Tech

Managing App Screen Time and Data Usage: A Closer Look at Entgra UEM’s App Usage Configuration Policy

Photo by Mateusz Dach on Pexels

Device admins who do not use a centralized device management platform face daily challenges. They must manually configure each device – a time-consuming task that can lead to mistakes. Security becomes a major concern too. Without effective device management, enforcing security policies and keeping devices up-to-date is difficult, leaving them vulnerable to cyber threats.

But perhaps the biggest challenge of all is managing data usage. With smartphones and tablets being used for both personal and corporate tasks, excessive screen time and data usage can lead to lower productivity, slower device performance, security risks, and high data charges. A device device management solution helps address all these issues, making life easier for IT admins and ensuring smooth, secure, and cost-effective device management.

Entgra UEM offers a comprehensive suite of Mobile Device Management (MDM) capabilities to simplify administration and improve your mobile device management experience. In this blog, we’ll discuss how Entgra UEM’s App Usage Configuration policy effectively tackles the high screen time and data usage issue.

App Usage Configuration Policy

The App Usage Configuration Policy stands out as a versatile tool for managing screen time and data usage of individual applications on your Android devices. Use this policy to achieve optimal device performance and data security. 

So, what’s really exciting about this policy is that it lets you control how much data each app uses and even restrict their access when you’re on a metered network. Let’s explore how you can use this policy for each scenario in detail. 

Option 1: Network Usage Configuration Per App

You can set specific data usage limits and network restrictions for individual apps so that you have precise control over how much data each app can use and which networks they can access.

Here’s a breakdown of its key components:

  • Setting Data Usage Limits: Set data usage limits for individual apps, ensuring efficient data management and cost control. Simply specify the package name of the application and allocate a specific amount of data within a defined time period (e.g., monthly) for the selected app.
  • Network Restriction Options: Enforce data usage limits for mobile data, WiFi, or both, adapting to various network environments and usage scenarios. This flexibility ensures that data usage policies are applied consistently across different connectivity types, improving resource utilization.
  • Post Actions for Exceeded Limits: Take control when data limits are exceeded with customizable post actions. Enable notifications to alert users when their data limits are reached, promoting awareness and responsible data usage. You can also automatically hide apps to prevent further access until the next billing cycle.
  • Custom Billing Dates: If your organization follows specific billing cycles, you have the option to specify custom billing dates. This allows you to set the billing date for accurate tracking and enforcement of data usage limits aligned with your organization’s billing practices.

Option 2: Block Apps from using Metered Connection

This is the solution to use when your device is using a network with metered or limited data usage. It helps to conserve bandwidth and prevent unexpected data charges, especially in scenarios where data usage must be tightly controlled.

These are the key components:

  • Simple Configuration Options: You have the flexibility to specify the applications you want to block by providing their names and package names within the policy settings. This gives you precise control over which apps are restricted from using metered connections, ensuring efficient use of network resources.
  • Post Actions: Similar to the other option, you can choose to hide applications or send notifications when a specified app is blocked from using a metered connection. With the option to hide applications automatically, you can keep your environment secure by preventing unauthorized access to restricted apps. 

As you can see, our enhancements to the App Usage Configuration policy in Entgra UEM give you an easy, convenient way to manage app usage in your organization.  By setting data usage limits and network restrictions per app, you gain the power to fine-tune how applications consume data, ensuring peak device performance and cost efficiency. And with the ability to block apps from using metered connections, you can safeguard bandwidth and prevent those dreaded unexpected data charges—ideal for environments where every small saving matters.

Check out the exciting features of our latest version here. If you’re curious to learn more about Entgra UEM’s comprehensive endpoint management features, start your 14-day free trial today. 

Entgra UEM 6.1’s Allow Input Methods Policy for Securing Android Devices

Image by andrew_derr on Freepik

Entgra UEM serves as your comprehensive solution for managing all aspects of Android devices in your workplace. Whether it’s setting up devices, implementing security protocols, or installing apps, Entgra UEM has got you covered. With features like encryption and remote device wiping, your data remains safe even if anyone misplaces a device. Furthermore, real-time monitoring ensures prompt detection and resolution of any issues. 

We have introduced the Allow Input Methods Policy in our latest product update – Entgra UEM 6.1. This new policy adds another layer of security to your Android devices. In this blog, we’ll explore how this feature works and how it helps you protect your Android devices.

