Mobile Device Management

Comodo ONE Mobile Device Management (MDM) capabilities allow you to deploy or retire, secure, monitor and manage Android or iOS mobile devices with GPS location, wipe, and device encryption. Distribute applications, manage data and configuration settings and patching with the complete visibility and controls you need to manage any mobile device that accesses business-critical data.

Get it Now

Simplified MDM enrollment for users

A seamless setup process allows users to instantly enroll their devices in MDM as soon as they power on their mobile devices. Easy-to-follow mobile policy guidelines address privacy concerns.

A self-service portal allows users to manage common tasks, such as adding or retiring devices without IT assistance.

Visual privacy policy guidelines help users understand how MDM protects their personal information on mobile devices.

Automated device configuration
reduces help desk calls

Comodo ONE simplifies device setup to reduce help desk calls. With a few clicks, registered devices are automatically configured with corporate connectivity settings, email profiles, and device-specific restrictions.

Help users immediately connect over corporate Wi-Fi and VPN profiles.

Provide secure access to business email with support for Exchange, POP, and IMAP accounts types.

Deploy required enterprise apps and make approved IT curated business apps available via enterprise app store.

Secure connectivity and mobile access control

Comodo ONE MDM has identity and access management capabilities that give IT visibility and control over mobile devices that access sensitive information. MDM gives authorized users secure access to business resources without manually connecting through a VPN, re-entering passwords or other disruptive tasks

Leverage existing identity stores such as Active Directory

Prevent man-in-the-middle exploits with certificate based authentication

Simplify secure access to business data through per-app VPN

Block any noncompliant or jailbroken mobile device from accessing corporate resources

About Mobilie Security: Threats and Countermeasures
Enforce security policies and monitor device compliance

Granular policy settings and compliance configurations allow you to adapt security to match your exact business requirements. An intuitive policy engine stablish helps enforce a consistent mobile device security framework.

Enforce device passcode settings

Protect data with device encryption and data loss prevention settings

Quarantine or wipe specific business data from non-compliant devices

Meet regulatory guidelines defined by CJIS, HIPPA and PCI standards

Android Device
Accelerate business processes with a mobile-aware enterprise

Comodo ONE Mobile Device Management integrates with other IT systems such as corporate directories (Active Directory/LDAP), IT service management software, and network access control (NAC) systems to create a mobile aware IT infrastructure.

include any partner benefits
76Bits Logo

Based in Hammersmith, London, 76BITS designs, delivers and maintains IT solutions for customers across South East England, as well as Finland and Thailand. For nearly 20 years, 76BITS has been supporting businesses and helping them make the most of available technology to deliver increased performance, efficiency and reliability - from network design to maintenance and upgrades.

"We are a small managed service provider in the U.K. that focuses on serving our customers with the very best IT experience possible - be that computer repairs, maintenance or security. We are currently taking full advantage of the remote management and monitoring module of Comodo One, which enables us to monitor our customers and service them faster. By having access to a proven, free service management tool like Comodo One, we can grow our business by automating tasks without sacrificing service or performance." Mr. Mikael Berglund, CEO, 76BITS