InterNoded announces IMDM 4.0 - gives enterprise customers the industry?s first on-device verification tool for deploying mobile applications, monitoring device health, and supporting compliance
InterNoded, the leader in mobile device InterNoded lifecycle management, today announces the newest release of its flagship product, InterNoded Mobile Device Manager (IMDM) version 4.0. This release delivers innovative technology that accelerates mobile application deployment across the enterprise and ? with the help of the new IMDM Inspector ? allows companies to easily monitor the health and status of wireless devices across the enterprise while heightening security and lowering operational costs.
Built from the ground up to support leading wireless middleware platforms, including BlackBerry Enterprise Server, Windows Mobile, and Good Mobile Messaging , IMDM 4.0 gives end users fast, hassle-free activation on their choice of device. Enabled for any carrier, the IMDM Self-Service User Portal allows end users to activate and reset passwords, as well as provision, upgrade, re-activate, or wipe their wireless devices and applications without Help Desk intervention. A rules-based framework maintains IT control and reduces human error. Integration with the corporate directory enables automated security policy and application distribution on each device, based on each user?s corporate profile.
The new IMDM Inspector, a lightweight, client-side application, proactively reports device status to the IMDM Server, allowing IT to see exactly which applications and security policies sit on each device and enforce compliance to corporate security policy. Its detailed view into individual devices shortens Help Desk call duration. With full knowledge of device contents and settings, Help Desk analysts move more quickly from problem to solution.
?As mobile workforces grow, increasing amounts of sensitive enterprise owned data are deployed to mobile devices,? said Michael King, Research Director at Gartner. ?Cost-effective management of these devices, coupled with consistent security policy enforcement, must become a priority of all enterprises.?