Allow Input Methods Policy: How It Works

We introduced the Allow Input Methods policy with one goal in mind – to give admins far greater control of Android devices and ease device management. This policy provides you with granular control over the keyboard and input method options on all your Android devices. You can effectively mitigate the risks associated with data leaks and keylogging by determining which input methods you will permit, thus strengthening your organization’s overall device security. This policy enables you to create allow lists for approved input methods while blocking unauthorized ones.

Imagine the threat posed by unauthorized input methods, like third-party keyboards that might silently track keystrokes. You gain the ability to block such rogue input methods outright, ensuring that only approved ones are used with this policy. Thus, you directly safeguard your organization’s sensitive and confidential data and reduce occurrences of unauthorized access.

Input Method Options Explained

Entgra UEM 6.1 has three distinct input type options that you can choose from based on your requirements:

  1. Allow Any Input Method: You are free to use any keyboard or input method you prefer with this option. However, keep in mind that while this option gives you maximum flexibility, it can also raise potential security risks from unverified input methods.
  2. Allow Only System or Default Installed: Restrict input methods to trusted pre-installed or system-provided keyboards through this option. These keyboards, like those from the device vendor or Google, will be considered safe and therefore cannot be blocked. Add any enabled non-system input method service to the allowed list for complete control over permitted inputs.
  3. System Installed and User Installed: This option enables you to define a whitelist of permitted user-installed input method packages alongside system-installed keyboards. By specifying a list of package names for allowed input methods, you can closely manage which keyboards are permitted, effectively safeguarding against unauthorized inputs.

System Installed and User Installed Option Explained Further

Here is a detailed explanation, with a video to give you more guidance, on how the System Installed and User Installed option works.

  • Start by navigating to the policy section to locate “Allowed Inputs” in the available Android policy list. 
  • Select the “System Installed and User Installed” option from the drop down menu labeled “Allowed Type of Inputs.” 
  • Enter the list of package names for input methods that must be allowed, separating them with commas. For example, I’ve added Classic Keyboard (com.appstech.classic) and Entgra Remote Keyboard (io.entgra.iot.agent). 
  • After specifying the desired input methods, create the policy and apply it to your Android device.

In the screenshot below, you can see the third option in action. We have allowed two packages – com.appstech.classic, io.entgra.iot.agent. Notice that the ‘Bagan Keyboard’ indicates “disabled by admin,” indicating that the policy is functioning as intended, permitting only system-installed keyboards and the two keyboards enforced via policy.

We hope you now have a better understanding of using Entgra UEM 6.1’s Allow Input Methods policy. Explore the product and its capabilities for yourself by signing up for our 14-day free trial. To talk to the development team directly, send us an email to contact@entra.io. Tell us how we can help you.

Easier device enrollment with Windows Autopilot, real-time issue resolution, and policy support for better control of Android devices with Entgra UEM 6.1

Entgra UEM 6.1, the successor to Entgra UEM 6.0, is now available for use.

The latest version of our unified endpoint management (UEM) product has several benefits for Windows and Android device users. Windows device users will benefit from streamlined device setup through Autopilot enrollment and faster real-time technical support with remote screen share. This release also introduces new device operations to enhance management capabilities. Android device users can now enforce pre-approved input methods for better management of data usage. Entgra UEM 6.1 comes with UI enhancements that give you improved navigation and usability, while platform improvements include convenient tenant deletion. 

This blog explores each of these new benefits by device type in detail and other platform improvements.

For Windows Device Users

Simpler Device Setup with Windows Autopilot Enrollment

Use Windows Autopilot deployment for a straightforward, hassle-free device setup and configuration for your corporate Windows devices. This feature provides:

  • Zero Touch Deployment: Autopilot supports zero-touch deployment scenarios, where you can provision and configure devices remotely sans any physical interaction. This is especially useful for large-scale remote workforces.
  • One-time setup: Autopilot eliminates the need for repetitive manual deployment tasks, such as device activation, user account creation, and app deployment. This one-time setup streamlines the process and saves significant time for your administrators.
  • No OS imaging required: With Autopilot enrollment, you can effortlessly distribute applications, documents, and configurations to enrolled devices in bulk. This gives you a simplified deployment process by shortening the time-consuming OS imaging process.
  • Controlled Administrative Permissions: Autopilot helps enforce security policies by limiting the creation of local administrator accounts on devices. This ensures that only authorized personnel can control administrative permissions across your devices. 
  • Less TCO: By streamlining the deployment and management process, Autopilot can help reduce the Total Cost of Ownership (TCO) associated with managing Windows devices. This is often achieved by minimizing the time and resources required for manual setup and configuration, thus leading to cost savings in the long run.

