Enterprise Management of Mobile Devices: Monitoring

Enterprise mobile device management includes continuous monitoring to ensure that the mobile device complies with your organization’s policies at all times. This is different from application control and monitoring, which has more to do with user behavior and the ability to control what the end user is trying to achieve.
The primary objective of device monitoring is to verify that the device is in compliance with the organization’s policies at all times.
An enterprise proxy is usually installed in the provisioning process, and it’s your eyes and ears for every enterprise mobile device. This factor has some unique properties – it needs to consume very little CPU and battery power, and it should be as unobtrusive as possible until a violation is detected.
The CPU budget and power consumed by this proxy is critical because your users will revolt if this proxy causes their smartphones to become unresponsive or drain heavily. Therefore, any seller you choose needs to show a weak and average profile that can perform tasks unobtrusively.
Unobtrusively means that when a device detects and connects to a wireless access point known to the organization, the device monitoring agent monitors that connection to ensure that all communication thereafter remains encrypted.