Billed Annually
$Superior Value
$Low Cost
$Great Value
$Unique Value
Device takeover Complete control over mobile device from afar.
Resolution scriptsSingle click navigation / installation / textual / advanced resolution scripts.
Remote control facilitiesDiagnosis; data and apps management; chat; on-screen drawing.
Assets managementCentral management console; groups and ownership management.
Security managementPassword policy; locate, lock, wipe, selective wipe backup and restoration.
Mobile applications managementMandatory apps; prohibited app; recommended apps; lockout.
Mass deploymentMass configuration; mass files and apps distribution.
Usage controlDynamic groups driven usage plans; usage monitoring via device counters.
BYOD managementApps, browser and use restrictions management based on time and location.
Browser controlProhibited sites and allowed only web browsing.
Standard containerizationSecure messaging; view only SharePoint’s files.
Launcher'Kiosk' mode lockdown.
Branding managementMass configuration of device home screen: wallpaper; apps & icons; bookmarks.
On-device care applicationServices tests; hardware tests; connectivity test; navigation short-cuts; anti-malware tool.
Community supportInvite a contact for collaborative support; complete remote control by the invited contact.
Backup and restoreSingle click back-up of contacts and messages; single click data restoration; restoration between various mobile operating systems.
Advanced containerSecure access to corporate email, calendar, contacts, documents and internal web apps via a Check Point container
Encrypted voice callsEncrypted voice communication between enrolled devices
Contained text messagesEncrypted text messaging between enrolled devices.
Custom firmwareA dedicated firmware for better security enforcement.
Hardened deviceHardware and firmware which have been engineered to work together from the ground up to offer exceptional security.