Interactive Real-Time Technical Support Facilitated by Remote Screen Share

The new remote screen share support feature empowers your IT admins to promptly identify and resolve issues directly by viewing your users’ screens in real-time. 

This feature has a significant impact on your troubleshooting process and improves the overall efficiency of your support operations. With instant visual inspection and diagnosis, your IT teams can expedite solutions, enabling employees to resume their tasks quickly and reduce instances of downtime.  There are further cost saving benefits for your business as your team does not have to make on-site visits for technical issue resolution unless absolutely necessary. 

We have plans to develop our real-time technical support feature further in upcoming product releases. 

Tailored Device Management Through Device Operation Enhancements

This release expands on our existing suite of remote operations available for Windows device users. The additions are discussed further below.

  • Device Info: You can request detailed device information directly from enrolled Windows devices. This includes crucial data such as hardware specifications, system configurations, and more, enabling administrators to gain deeper insights into their device ecosystem to support management and decision-making.
  • Application List: Gain up-to-date information about your software landscape across your Windows devices with the “Application List” functionality. Triggering this operation allows you to download the Microsoft Application list from enrolled devices, providing visibility into installed applications and their versions. 
  • Security Info: With the “Security Info” feature, you can request comprehensive security information from enrolled Windows devices. This includes vital data regarding device security settings, defender details, encryption status, and more, empowering administrators to ensure compliance with security policies and proactively address any vulnerabilities.
  • Firewall Info: Gain deeper visibility into the network security posture of Windows devices with the “Firewall Info” functionality. By triggering this operation, administrators can request device firewall information from enrolled Windows devices. Use this data for better network security management, threat detection, and response capabilities.

For Android Device Users

Updated Data Security With Pre-Approved Input Methods

Android device users can now regulate the use of keyboards and input methods, reducing the occurrences of data breaches and keylogging incidents.

This feature presents you with various options to customize input methods so that you have the flexibility to adapt the policy based on your enterprise needs. You have the choice to either restrict input methods solely to trusted pre-installed or system-provided keyboards, ensuring a heightened level of security, or alternatively, define a specific list of user-installed packages deemed acceptable as input methods.

This level of granularity empowers you to fine-tune your device management strategy, enhancing security while maintaining operational flexibility.

Block Apps From Using Metered Connection With Improved App Usage Configuration

The improved App Usage Configuration policy gives you the ability to restrict specific applications from accessing the internet when your device is connected to a network with metered or limited data usage, such as cellular data networks.

Manage your data usage more effectively, avoid unexpected overage charges, and save financial resources with this feature. You can also ensure that essential apps or services take priority.

Agent Compatibility for Android 14 and 13

Entgra UEM 6.1 provides comprehensive compatibility with Android versions 14 and 13 for its agent. This ensures a smooth integration of diverse device fleets, offering enhanced management capabilities across a range of Android devices.

Platform and UI Improvements For All Devices

Faster Tenant Deletion

Admins have an advanced feature to efficiently manage subtenants and their data, all accessible within a single console interface. Deleting tenants and clearing relevant data becomes less time-consuming because you do not have to switch between multiple consoles. Furthermore, admins can still maintain control over your multi-tenant environments.

Revamped Windows Defender Page and Enhanced Search Functionality

Continuing our mission to keep improving our product user interface and give administrators a smoother navigation experience, Entgra UEM 6.1 introduces features to this end.  You can now conveniently search for apps using package names within the application restriction policy, easing app management tasks. 
Furthermore, enhancements to the Windows Defender single-device page provide a more intuitive user experience.

Experiment with these features by signing up for your 14-day free trial today or reach out to us for a live demo. Our product documentation has more details to help you get started too.   Stay connected with us to learn about future product updates to Entgra UEM.

App Management Made Easier: Using Entgra UEM For App Lifecycle Management

Photo by Onur Binay on Unsplash

We all know Unified Endpoint Management (UEM) solutions provide comprehensive end-to-end Mobile Application Management (MAM) capabilities for businesses. You can effortlessly manage and monitor apps on multiple mobile devices from one central place.

