Key features for all device types
Feature | Description |
---|---|
Activate devices | When a user activates a device, they associate it with UEM and your organization's environment so that they can access work data on the device. Users can activate their devices using a QR code or their email address and an activation password.You can allow users to activate devices themselves or you can activate devices for users and then distribute them. All device types can be activated over the wireless network. |
Manage devices | You can view all devices and access all management tasks in a single, web-based console. You can manage multiple devices for each user account and view the device inventory for your organization. You can perform the following actions if they are supported by the device:
|
Manage groups of users, apps, and devices | Groups simplify the management of users, apps, and devices. You can use groups to apply the same configuration settings to similar user accounts or similar devices. You can assign different groups of apps to different groups of users, and a user can be a member of several groups. |
Control which devices can access Microsoft Exchange ActiveSync | You can use gatekeeping to ensure that only devices managed by UEM can access work email and other information on the device and meet your organization's security policy. |
Control how devices connect to your organization's resources | You can use an enterprise connectivity profile to control how apps on devices connect to your organization’s resources. When you enable enterprise connectivity, you avoid opening multiple ports in your organization's firewall to the Internet for device management and third-party applications such as the mail server, certification authority, and other web servers or content servers. Enterprise connectivity sends all traffic through the BlackBerry Infrastructure to UEM on port 3101. |
Manage work apps | On all managed devices, work apps are apps that your organization makes available for its users. You can search the app stores directly for apps to assign to devices. You can specify whether apps are required on devices, and you can view whether a work app is installed on a device. Work apps can also be proprietary apps that were developed by your organization or by third-party developers for your organization's use. |
Enforce your organization's device requirements | You can use a compliance profile to help enforce your organization's security requirements, such as not permitting access to work data for devices that are jailbroken, rooted, or have an integrity alert, or requiring that certain apps be installed on devices. You can send a notification to users to ask them to meet your organization's requirements, or you can limit users' access to your organization's resources and applications, delete work data, or delete all data on the device. |
Send an email to users | You can send an email to multiple users directly from the management console. |
Create or import many user accounts with a .csv file | You can import a .csv file into UEM to create or import many user accounts at once. Depending on your requirements, you can also specify group membership and activation settings for the user accounts in the .csv file. |
View reports of user and device information | The reporting dashboard displays an overview of your UEM environment. For example, you can view the number of devices in your organization sorted by service provider. You can view details about users and devices, export the information to a .csv file, and access user accounts from the dashboard. |
High availability and disaster recovery | BlackBerry data centers are located around the world and are designed to provide high availability and disaster recovery. BlackBerry data centers provide secure physical access to buildings, monitoring, and hardware redundancies to help protect your organization’s data from natural disasters.BlackBerry data centers have disaster recovery plans for service outages. The plans are designed to have minimal impact on device users and ensure business continuity. Data and apps are backed up in near real time to avoid data loss. |
Certificate-based authentication | You can send certificates to devices using certificate profiles. These profiles help to restrict access to Microsoft Exchange ActiveSync , Wi-Fi connections, or VPN connections to devices that use certificate-based authentication. |
Manage licenses for specific features and device controls | You can manage licenses and view detailed information for each license type, such as usage and expiration. The license types that your organization uses determine the devices and features that you can manage. You must activate licenses before you can activate devices. Free trials are available so that you can try out the service. |