Smartphones are ubiquitous. They are used by teenage girls and septuagenarian CEOs alike. Because of their versatility, today’s smartphones have numerous use cases in the enterprise & small business sector. It is no surprise then, that there has been an explosion in the corporate use of mobile devices, over the last 4 years. Be it a corporate owned iPad, or an employee’s own Android smartphone - all of them have their place in today’s workplace. Because this trend has emerged so suddenly, there are a few minor kinks surrounding the use of these devices in the workplace.
As spammers, identity thieves, corporate vandals, “activist” hackers, and other culprits get smarter, the smartphone is quickly becoming a prime target. Think of all the sensitive data stored in the inbox of an employee, for instance. Wouldn't it be easy to steal this data given physical access to a phone? There are many other sophisticated, electronic methods of snooping on this data as well. It is remarkably easy to get malicious applications onto Android smartphones and jailbroken iPads alike. Then there is the problem of employees using the entertainment features of the device during productive hours. Access to a device camera can even help facilitate knowledge transfer to unintended recipients.
Codeproof was developed to help solve these problems. Codeproof is a powerful and easy to use application that helps IT admins secure BYOD & corporate owned devices. With Codeproof, you can set administrative policies (such as turning off device cameras, blocking the appstore, enabling privacy controls, or restricting other features to enable kiosk use), detect jailbroken devices, scan installed apps for viruses, secure & monitor ActiveSync, track the GPS location of stolen devices, deploy apps to multiple devices, or remotely wipe all data stored on a stolen device.
Unlike other mobile security applications, Codeproof requires minimal setup time. There are no digital certificates to install, and servers to install on company computers. Setup merely involves signing up online at www.codeproof.com, and then installing the Codeproof app on devices. The user friendly web console requires absolutely no training or prior knowledge to operate. Simply click to track down the physical location of a stolen device. Another click, and you can delete your sensitive data before it falls into the wrong hands. Here's a step-by-step guide for setting up Codeproof.
The signup page provides information about price plans, and then leads to a small form to fill out.
Click create account, and complete payment processing.
Installing the app is just as easy. Go to the app store of your Kindle Fire, or any iOS or Android device, and download Codeproof. Can’t find it? Click here.
Launch the app on the device to register it using your Codeproof account.
Now you can log in to Codeproof’s Mobile Device Management (MDM) Web Console to manage all your company’s devices in one place.
Since Codeproof runs on Amazon’s servers, the service comes with the same legendary reliability and performance. Being hosted in the cloud also means you never have to worry about keeping servers updated, and about how to push changes out to individual devices. If the device is online, it will connect to the Codeproof service in the cloud seamlessly.
Codeproof believes that the only way to make our devices secure and productive in the workplace is to make the process as simple as possible. Don’t you agree?