Application Lifecycle Management (ALM) is one of the core features of UEM when it comes to mobile app management. At Entgra, we understand the challenges of managing app lifecycles and have developed a cutting-edge solution that takes the complexity out of the process, making things easier and user-friendly for you.

Entgra UEM provides ALM capabilities. In this blog, we will explore these capabilities in detail to highlight how they simplify app lifecycle management stages and enhance the overall management experience.

Before you begin: What is ALM?

ALM is the process of managing the entire lifecycle of applications deployed on your endpoints. 

It enables you to manage the lifecycle of an app from its inception to retirement. You can ensure they are installed correctly, monitor their performance, and update them without causing any inconvenience to your end users. Your team members can collaborate at each stage of the app lifecycle, facilitating real-time updates.

Entgra’s approach to ALM 

The ALM feature in Entgra UEM is comparable to having a personal assistant for your apps. You can manage your applications from start to finish within a centralized platform. It covers everything from creating and deploying apps to updating and retiring them.

Let us take a brief look at the entire ALM process.

The basic process of ALM

Admins can create their apps via the Entgra app publisher.  Once you create an app, it automatically comes with its lifecycle. From this point onwards, you are able to oversee and manage each stage of the app’s lifecycle.

Now let’s delve further into each stage. 

  • Created – Suppose that you want to create a specific corporate app exclusively for your employees. Once you create this app, it belongs to the first stage of the app’s lifecycle. Now you have full control over each stage of the app’s lifecycle.
  • In-Review – This stage is entirely for accurate and secure app publishing. You can review your app thoroughly and determine whether the app is suitable for publishing in the app store. In this review process, you can add the app to a “Rejected” stage if it detects any fault in the app or if it is not in compliance with company policies.
  • Approve – After reviewing the app with the necessary parties, you can approve it for publishing.
  • Publish – Publish the app in the corporate app store. The app will only be visible in the app store after it completes this process. There is an additional perk. Even after publishing your app, you can change its status.
  • Block – You can block an app for a certain period of time either to publish or deprecate at a future date.
  • Deprecated – These are the outdated apps that no longer suit your app store. In both cases, the app will be hidden from your app store automatically to prevent installations.
  • Retired – Eventually, you can retire your apps. You can terminate the app’s process at this stage since this is the final stage of an app’s life cycle.

Fast-tracking app publishing

The latest version of Entgra UEM has made app publishing even faster and more convenient. 

You can save and publish an app in a single step. This eliminates the need to follow all the lifecycle stages manually. This is particularly useful in scenarios where it is not necessary for a user to complete all the lifecycle stages.  

Within the app creation step, admins can decide whether they want to publish the app or not at the same time. If you want to publish the app, it will be published in the app store immediately without any review.  This denotes that you can directly transfer the app from the “Created” stage to the “Published” stage of its lifecycle. 

Enhanced ALM process in Entgra UEM

This ALM feature helps to prevent UEM admins from making mistakes when managing any kind of app by providing clear, concise directions. As fantastic as this feature is, it is only available to users with appropriate permissions. You can control who has access to this feature as required to prevent any misuse. 

At Entgra, we always strive to offer our customers the best possible UEM experience. Do browse through our blogs and documentation to learn all about our products and feature updates.  We even have an Entgra UEM evaluation option available for new and trial users.
If you have any questions, we’re here to help. Feel free to reach out to us for assistance through the Entgra support portal.

Streamlining Device Management With Entgra UEM: Trigger Operations Simultaneously Across Your Device Fleet

Photo by Daniel Romero on Unsplash

Did you know Entgra UEM has a feature that enables you to trigger operations simultaneously in device groups?  Thanks to this feature, you can execute multiple commands across a group of devices all at once with a simple click.

We will discuss how this feature saves you time and resources, making device management more efficient.

Say goodbye to manual device-by-device actions

As an IT administrator, you no longer have to perform repetitive tasks on individual devices manually. You can now centralize device management with Entgra UEM. 

Our UEM feature gives you the ability to group devices together based on various criteria such as their operating system (OS), enrollment mode, location, or any other specific need. This flexible grouping mechanism allows for a more tailored approach to device management.

