barscaret-downcaret-leftcaret-rightcaret-upcheckchevron-leftchevron-rightfile-pdfinfosign-in-altsignin text-widthtimesyoutube

Features

Secure devices and data

Miradore mobile device management (MDM) solution helps you ensure mobile device and data security as well as data compliance across the organization. Easy ways to protect company data include separating business and personal use, enforcing safe passcodes and screen locks, and allowing your platform to encrypt all confidential content.

Device security with Miradore

Miradore device and data securityBackground Image

Strong screen lock passcodes help protect mobile devices and data. Miradore enables you to deploy a passcode policy in all managed devices so that passcode usage is not left for the device user to decide. The policy enforces the users to set a passcode that meets your pre-defined complexity requirements.

One of the EU’s data protection requirements (GDPR) is to wipe sensitive information from devices when they are lost or stolen. With Miradore, you can remotely and selectively wipe company-related information while leaving personal data untouched. This is particularly useful if your company has a BYOD policy and both personal and business data is included in the devices.

Miradore enables you to set storage encryption requirements on the managed devices with the users’ consent, depending on the manufacturer’s support. Encryption helps protect data storage in the event of theft or confiscation.

Security breaches and data leakages can also be prevented with automated patch management that helps keep devices up-to-date and secure.

Data security on Android

Miradore allows work profiles on Android devices to create a secure container for work data that is separated from private applications. By enabling work profiles, organizations can manage meaningful business data and applications but leave other content on the device to be controlled by its user. As an administrator, you’ll control the work profiles, and work-related items are distinguished from personal applications by labeling. You can remotely manage the work containers and deploy application silently.

Work profiles are particularly important if your company supports the use of personal devices at work (BYOD). For example, you can make sure that work-related contact information does not leak out via private instant messaging applications.

Data security on iOS

There are over 90 restrictions supported by the Apple iOS platform. In addition to those related to applications, functionality, iCloud, and media content, available security and privacy restrictions include denying erase all content and settings and denying passcode modification. Restriction configuration profiles can be applied to all Apple iOS devices that are managed with Miradore.

Many of these security and privacy restrictions require that the devices be in Supervised mode. IOS devices can be set into Supervised mode by either enrolling the devices using Apple Device Enrollment Program (DEP), which is supported by Miradore, or by enrolling the devices via Apple Configurator.

Miradore’s lost mode security action for iOS helps secure managed devices when they are lost or stolen. When the lost mode is enabled on a device, the device is locked and can’t be used until it is found and lost mode is disabled by the administrator.

RIBW AVV

“Security is clearly a big issue for us and Miradore helps us to protect our devices – not just in case of theft or loss but also through device encryption.”

Ton Garretsen, RIBW Arnhem & Veluwe Vallei

Read the story

“We use Miradore as part of our security management. Miradore allows us to manage devices centrally and we are able to respond to IT updates more quickly. It also allows us to install and remove applications remotely on all our devices.”

DDC Multilingual Solutions

DDC Multilingual Solutions logo
Chesapeake regional healthcare logo

“One of our iPads went missing and we were able to find it with the help of Miradore. We used Miradore’s Map feature to locate the device and found it in the employee’s car, under the driver’s seat. We were extremely happy that we didn’t have to replace the missing device with a new one.”

Jim Durkin, Information Security Officer, Chesapeake Regional Healthcare

Learn why choose us