld devices, enterprises must quickly review their options…

Read More

SureMDM Custom Nix Agent for quick and easy enrollment

With SureMDM, it is quick and easy! SureMDM’s Custom Nix Agent feature makes mass deployment of mobile devices faster and easier. Using the custom Nix Agent, you no longer have to enroll each device into SureMDM using QR Code or enter the SureMDM Account ID manually. You can simply install your  Custom SureMDM Nix Agent…

Read More

Extensive Mac Management with SureMDM

42Gears has expanded its UEM framework to offer support for macOS. Enterprises can now incorporate Mac devices into their digital workspace, controlled by the management features offered by 42Gears UEM solution – SureMDM. Mac management becomes easy with features such as Profile Restriction, Blacklist/Whitelist Apps, Wi-Fi Configuration, Exchange ActiveSync and Mail Configuration. Use cases of…

Read More

How to Whitelist Wi-Fi using SureMDM

Mobile devices are at risk when they connect to unknown, unsecured Wi-Fi networks. Devices exposed to unsecured networks are vulnerable to network and security threats such as Eavesdropping, Man in the Middle, Phishing and WEP/WPA attacks. These are detrimental to device security, settings and stored data/files. Whitelisting Wi-Fi provides an added layer of protection to…

Read More