Once your devices are organized into groups, you can effortlessly trigger desired operations and apply them simultaneously to all devices within the group. There is no necessity to perform tedious, repetitive tasks on individual devices; instead, you can experience the efficiency of executing commands across multiple devices in one go. 

Unlocking hidden perks

  • Enhanced security and compliance

With this feature, you can take immediate action across a specific group of devices. Whether you are locking devices, changing lock codes, clearing passwords, or performing enterprise wipes, you can swiftly mitigate security risks and address policy violations, keeping your organization protected. If you have a large device fleet, this will be especially helpful.

  • Efficient deployment of updates and applications

Deploying applications or pushing updates to a large number of devices can be a tedious task. Entgra UEM simplifies this process by enabling you to upgrade the firmware across device groups simultaneously. This ensures seamless application availability and software updates, boosting productivity and reducing manual effort.

  • Remote troubleshooting and support

Imagine an IT support team responsible for troubleshooting and resolving issues across a diverse device fleet. You can now support personnel remotely to trigger actions such as reboot, file transfer, or device information retrieval across a group of devices simultaneously. This streamlines the support process, reduces downtime, and improves end-user satisfaction.

  • Bulk actions for device configuration

Trigger operations such as ringing devices, sending messages, applying configurations on apps, or muting devices in bulk, ensuring uniformity and ease of management. This capability enhances operational efficiency and reduces configuration errors.

Check out this short video to learn more about how effortlessly this feature works:

Entgra UEM empowers your organization’s productivity by offering you extensive Mobile Device Management (MDM) features.

Visit our product documentation to learn more. We invite you to experience the capabilities of the latest product version, Entgra UEM 5.2, with our Try-It-Now feature.
If you have any questions or require assistance, please do not hesitate to contact us via our Entgra support portal.

Unlocking the Power of Personalization With Entgra UEM 5.2’s Per-Tenant Theming Feature

Photo by Tirza van Dijk on Unsplash

The recently released Entgra UEM 5.2 gives you an exciting new feature – per-tenant theming.

With per-tenant theming, Unified Endpoint Management (UEM) administrators now have the power to elevate customization and branding within their tenant environments. This feature enables you to personalize UEM platforms and define unique visual themes and brand identities for different sub-organizations or client groups. 

In this blog, we’ll explore how Entgra UEM 5.2 will help you to strengthen your brand presence with per-tenant theming.

Understanding per-tenant theming and its importance

Per-tenant theming is a must-have feature for multitenant UEM environments where multiple organizations or teams use the same console. It helps to create a more intuitive experience for each tenant. Whether you’re in a multitenant environment or simply want to reinforce your organization’s branding, per-tenant theming can help you achieve what you want. 

Each tenant or client can customize the user interface (UI) by incorporating branding elements and creating an interface that reflects their unique identity and style. This means that each tenant can have a unique interface and user experience, while still being managed from a single console.

Without per-tenant theming, tenants may have difficulty differentiating their workspace from that of other tenants, resulting in confusion and decreased productivity. Entgra UEM 5.2 helps you to ensure that each tenant’s needs are met by providing each tenant with their own unique theme, ultimately leading to increased satisfaction and productivity.

If you’re looking to create a better user experience for your tenants, per-tenant theming is the way to go.

How it works

Per-tenant theming works by enabling you to create different themes for each tenant of the UEM solution. You can easily customize the UEM console with unique logos, favicons, app titles, etc., giving each tenant a distinct look and feel that represents your organization’s brand identity. Additionally, you can customize the branding of your tenants based on sub-organizations, teams, or any other categories you prefer to use. 

Let’s say you have a multinational corporation (ABC Tech) with several workspaces in different regions and each region must be reflected in the UEM console. With per-tenant theming, you can customize the console according to each region. This means the UEM console can then display the appropriate theme for each region based on their login credentials. This saves time and resources for you and provides a better user experience for your employees in each region. Employees will instantly connect with the platform, resulting in increased engagement, productivity, and overall satisfaction.

https://youtu.be/XsxNFJp2aos

Other benefits of per-tenant theming

Apart from creating better user experiences, per-tenant theming offers you other benefits.

  • Stronger brand identity

Your brand is everything. Per-tenant theming empowers you to showcase it. Incorporate your company logo, add titles, and design the UEM platform to match your unique identity. With this level of customization, every endpoint interaction becomes an opportunity to reinforce your brand, build trust, and leave a lasting impression on your employees and clients.

