Kaseya has released the new Kaseya Mobile Device Management module to quickly and easily assist organizations in addressing the proliferation of the bring-your-own-devices (BYOD) trend invading the corporate network.
The Kaseya Mobile Device Management module is part of an integrated and automated IT System Management (ITSM) solution that handles the inherent mobile device challenges of email configuration, back-up, asset visibility, and security for IT professionals in corporate or managed service environments.
The sweeping popularity of Apple’s iPad and iPhone, as well as the Android smart phone, has blurred the lines between personal and corporate devices in organizations globally. Today, employees want one smart phone device that handles both their work and personal email accounts, with access into corporate applications. Additionally, IT professionals have also noticed recent changes in how corporate executives engage in their work; with most preferring to leave their corporate-issued laptops in the office in favor of traveling with their personal Apple iPad as their only work device.
“Businesses are only beginning to experience the impacts of workforce mobilization on improving productivity and are only starting to experience the challenges associated with managing mobile devices,” says Steve Brasen, Mmanaging Research Director for Enterprise Management Associates. “By delivering an integrated platform for managing both traditional computing endpoints and heterogeneous mobile devices, Kaseya has taken a big leap forward in enabling a consolidated, end-to-end management experience that directly addresses emerging mobile technology requirements.”
Faced with the dynamic and varied mobile landscape, CTOs and CIOs are tasked with the need to keep data secure, support costs down and employees’ productivity up. In their review of mobile device management point solutions, many IT Professionals now realize the limitations of point solutions or manual procedures in handling all the security and support challenges in a distinct and separate environment versus a unified and integrated ITSM approach for ease of use in full device management.
The Kaseya IT Systems Management integrated framework is the ideal platform to extend the management to the mobile device. Some of the Kaseya Mobile Device Management (KMDM) key options will include audit, back-up, email configuration and security tracking.
Audit
* Single integrated UI for viewing and searching inventory
* Detailed hardware device information
* Detailed application information
Backup and Restore
* Back-up and restore of user’s contacts
Email Configuration
* Allows administrators to configure and automate the deployment of email setting to groups of devices at once
* Eases manual and time consuming support burden on IT organization
Security Tracking
* Geo Location Tracking leverages inherent capabilities to track location of device in the case of loss or theft
* Send alarm to device to help identify location for user
* Remote lock and wipe features in the event of loss or theft
“We know that addressing the challenges of mobile devices on the corporate network has become a mission critical operation for IT staff. The Kaseya IT systems platform is positioned for full device management from laptop computer, to Android smart phone and Apple iPad,” says Mark Sutherland, President, Kaseya. “With our new Kaseya Mobile Device Management, global IT staff can extend the ITSM benefits to all mobile devices to reduce the cost and effort of manual remediation while enabling security and policy compliance.”
The Kaseya Mobile Device Management 1.0 module will support Apple iPhone, iPad and all Android smart phones and tablets. KMDM will be available globally in Q3, 2011 and will be sold as a standalone application that can also tightly integrated with other applications in the Kaseya framework in either perpetual or subscription licensing on a per-seat basis.
The Latest
An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...