CA Mobile Device Management Description

CA Mobile Device Management (MDM) offers an extensive range of features for overseeing the setup, configuration, accessibility, and overall administration of mobile devices. These devices encompass phones and computing equipment, including smartphones, tablets, and both desktop and laptop computers. This document outlines the steps for configuring CA Business Intelligence for use with CA Mobile Device Management. CA Business Intelligence serves as a suite of reporting and analytics tools. By leveraging CA Business Intelligence, CA MDM is able to integrate, assess, and showcase essential data, which is crucial for efficient management of mobile devices through multiple reporting methods. The installation process for CA Business Intelligence sets up BusinessObjects XI as a separate module, functioning independently from any CA Technologies products and enabling various offerings from CA Technologies to utilize shared Business Intelligence services. Additionally, this integration enhances the overall data visibility and decision-making processes within mobile device management.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Broadcom
Year Founded:
1991
Headquarters:
United States
Website:
techdocs.broadcom.com/us/en/ca-enterprise-software/other/Mobile-Device-Management/18-1/running/how-ca-mobile-device-management-and-ca-business-intelligence-integrate.html

Media

CA Mobile Device Management Screenshot 1
Recommended Products
Attack Surface Management | Criminal IP ASM Icon
Attack Surface Management | Criminal IP ASM

For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Customer Support
Business Hours
Online Support

CA Mobile Device Management Features and Options

Mobile Device Management (MDM) Software

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

CA Mobile Device Management User Reviews

Write a Review
  • Previous
  • Next