© 2018 by XCome Technology Co., Ltd.

Empower your mobile
security & productivity

Bulk upload to speed up the enrollment process

Flexible profile for configuring and managing your Android device 

Central management with intuitively operable cloud-based EMM

Secure your devices against theft and unauthorized access

Are you tired of the generic EMM solutions?

Try XCome EMM to enjoy a fully control mobile environment.

Does your enterprise rely heavily on mobile devices to keep the business running including smartphone, tablet or other android devices/equipment? XCome provides the standard EMM solution which enables central management to secure, monitor, manage, and support mobile devices deployed across enterprises.

 

XCome EMM offers a comprehensive, user-friendly and flexible setup solution to provide your employees with the tools, resources, and content they need to achieve their objectives while maintaining the security your business requires.

 

Moreover, we are experts in helping to customize the enterprise EMM solution. "You don't need to put up with the inflexible and generic EMM solution and to cost them a lot of budgets anymore". Reach us for tailor-made a fully managed mobile environment.

Enterprise Application Integration

Integrate with your enterprise resource via a variety of network protocols

SSO (Single Sign-On)

Give your employees the freedom of Single Sign-On while keeping the control and enhanced security. With this property, a user logs in with a single ID and password to gain access to a connected system or accomplished using the Lightweight Directory Access Protocol (LDAP).

APN (Access Point Name)

APN is a setting on mobile phones that the phone's carrier uses to set up a connection to the gateway between the carrier's network and the internet. Many service providers globally provide a private APN service to large customers, enabling them to separate their data traffic from that of customers.

VPN (Virtual Private Network)

VPN is a setting to allow the access requirements on a mobile device. It is critical that all connections to your enterprise environment do so through a VPN and setting the policies on behalf of the user makes it that much easier for the user to be in compliance with your policies.

Global HTTP Proxy

Global HTTP Proxy is a setting to ensure that all the HTTP network traffic is passed only through it. This ensures data security since all the personal and corporate data will be filtered through the Global HTTP proxy.

Firewall

The firewall protecting your enterprise EMM platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support MDM server and platform functions.

Mobile Device Management

Enable to manage & secure the device fleet remotely

Device Functionality

Enable to set up the basic mobile phone functionality, such as camera, microphone, SD card, screen capture, firmware recovery…etc. It helps the enterprise to prevent any leakage of business or product confidential.

Hardware Restriction

Enable to limited use for the status bar, task manager, turn off the device buttons or Keys. These restrictive features are especially suitable for the mobile devices being set up as KIOSK mode so that it will become an information panel where displayed on the front desk or public area.

Certificate Management

Mobile device certificates enable businesses who rely on the internet and its ecosystem to perform authentication and prevent unauthorized access to the corporate system and network. IT admin can upload, push and manage the certificate remotely.

Passcode Policy

To enforce password security, IT admin must be absolutely certain that everyone who accesses your corporate data with a smartphone has a password set on the device. This configuring set enables to setup password policies for enterprise mobile devices.

Device Security

IT admin can make appropriate disposal for those losing devices for preventing the leakage the business confidential by using the EMM functions such as remote lock, remote wipe, remove file/directory, restore factory settings.

Sync & Storage

Make sure all your important data is always synced and protected. IT admin can set up the policy to enable mobile phones to backup the APP and its specific data, calendar, files to cloud storage automatically.

Wireless Communications Management

Ensure safe communication for enterprise mobile devices to avoid malware attacks

Telecommunication

Monitors, blocks, and logs for calls, SMS, and MMS sent to and from devices based on user policy. The EMM platform also supports to restrict the phone call only allowing to dialup to the contacts pre-build in company phone book.

Network and Roaming

Wireless network security is always a critical component of enterprise mobility strategy. To make sure you have policies in place to keep your employee and your enterprise data safe. The EMM platform enables the user to easily configure the policy for airplane mode, background data, Wi-Fi, roaming and do not disturb node settings.

NFC & Bluetooth

NFC & Bluetooth is a wireless communication to enable the handheld device to transmit data, stream music or make payments contactless and wirelessly over a short distance. The EMM platform enables you to manage all types of wireless communication to protect not only the device and its data at rest but the entire.

Tethering

The device can connect to the mobile phone or tablet via tethering in one of the three ways - Wi-Fi, Bluetooth, and USB. These registrations enable you to make sure the integrity of mobility management strategy.

Location Tracking

The policy of location tracking enables administrators to track the location of your enrolled devices on-demand. This setting can provide answers to questions like where and when–based on device activities, enforcing a level of security and control over the device. It particularly suitable for fleet management and salesforce tracking.

Mobile Application Management

Provisioning and Controlling access to internally developed and
commercially available mobile apps.

Application Distribution

Maximize the deployment of mobile applications on the employee or company-owned devices.

Enterprise APP Store

Enable to upload & manage your enterprise mobile apps in basic/advanced store layout

App Repository

Enable to configure and manage all mobile APPs, such as disable, hidden and remove…etc.

BYOD

BYOD is a part of a specific corporate EMM policy in which an organization agrees to support personal mobile devices or even provides a stipend to employees to purchase a device.

Advanced EMM Management

Advanced EMM functions allow administrators to define
conditions and actions exhaustive for the user behavior.

KIOSK Application

The mobile devices also allow being setup as KIOSK mode remotely by a fixed app or multiple apps. It is ideal for use as a sales promotion display panel by using Android devices.

Schedules

The schedules simply put the profile installation on a schedule. It enables you to control when each device profile is active.

Mobile Content Management

This strategy enables employees to securely access critical enterprise data and collaborate with other employees on any network or mobile device.

Web Management

Allows configuration of white-list and blacklist URLs to avoid access to harmful websites. This configuration can also be used to set up home pages and website shortcuts.

Geo-Fencing

Geo-fences identify when a device enters and exits a secure area. Administrators can use it as part of a mobile device management (MDM) strategy.

Report and Logs

The EMM platform collects the logs to help administrator for analyzing the events and generating the reports.