Granularity, over-the-air setup and other useful features
Now, the degree of granularity needed in granting access permission is up to you. Clearly, it has to fit your particular situation. Infinite granularity might lead to a lot of work and headaches, as users constantly ask for tweaks to account for their particular circumstances. At the very least, the mobile device management system should allow for three categories: no access, partial access, and complete administrative access.
It’s also important to recognize that these permission settings apply to clients running on the mobile device. Consequently, mobile device management tools should be capable of setting the appropriate permissions for the clients on devices in the field. With that, setting permissions remotely and over-the-air are a possibility. Without that capability, your options will be more limited, your users will likely be less satisfied with your security arrangements and your workload will be greater.
Beyond that, the management tool should be adaptable, which is a necessity because mobile technology is still evolving rapidly. It also should include a kill-switch features as a requirement because mobile devices can be – and are – lost or stolen much more easily than something tied to a desk.