3CX Mobile Device Manager review

Manage employee Android and iOS devices with this web-based console.

Managing devices 

As well as giving you the option of wiping and tracing the location of devices, the MDM tool also allows you to view and control which applications are installed on each system, remotely install your own apps, view the full call history of some devices, create group policies and remotely create user email accounts.

The Mobile Device Manager's web interface is extremely easy to use. The main dashboard screen show you how many users and devices are currently online and, if you have GPS tracking enabled, where they all are in the world. However, you'll spend most of your time on the Device screen which, like the service's other features, can be accessed from a node-style list in a pane on the right. A list of devices occupies the top half of the browser window. Select one and tabs along the lower part of the screen let you view its location, system information, installed apps, call history, configured email accounts and more. There's also a Remote Control option, but this failed to work on any of our test devices. Meanwhile, call history can't be viewed for iPhones.

Group policies

The Group Policies node allows you to create groups including the devices of your choice, which is handy if you want the sales team to have different restrictions to the IT department, for instance. Once you've created groups, you can then view the devices in them, roll out applications to all compatible devices, create blacklists of apps that members aren't allows to install, roll out wireless network information and create group policies. Like individual device policies, which always take precedence, these allow you to control features such as GPS tracking and camera use on even device in the group. The Alerts node shows you who's been violating your policies. You're also emailed about policy violations.

Group policies can be applied to all users within a certain class or department

The ability to install and uninstall apps en masse is particularly helpful, making it easy to install business-critical apps to every device in a group. There are a couple of quirks, such as the requirement for Android but not iOS - users to approve all installation and deletion requests for their device and the iOS version's inability to delete apps that were present before the MDM client itself was installed. Although these detract from the elegance of the process, it's still far less trouble than emailing out links or simply trusting staff to avoid apps which don't meet company policy.

One of the MDM's most useful features is its ability to display all the apps installed on the devices you manage, and remotely order their installation and uninstallation

You can also create app blacklists, but unfortunately they don't actually prevent unwanted apps from being installed. On Android, the offending app was put on the client program's uninstall list for the phone's user to approve. On iOS, blacklisted apps were added to the deletion list but could not be removed at all via the remote interface after that. This is a little annoying, as it's perfectly easy to remove non-blacklisted apps from individual devices using the Remove Application option. However, the Policy tab for iOS devices allows you to entirely disable the App Store, as well as Safari and iTunes.

Receiving reports of policy violations makes it easy to educate offending staff and deal with policy violations promptly but if you're blacklisting apps to prevent potential malware or security breaches, they aren't sufficient. We'd have liked the app to inform staff when they attempted to download blacklisted software. The ability to view installed apps on mobile devices and applications on Windows 8 systems means that you can always tell whether their software is up to date, but you can't install or remove software from Windows systems, though. The Windows version of the service is essentially for monitoring purposes only.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020