  • User-friendly customizations

Implementing per-tenant theming within a multitenant UEM environment is a breeze. With just a few clicks, tenants can upload their brand assets, change logos, and make design modifications without needing extensive technical expertise. It’s a user-friendly process that puts the power of customization in the hands of organizations of all sizes.

  • Consistency

By maintaining consistency in per-tenant theming, organizations can create a unified and cohesive experience for their users. With a consistent look and feel across different tenants, you can create a sense of unity that reflects your organization’s values.

  • Flexibility for sub-organizations and teams

Multitenant UEM environments often consist of sub-organizations and teams with diverse needs. Per-tenant theming caters to this diversity by customizing the UEM experience for each entity. It’s all about giving your sub-organizations and teams the flexibility to create an interface that aligns with their specific requirements.

If you’re ready to take your UEM experience to the next level, consider exploring the per-tenant theming feature in Entgra UEM 5.2 and see how it can benefit you!

To learn more about the latest Entgra features, visit our product documentation. And do not forget to try out the product with our Try It Now feature to experience the latest features and updates.

We are always happy to answer any questions you may have. Reach out to us here.

The Digital Pedagogy Learning Curve: Education 4.0, MDM, and Opportunities

Photo by Dom Fou on Unsplash

We have come a long way since the times when education was a privilege for the chosen elite, attainable by virtue of class, religion or gender. And a long time from when sacred scriptures had to be memorized by a trusted few to transfer knowledge from one generation to the next. 

The ancient Greeks had laws in place to ensure that formal education was primarily for males and for non-slaves. In early Mesopotamia, only the royal offspring and sons of the rich or the professionals had the entitlement to be schooled, i.e., access to reading and writing. The Chinese resorted to rote memorization for teaching over 40,000 characters in their language.

In the light of such absurdities, today we are in a position to pat our own backs gleefully for being able to read ridiculous ancient teaching practices leisurely. We are also able to grasp the fact of our learning habits, too, having leapfrogged tremendously from etching on wax tablets and oral recitals to browsing content in our devices conveniently today. 

Given the enormity of the knowledge we have amassed and hoarded in numerous tricky technical formats in the present day, what is required of the sentient being now is the aptitude with which to retrieve and apply just the right resources for the problem at hand. The finesse of crafting the best with what we’ve got. The learner’s armor today, in that sense, is very much personalized to the individual, in how and what works best for each individual. 

Education 4.0

The evolution of digital pedagogy has been rapid and unprecedented. And definitely expedited by the pandemic.

We have now entered an era of innovation-driven, immersive learning experiences aided by digitized tools and techniques for effective knowledge retention and application. Today’s students are digital natives in every sense of the word – they are exposed to digital technologies at a very young age and understand how to use them, often in a very sophisticated manner.

In an ideal flipped classroom that we are headed to, the students embark upon actual problem-solving during the class hours, while reading up on theory and learning lessons have been moved out of the scope of the classroom. Students can watch lectures online, download relevant notes, and discuss/explore their ideas through online forums or discussion groups. This type of blended learning strategies reinforces active student engagement and knowledge application within the classroom.

Progression of education from 1.0 to 4.0:

Education 1.0 > Education 2.0 > Education 3.0 > Education 4.0

In that sense, Education 4.0 is a jump-start from its version 1.0, naturally called for, and vastly aided by the technological advancements of its counterpart, the fourth industrial revolution. Industry 4.0 has thrust us with smart technology, Artificial Intelligence (AI), big data, Virtual Reality (VR), Augmented Reality (AR), and robotics. 

We must now shift our focus to empowering the next generation of learners, harnessing the culled knowledge with advanced technology for betterment – ideally in accordance with our Sustainable Development Goals for education [SDG 4]

Are we there yet?

Education 4.0 involves the use of tablets, laptops, smartphones, and various other devices as supportive tools for learning. Aimed at instilling the 4Cs the century calls for, our students are now being trained to think critically, make the most of their creativity, and communicate and collaborate effectively with their peers.  With the students having a big say in the how of it today, learning has become a highly personalized experience to be indulged in from anywhere, at any time. 

Such a transformation calls for an equally elaborate and sophisticated response from  educational institutions.  These institutions must be prepared to address challenges that arise with infrastructure, services, and facilities for students and teachers alike.

