This article is part 2 of 2 and describes additional features of mobile device management solutions. The previous article covered the main objective of mobile device management systems and the typical building blocks. A few features were explained already.
Access to enterprise servers, applications, emails and data may be granted to authorized private devices (“Bring Your Own Device”, BYOD). Privately owned mobile devices may use certificate-based authentication.