- Enterprise Launcher
- Single Sign-On
- Device Finder
- Device Check-In/Check-Out
- Plus many More
Welcome, and thanks for joining. My name is Patrick, and today I’m going to give you an overview of BlueFletch Enterprise and highlight some of the tools we have available for securing and managing your Android devices.
Let’s start by looking at some of the features and tools we have available. The areas in blue will be demonstrated later in this presentation, so make sure you stick around to see that live demo. For login and authentication, our enterprise launcher acts as the home screen for your devices. This controls a user’s access to applications and provides a secure browsing experience to make sure users are only able to access applications available to them.
We have a single sign-on authentication module that can hook up to your existing identity provider, such as Okta, paying Azure AD, or any OIDC-compliant identity providers. And to make it quick for users to get back into their session, we provide multiple real authentication methods, such as PIN code, face recognition, and NFC badge tap to ensure devices are locked down and able to be recovered. I’ll be highlighting our device finder feature to locate devices within your organization.
We also have low battery alarms, remote control, and the ability to remotely device white to ensure maximum security and prevent devices from being lost or misplaced in your organization.
Finally, with user and device compliance, our support application is responsible for sending all telemetry data and metrics from devices for reporting. This provides device check-in and check-out reporting to know who’s using a device and when. I’ll also highlight identity provider integration, as I mentioned, with out-of-the-box support for Okta and Azure AD.
Now, let’s look at a high-level user flow of shared devices in the enterprise. In its simplest terms, this diagram represents the shared device lifecycle. A user will pick up a device that’s completely locked down and ready for login when they trigger login. BlueFletch will then call directly out to your company standard for identity and security and allow a user to log in with their credentials. We know what role and what group a user belongs to, so we can provide a customized and secure access for that user based on their role. A user can access any of their applications with single sign-on using modern OIDC and Oauth protocols, and SAML as well for web apps. Once that user is done for the day, click the logout button. Here, BlueFletch will then clean up all user session information and clear the cache of user data on the device. The device will then be in a complete reset and clean mode for the next user to pick up and continue their work.
Now let’s dive deeper into the enterprise launcher. This is your home screen replacement for Android rugged devices. It’s very customizable and built with security as our number one priority. As mentioned, we support single sign-on and are compatible with any major identity provider. We restrict access to applications based on a user’s role or group within an organization. And provide access to apps that are only required for users day to day operations. Since we’re having a user log in and log out of the device, we’ve got a much better accountability chain, almost like checking out a library book at the library. And then, when a user is done, we can clear all that cache data immediately upon logout or cradling of the device. There’s some other features we’ll get into later in our demo, but do you know that this is extremely customizable and configurable for your organization?
The next Apple occasion I wanted to highlight is the support application. This is an application and service that runs on your device to capture real-time data and better support your device fleet remotely. We collect over 25 hardware data points every 30 minutes, information about your software and operating systems that are installed. And we have a front-end UI that users can leverage to contact the help desk and quickly get support for any of their issues. This is also the backbone of our check-in check-out data to know who’s using a device and where they might have been using it last. There’s also an SDK. And we can feed this data to Splunk and Power BI if you have additional integration options.
If you have any questions, please make sure you reach out to me at my contact info here. I know that was pretty brief and high-level, but it might make more sense to jump into a demo.
Want to know more information? Email us at firstname.lastname@example.org