Network Visibility & control for Unified Endpoint Management

Asavie Moda & IBM MaaS360

Asavie and IBM MaaS360 offer a multi-layer, defense-in-depth approach to unified endpoint management. The combination of Asavie Moda’s network layer security controls with IBM MaaS360’s endpoint device management offers an unrivaled solution to secure and manage their mobile workforce across a range of smart phones, tablets and field-force mobile devices. Together IBM and Asavie ensure enterprises maintain full visibility and control of their mobile data and devices to protect their mobile business.

IBM MaaS360

Asavie is an IBM Global partner and the Asavie Moda solution has been verified by IBM as running in a customer environment with the IBM MaaS360 Essential Suite (SaaS) for unified endpoint management. Asavie also  partners with many of the world’s leading mobile network operators to provide intelligent and secure mobility management  services to their end-customer enterprise and SME customer base.

Case Study

Asavie and IBM MaaS360 were deployed alongside each other as part of a defense-in-depth strategy by O2 to deliver an end-to-end secure mobility experience for Leeds Libraries in the UK.

Asavie Moda was an integral part of the solution along with IBM MaaS360 and DEP.
Without the controls offered by Asavie Moda we would have been faced with the difficult choice of
unsustainable data costs or switching off the SIM connection when users reached a pre-set data limit.

Jason Tutin,
Digital & Learning Development Manager,
Leeds Libraries and Information Service

IBM Mobile Security App Exchange

Asavie Moda extends the UEM features of IBM MaaS360 with Watson by bringing the security policies into the network, providing real-time visibility, control and security for all data in transit to and from the mobile devices regardless of whether they are accessing corporate resources or not. This latest UEM integration from Asavie is now available to the security community via the IBM Security App Exchange, a marketplace where developers share applications based on IBM Security technologies.