Enterprise Device Management (EMM, EDM, MDM)

LimRAD Enterprise Device Management Overview


LimRAD Platform EDM (EMM and MDM) Module enters the basic platform by activating it with the license on it.

It uses a license to include each mobile device in the system. Supports Windows, Linux (Pardus and Ubuntu), Android, Apple IOS, OSX Operating Systems.

Mobile devices with Android operating systems provide full control of management in closed circuit networks. For communication, the user device prevents the data from being sent to the internet using its protocols between the server. The device can be implemented as an administrator or a profile manager. In addition to its standard security policies, it also provides advanced security policies. Through the agent architecture in the process of inclusion, the end-user also offers an application that allows the user to produce own solutions within specified limits without the need of operator support through this advanced guiding tool.

Apple is provided with Apple APNS for communication on devices with IOS, OSX operating system. All control is provided by the operator within the possibilities of the operating system. Communication is provided via Apple servers. During the startup process, the certificate distribution is provided through the LimRAD Auth Platform Server. The user-guided tool is first installed on the mobile device and all permitted security policies are provided through the agent.

Security policies can be set on the role structure that can be obtained from identity databases integrated with advanced role-based architecture.

The communication of the devices in all conditions is provided on SSL. For this reason, data security is always kept at the highest level.

Supported User Databases
IPv6 Feature
Device Enrollment
Easily enroll your devices. Easily manage your Apple IOS, Android, Windows, Linux devices.

Enroll with NFC, QR, SMS, E-Mail
App Management
Easily install applications on all your devices. Edit your users' application access. Send settings from your center for your supporting applications.
Assest Management
List the applications on the devices. Learn about the hardware of your devices. Share this with other inventory applications through the API.
Security Management
Group your devices. Define different security policies for each group or device. Turn off any hardware resources that you do not want to be used.