top

Introduction

With increasing adaptation to BYOD, organizations are sensitive to the security of the data on the mobile devices. Device owners are also increasingly concerned about the security of data, and security of transactions. Spring CT works with various enterprise security and device security companies helping them develop products related to mobile device management, containerization and virus/malware protection.

Expertise
frameworks
Frameworks like Apple MDM, Google for Work, Samsung KNOX, Microsoft MDM
Launchers Secure Launchers apps, app wrapping/containerization
browsing Secure browsing, secure chat, secure emails, secure editors and other secure clients
network Expense Management, network usage monitoring, call/SMS logs and blocking
Remote Remote device administration/ troubleshooting, device profiles, user management, alert mechanisms, remote lock/wipe, passcode management
Security Security aspects like encryption, VPN and DLP controls
protection Data security, virus protection, malware scanning
profiling Location based risk profiling, geo-fencing, time-fencing
Device Device performance monitors (cpu/memory/battery)
Location Location tracking with minimal power consumption
synchronization Personal data synchronization with data backup servers