Product description
Manage a fleet of devices with a cloud-based EMM solution that increases business efficiency and secure corporate data. Knox Manage can manage any Android, iOS or Windows 10 device, but is most secure on Samsung Galaxy devices integrated with the Knox platform.
Product features
- Multi-OS support
Your organization's sensitive data is in a state of constant flow, as everyone from your CEO to your most junior employee accesses corporate emails, customer records, and financial information on a range of devices with different operating systems. Knox Manage empowers IT admins with a cloud-based command center, from which they can remotely manage devices across multiple operating systems. These include the full range of Samsung devices on Android, Tizen, and Windows 10, in addition to support for other smartphones and tablets running iOS, Android, and Windows 10. - Robust manageability
Smartphones are portable powerhouses, but with Knox Manage, an enterprise can restrict how these devices are used to prevent the leaking of confidential business data by employees performing unintended actions. More than 280 policies are available, including whitelisting and blacklisting apps and websites. IT admins can also manage devices based on pre-defined events - for instance, blocking access to cameras on employee phones during work hours, or establishing an exception policy to a specific user for a certain length of time. - Event-based management
Apply different policy sets based on time, when a specific app is running, and more. - Device location tracking
With user permission, monitor device location periodically. - Restrict to work app
Knox Manage allows admins to lock the device to a specific app through kiosk mode. - Remote IT support
Real-time device monitoring allows IT admins to track the current GPS-based location of all managed devices (with employee consent), and message all device owners without needing their phone numbers.
If an employee encounters a problem while out of office, they can authorize IT admins to request direct access their device for easy troubleshooting. This allows IT admins to quickly help employees get back to work. And if a device is reported lost or stolen, IT can remotely locate it, lock it, reboot it, and wipe its content.