Seeking a company who can develop a Mobile Device Management application which can perform the following functions:
For iPhone in the enterprise. (first phase)
An application for inventory and policy management.
Securely configure password, security, connectivity and application settings and policies. Block unauthorized iPhones from accessing enterprise. Wipe lost iPhones immediately
Push applications to the iPhone.
Test cellular and Wifi network performance
Track service quality
Be able to create a catalogue of recommended appropriate iPhone applications.
Enable end user to browse catalogue for iPhone, easily download selections through apple's app store and report application inventory
--------------------------------------------------------------------------------------------
## Deliverables
Seeking a company who can develop a Mobile Device Management application which can perform the following functions:
Phase 1 - For iPhone in the enterprise.
An application for inventory and policy management.
Securely configure password, security, connectivity and application settings and policies. Block unauthorized iPhones from accessing enterprise. Wipe lost iPhones immediately
Test cellular and Wifi network performance
Track service quality
Be able to create a catalogue of recommended appropriate iPhone applications.
Enable end user to browse catalogue for iPhone, easily download selections through apple's app store and report application inventory
PHASE 2: (IF WE CAN ALSO DO ANY OF THESE THINGS WITH APPLE, THAT WOULD BE PREFERRED. THE BELOW WOULD BE FOR OTHER OS, ANDROID, POSSIBLY WINDOWS BUT 7 MAKES IT HARD TO DO, THE BES IS ALREADY USED FOR MANY OF THESE THINGS IF IT IS A BLACKBERRY SHOP)
LOOKING FOR A COMPANY THAT CAN MAKE SUGGESTIONS AND RECOMMENDATIONS - WITH A TEAM THAT CAN HANDLE A PROJECT LIKE THIS FROM BEGINNING TO END.
Please have positive feedback and the experience required.
-Manage all Smartphones from a single screen (get a quick snapshot of all Smartphone operations, including breakdown of device type and carrier. Track new, pending, and deleted smartphones as well as identifying potential support or security concerns.
-Search and Sort
-Review all system details, security and policy enforcement, last month's usage, billing plan, software inventory and operational status by phone.
-Assign groups and identify employee-owned phones.
-Set password policy and VPN
Monitor incoming phones and block unauthorized access
Encrypt device and SD cards
Enable anti-virus scanning with zero-battery impact
Monitor unusual SD card activity
Disable Phone camera, card transfer, bluetooth for data or audio and other peripherals and connectivity services.
Locate and lock phone via online map.
Selectively wipe folders or files from the phone
Wipe phone completely
Restore documents and applications to new phone
Set privacy configuration consistent with company policy. Enforce separate policies for employee-owned and company-owned devices.
Set boundaries by phone or phone group.
Be able to install applications OTA to individual or multiple phones.
Know what users are installing on their phones.
Blacklist application we don't want
Recommend applications we like via online application catalogue
Distribute documents and security certs.
Remover applications and files.
Be able to access the phone remotely to diagnose and repair problems in the field.
Track key usage metrics to limit costs. Snapshot of daily usage. (Calls, Data, SMS0 in order to forecast service requirements. Proactively identify sources of additional exposure such as most and least active users, current international roamers, and excessive toll calling, monitor service quality by wireless operator.
* * *This broadcast message was sent to all bidders on Saturday Nov 20, 2010 11:40:12 PM:
[login to view URL]