Visionary institutes like the Avinya Academy already have programs designed for empowering the next generation student that extend beyond the required skill sets – these students are equipped with the knowledge to be proficient in life and career fundamentals the future calls for.

Riding on the waves of the latest trends in tutelage, academies must incorporate and leverage progressive technology to provide the fitting educational foundation for these self-paced learners so that they can become the global digital citizens of tomorrow. 

Device strategies for educational institutions

Cyber-physical learning curricula comprise course work requiring interactive, immersive learning experiences using varied e-learning tools and techniques. Possessing one’s own device is only the starting point here for the exciting escapade that awaits the learner. As such, academic institutions are better positioned to identify the exact student requirements and address the demand justifiably without calling for unwarranted problems. 

Most academic institutions today provide students with centrally administered mobile devices. A strategic plan for effective device management customized to the institute’s guidelines can help manage entire fleets of devices effortlessly.

Entgra’s comprehensive Mobile Device Management (MDM) solutions present purpose-built plans for educational institutions. With its centralized device and unified endpoint management capabilities, the solution enables multiple integration options with third-party platforms.

Reliable Identity and Access Management (IAM) features are imperative for an impregnable, secure Learning Management System (LMS). With our MDM suite’s controlled access permissions, Single Sign On (SSO) and authentication policies, IT administrators can securely onboard large numbers of devices and users swiftly. With a strong foothold on securing privacy and sensitive data, Engtra MDM enables remote locking/wipe-off when subject to security breaches. 

These are some of the features we support presently:

For comprehensive device strategy solutions customized to suit your academy, do reach out to us at https://entgra.io/contact-us/, and we shall be happy to help you gear up. 

Additional reading resources

Post-Pandemic Business Revival: Where Are We Headed?

Photo by Alec Favale on Unsplash

The effects of the COVID-19 pandemic continue to loom over us. With hopes of opening countries and returning to normalcy, we take one step forward, only to fall back two, with tightened masks. It surely will be a while before life as we once knew it can be restored.

Thrust with incertitude at all levels from economic subsistence, vocational hardship, healthcare exigencies, and the unpredictability of life in general, our core existential strategy for the last two years has primarily been inclined towards that of basic survival centered around us as individuals, our close-knit families and communities, and the associated temporal assets. The pandemic epiphany has brought about drastic changes in our lifestyles, calling us to revise our priorities with a new reality check in life. 

For business enterprises, this is bad news and has been so for the past two years. 

The Trending Story In Numbers

As with every historical industrial revolution, the effects of the pandemic will shape the economic trends for the future. Unsurprisingly, there will be an evident increase in remote working. A recent Gartner poll found that 48% of employees will likely work remotely at least part of the time after COVID-19 compared to 30% before the pandemic. Similarly, the McKinsey Global Institute estimates that more than 20% of the global workforce could work the majority of its time away from the office – and equally importantly, be just as effective. A consequent HR trend analysis by them indicates that 32% of organizations are replacing full time employees with contingent workers as a cost-saving measure. Prepped up for this, in a recent Gartner poll, 90% of HR leaders said employees would be allowed to work remotely even once COVID-19 vaccines are widely available.

As indicated by these statistics, we have embraced what worked well from the pandemic and are progressing forward retaining the lessons learned. There’s no going back now. Digitally enabled productivity gains have accelerated the Fourth Industrial Revolution powered by technology and defined by operational models that survived above the pandemic predicaments. 

Remote Working or the ability to Work From Anywhere (WFA) is clearly here to stay. So is the hybrid work model as has been discovered in a recent HR trend analysis by Gartner.

Accordingly, the most favorable operational model driving business transformations in the predictable future is that of the Hybrid Work model where employees interact with each other with a mix of distributed, co-located premises synchronously, and/or asynchronously.

Your employees are now empowered with the choice of how best productivity is accomplished – your job is to ensure they are sufficiently equipped to do so. 

Are We Ready? Fitting Device Strategy for Your Ecosystem

Managing a digital ecosystem of disparate devices on different platforms can be quite a challenge. Even more so are the conundrums involved with the smooth operation of digital systems whilst being caught unawares by the virus. It is therefore imperative that we make the most of what we have for continued existence of operations under the prevailing constraints.

In one of our recent undertakings, we set out to empower public field officers by helping them digitize their routine tasks. Whilst managing to effectively map the skill sets to devices and the appropriate technology during the project, we also analyzed and outlined how the government administrators in Sri Lanka can benefit from a centralized strategy to monitor and manage the devices deployed in the field. 

