Keep up with the mobile revolution

Safeguarding sensitive corporate data gets more difficult every day. Our EMM solution satisfies international standards for computer security certification (CC) by letting administrators centrally manage employee access and protecting data with next-generation security protocols. We give you more effective and consistent device management and increased security across your organization.

Benefits

What can EMM do for you and your business?

  • Simplify policy management

    EMM lets you apply comprehensive access and control policies across apps and devices. No more confusing silo-based provisioning and de-provisioning.

  • Keep critical data inside the firewall

    EMM’s on-premises approach keeps sensitive data on your servers, behind your enterprise security stack.

  • Reduce admin workloads

    The EMM user-portal lets you post notices, FAQs, and employee self-service options, so they can view enrolled devices, and locate or lock one if it’s gone missing. No more help-desk overloads.

  • Enhance security

    Secure corporate and employee-owned devices, and control access from a single console. Our EMM solution boasts the highest security standards, with validations from NIAP/CC, and the NSA CSFC program.

  • Monitor mobile security compliance

    EMM’s Admin Console provides a single pane dashboard view of activity, devices, and security violations across your organization.

  • Ensure safe data communications

    The Secure Push Channel for server-to-device communications skips cumbersome VPN systems by using TLS-secured data channels, providing quick data transfers and industry-leading delivery success rates.

“Samsung SDS EMM has a strong focus on meeting the high security requirements of modern organizations.”

- Adam Holtby, Ovum Consulting

"Our crews saved time, energy, and money with the MVR solution powered by Samsung SDS EMM."

- Luke Williamson, Procurement Manager, Vital Human Resources Ltd.

“Samsung SDS really did demonstrate a desire to work with PCC and goes above and beyond for their customers.”

- Paul Evans, Project Manager, Portsmouth City Council

See how EMM works in the real world

A look at Samsung SDS’ “win/win” EMM solution: increased employee flexibility, with stronger device management and data security.

Features

Take a closer Look

  • Device Management

    Use EMM’s Over the Air device commands and provisioning to specify security policies by department, individual and location.

  • Application Management

    EMM efficiently supplies and distributes business mobile applications, controls access and authority, and monitors usage.

  • Data Management

    Control access, protect data and provide a virtual space for business application data.

  • Unified Management

    Administer security policies aligned with organization structure and easily distribute enterprise mobile applications.

  • Enterprise Mobile Apps Store

    Host your own proprietary app store, a must for enterprises whose apps need to meet stringent policy, security and procurement requirements before distribution.

Specifications

  • Data in Transit (DIT)
    Protected via secure TLS 1.2 channel
  • Algorithms
    Supports RSA up to 4096 or ECDSA p256/p384 up to SHA384
  • Encryption/Decryption
    Uses FIPs 140-2 validated cryptographic kernels
  • EMM Protocols
    UAF V1.0

Certifications

  • US NIAP Common Criteria
  • FIPS 140-2
  • MDM PP 2.0
  • TLS 1.2

Resources

Read, download, and share

  • CASE STUDY

    EMM Case Study - Cincinnati Airport

    DOWNLOAD|SHARE

  • WHITE PAPER

    IDC Spotlight Mobile Security – An Enabler for Digital Strategies

    DOWNLOAD|SHARE

  • WHITE PAPER

    Securing and managing wearables in the enterprise

    DOWNLOAD|SHARE

Let's talk

Whether you’re looking for a specific business solution or just need some questions answered, we’re here to help.

Security Mode
Samsung SDS EMM automatically applies mobile security policy on mobile devices as it passes through the speed gate.
pdf DOWNLOAD
Device management
By creating separate spaces on his smartphone for work and personal use, he can access corporate data more securely and efficiently as well as maintain his privacy.
Executives and employees can download authorized apps to improve productivity and cooperation, while IT admins can easily apply security policies and patches.
pdf DOWNLOAD
Remote lock
When his device is lost, he immediately blocks unauthorized access to his lost device remotely from the user portal to prevent data leaks. If there is any sign of a data breach, he can immediately delete data on the lost device through the remote wipe feature.
pdf DOWNLOAD