Absolute Software AMMD-GD-EDU-24 Leaflet

Page of 2
www.absolute.com
Absolute Manage Mobile Device Management
FOR ENDPOINT MANAGEMENT
If you’re responsible for managing the mobile devices in your deployment, then you probably 
have one of the most difficult jobs in your organization. Odds are you’re charged with managing 
a diverse group of smartphones and other devices on a variety of operating systems – creating 
order out of chaos.
The challenge with mobile devices and smartphones is navigating within an ever-changing 
landscape of devices and operating systems. Especially when you consider that many 
employees bring their own devices to work or request a specific type of device through IT. 
And when it comes to user requests, the devices that top the list are Android and Apple iOS 
(iPhone
®
, iPod touch
®
, and iPad™).
So how do you ensure these devices (and the data they contain) are properly maintained and 
secured?
Absolute
®
 Manage Mobile Device Management (Absolute Manage MDM) can provide you with 
the technology to remotely manage the mobile devices in your deployment. Now, you can 
wirelessly (over 3G or Wi-Fi) configure, query, and even wipe or lock managed devices.
IT Administration – Consolidating Skill Sets
For most organizations, ultra-portable devices tend to fall outside standard IT processes. The 
result is often a silo of domain knowledge with only a subset of IT administrators designated as 
the experts on the team. This division of skill sets is further compounded with IT administrators 
using either a PC or a Mac to perform their work.
With Absolute Manage MDM, all of your IT administrators can be mobile device experts. 
This is because Absolute Manage technology is designed to work within a Windows or Mac 
infrastructure. This allows administrators to use a Mac or a PC to manage all devices for a single, 
consolidated skill set across the team.
Fig 1 – IT administrators can manage Apple and Android devices from a Mac or a PC
Security, Change 
& Configuration
Automated 
Patch
Apps 
Management
Power 
Management
Asset 
Inventory
Computer 
Imaging
Intelligent
Track and located unauthorized apps. Block  
non-compliant devices from accessing the network. 
Control how and when users connect with sensitive 
corporate data.
Automated
Efficiently manage all of your in-house custom apps. 
Automate time-consuming configuration and profile 
work.
Cross-Platform
Provide IT administrators with a choice of a Mac or 
PC interface to manage mobile devices.