Ideally, a complete device strategy is woven around the business requirements of the enterprise, its device engagement criteria, product building, operational efficiency, scaling potential, and the extent of available technical support. Value creation from a long-term perspective and sustainability of device deployment with integration are vital aspects to be considered for a productive device strategy. 

With our varied Mobile Device Management (MDM) solutions and Internet of Things (IoT) technologies, Entgra can help you formulate the most fitting strategy for your enterprise. Our recommendations precede a comprehensive analysis of your device specifications, their functionality and configurations, defined ownership and administrative policies, pre-work device check, monitoring and their distribution,  complete with a pilot run on device deployment in the field.  As part of our assistance in managing your ecosystem, we will also help you with App development, identity and access management (IAM) and storage options. 

Resilience and Agility: The Way Forward

Resilience, in enterprise terms, is a measure of your ability to swiftly adapt to disruptions while maintaining continuous business operations and safeguarding your employees, assets, and overall brand equity. Resilient organizations are better able to respond and correct their course quickly with changes. 

Faced with the adversities introduced by the pandemic, enterprises that are actively taking measures to optimally tackle the changes are positioned with a competitive edge to be able to progressively move forward retaining most of their strength in vying to make the most of the situation. 

Building a more responsive organization in terms of infrastructure and operational flow to increase agility and flexibility with room for flexing is therefore of utmost importance. This in turn translates into facilitating seamless workflows and remote working environments against a backdrop of changing and evolving technology usage, both by organizations and individuals. 

Entgra offers you a single platform for device integration with comprehensive endpoint management capabilities where you are able to expose devices as APIs securely with identity federation for managing human and device identities. Enabling custom integrations with broad built-in capabilities, and for developing end-to-end applications, our secure, customizable platform can manage all types of devices and applications. Complete with device and endpoint data analytics for systematic decision making, our IoT platform together with our Enterprise Mobility Management (EMM) solutions will enable you to remain resilient, relevant, and flexible to respond to present and future changes.

Get in touch with us to learn more about how we can help you.

References

Geofencing Capabilities of Entgra MDM

Photo by abillion on Unsplash

We’re pleased to announce that Entgra MDM has yet another new feature – geofencing capabilities. Enterprise Mobility Management (EMM) admins can define required virtual perimeters for controlling access over specified boundaries and perform some operations to those which are inside of those boundaries. Geofencing is a very useful feature in governing access for user groups. It can be conveniently set up by drawing boundaries over areas on the map.

Let’s discuss how the geofencing capabilities work through an example. Imagine that the Ministry of Education wants to provide tablets or mobile devices for school children in rural areas for online learning during the pandemic. And they wish to provide all the learning materials to the devices and manage those device capabilities. Additionally, they want to ensure that these devices do not leave school premises. The Ministry can use geofencing capabilities to monitor the devices’ locations, manage capabilities, and perform certain actions.

The Functionality of Geofencing Capabilities

Before you create a geofence, you need to set up the Alerting Configurations under the Platform Configurations. You can provide an email address where you can receive alerts. According to your use case, you can define whether users cross or access boundaries.

After defining the configurations you will be able to create geofences in Entgra MDM. The following data should be provided to create a new geofence.

  • Geofence name: Provide a name for identifying the geofence
  • Description: Add more details about the geofence
  • Device group(s): Assign a group (or groups) that consists of the devices that need to belong to the geofence
  • Event configurations: Add the given alert configuration to the relevant field

Afterwards, you need to mark the boundary line on the map. By using a shape such as a polygon or a circle, mark the area that you want to define as the geofence and then click on the Create button. The geofence table lists all the geofences that you create.

Returning to our example, after creating a geofence by including the school boundaries, if one of the students tries to leave the school with a device, the head of the school receives an alert and he/she can track the device location. The head of the school can also view how many devices in the relevant geofence are active at any given time. In addition, it can check the location of the provided devices and the device count, preventing devices from being misplaced.

Not only that, the group (or groups) that created the geofence can apply the required educational materials at the same time, adding various restrictions to the devices and managing them.

Entgra MDM has extensive enterprise wide MDM features that you can customize for your business needs. Learn more about the product and how we can help here.

You can also get in touch with us via contact@entgra.io