FrontRange announced the availability of a new Enterprise Mobility Management (EMM) offering.
By integrating EMM tightly with its existing service and client management capabilities, HEAT provides a comprehensive platform for managing and controlling physical, virtual and mobile devices throughout their lifecycle from a single, unified console.
The growing importance of EMM has become widely publicized in the industry. At its recently concluded Gartner Symposium/ITxpo 2013, market research firm Gartner cites “Mobile Device Diversity and Management” as the top strategic technology trend for 20141. And according to Enterprise Management Associates (EMA), 87% of all business professionals will employ a PC and at least one mobile device2, and Forrester reported that 905 million tablets will be in use by 20173.
“The ‘BYOD’ revolution is an irreversible market dynamic that CIOs and IT administrators are forced to deal with since anytime, anywhere computing is the new norm,” said Udo Waibel, CTO at FrontRange. “The big question for enterprises moving forward is ‘How do you balance the personal freedoms of this next-generation mobile workforce with the compliance, data security and management control requirements of IT?’ The answer lies in the intelligent deployment and enforcement of EMM policies that can be delivered easily, cost-effectively and ideally from a single, centralized solution either in the cloud or on-premise.”
As a hybrid EMM solution, HEAT Client Management can support customers as a tenant in a FrontRange-hosted cloud environment or on premise with an easy to configure, pre-installed virtual appliance.
Steve Brasen, Managing Research Director for Systems Management at Enterprise Management Associates (EMA) asserts that “the foundation for ensuring the effective long-term reliable and secure delivery of business IT services (regardless of how the endpoint changes) is laid with the adoption of automated management platforms, like the FrontRange HEAT Client Management solution, that consolidate Enterprise Mobility Management (EMM) processes that enable true workforce mobility.”
With its newly integrated EMM features, HEAT Client Management now offers the following additional capabilities:
- Complete Visibility of Mobile Assets: Mobile ecosystems are supported by automatic device and application discovery that collects real time mobile hardware and asset data, usage and device tracking.
- Device Lifecycle Management: Complete device lifecycle management is provided from a single, web-based administration console.
- Single Point of Control: Smartphone management is centralized and automated to improve IT efficiency and savings.
- Secured Mobile Ecosystem: Corporate policies are seamlessly enforced and potential threats are automatically detected to protect organizations through remote wipe and auto-lock features and application restrictions.
- Instant Workforce Support: Instant remote device troubleshooting improves service desk staff efficiency and increases business productivity through reduced downtime.
- Seamless Data Migration: Migrate between diverse smartphones without suffering data loss, security threats or disruption to end user devices.
- Multiple-OS Support: All major mobile operating systems, including BlackBerry BES and BIS users are supported.
- Self-service: Enterprise end users have complete access to self-help functionality to free up valuable service desk resources.
Some of the substantive advantages of the FrontRange’s offering are:
- Asset Management: All mobile assets are detected and stored in an information library that tracks hardware, software, SIM cards, users and processing information. This provides a real-time view into an organization’s entire mobile ecosystem to help with future policy and resource planning.
- Configuration Management: The correct configuration of all mobile devices deployed within an organization is automatically tracked and maintained at all times and is done transparently to end-users. Data tracking of version and model number, baseline performance and relationship to other assets are just some of the configuration capabilities offered.
- Application Management: All applications employed by end users for business purposes can be accessed from a centralized and secure AppStore. Authentication ensures users are authorized to initiate access and/or download the enterprise applications. Automatic discovery of and reporting on an organization’s mobile device inventory provides a real-time view of the health and usage of all applications. In addition, HEAT Client Management synchronizes data stored on mobile devices over-the-air to provide backup and common access to shared resources while enabling remote administration. Additionally, applications that violate enterprise policies may be disallowed on user devices through black listing or devices may be restricted to only install specific authorized applications via white listing.
- Security Management: Corporate security policies that allow differing access rules for specified groups and shared data, including pre-defined user profiles, are fully supported. In the event of lost or stolen mobile devices, all applications and sensitive data can be removed over the air to prevent security breaches. In addition, IT administrators can selectively wipe sensitive corporate data from an end user mobile device. Plus, if an unauthorized SIM card is detected, the offending device can be locked and wiped.
- Remote Support: IT administrators can now troubleshoot mobile devices over the air and take remote control of them through a data connection (such as GPRS/EDGE/3G, WiFi) to view the device screen and use the device keyboard. This over the air end user support provides rapid diagnostics and problem resolution to reduce IT costs, accelerate the adoption of new services and decrease device downtime to improve workforce efficiency.
The Latest
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...