Mobile device management

MDM is only part of the story

Near or at the top of the to-do list for practically every agency network administrator these days is to find and implement a mobile device management (MDM) platform that fits with their organization’s “bring you own device” (BYOD) policy. But MDM often is only a part of an overall solution, which might include elements such as application management, document control and, of course, security. Even a good MDM solution might not end up being usable if it doesn’t mesh well with existing systems.

XenMobile MDM from Citrix may help by letting network administrators monitor and control the use of mobile devices and configure the policies that govern them. It allows admins to provision devices automatically, blacklist or whitelist apps, detect jailbroken devices and lock and wipe devices remotely. It will work with every major mobile platform, including iOS, Android, BlackBerry, Symbian and Microsoft Windows 8.

Registering a device can be done from the client's device by running the enrollment app. The MDM can be set to push certain apps to the device upon enrollment and can be set to allow only certain other apps to be installed. Decommissioning works just as easily. When a device is unenrolled from the admin control panel, all apps that were pushed or otherwise installed through the MDM are uninstalled, leaving the device as it was before enrollment.

XenMobile MDM can be run on an in-house server for maximum security or on Citrix’s cloud servers when cost is the highest priority. Citrix will also help admins set up a hybrid solution that will use a little of both where appropriate.

Citrix is also offering XenMobile MDM as part of its Mobile Solutions Bundle for Enterprise Mobility Management. This suite also includes the company’s CloudGateway product and expands the solution to fully cover app and data management in addition to MDM. The bundle provides secure e-mail, browser and security for data sharing apps. It will also install and run apps within a container separate from the apps and data on the rest of the device, and it has a provision for running a secure enterprise app store.

For more information, visit the Citrix website.

About the Author

Greg Crowe is a former GCN staff writer who covered mobile technology.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected