G Suite Device Management

Because company devices should be easy to manage.

G Suite’s Device Management tools allow for smooth provisioning and management of all company owned devices, including Chrome OS, Windows, MacOS, Android and iOS devices.

Device management is split into 3 categories: Mobile Device Management, Chrome Device Management & Endpoint Verification

Mobile Device Management

Keep things simple – and moving. Mobile Management for Android, iOS, Windows and other smartphones is easy to set up and easier to use.

Lost phone? Stolen tablet? These things happen. Keep your company’s data secure with MDM. You can require screen locks and/or strong passwords, and erase confidential data with device wipe or selective account wipe for Android and iOS. There are a magnitude of policies you can deploy on an administrator level, and thus you can have utmost control over your organisation’s mobile devices.

Simplify device management in your organisation with G Suite.

Enforce passcodes and wipe specific accounts without installing software on a user’s device with agentless mobile management. This feature is on by default.

Track mobile usage and trends with visualised data found in the reporting section whenever you want, this way you can gain valuable insights as to how your organisation uses mobile devices.

Chrome Device Management (CDM)

As an IT admin for a business or school, you can manage Chromebooks and other Chrome devices, from a cloud-based Admin console. Enforce policies, set up Chrome features for users, provide access to your internal VPNs and Wi-Fi networks, force install Chrome apps and extensions, and more. Find out more about CDM policies, features and licence types here.

Enjoy faster deployment, managed security, and IT support when you need it, and that’s just the beginning.

Cobry can help you deploy, provision, and actively protect against security threats for you and your organisation – We know exactly what to look out for.

Choose from a variety of Chrome Devices, including touch and flip devices. Each device is built to enable every cloud worker, from the office to the frontline.

Endpoint Verification

Endpoint Verification is used to manage devices outside of the Google eco-system, such as Windows and macOS

As an administrator, you can see details about all devices that have access to your organization’s data through Chrome Web Browser. For example, you can see information about the OS, device type and user, as well as having the ability to enforce policies and remote wipe corporate data if a device is lost or stolen.

You can also approve or block access for specific devices based on “any criteria” — for example, lost laptops, or PCs belonging to newly-promoted users who need access to an expanded set of internal apps.

Want to know more?

We can help you manage these policies, recommend best practices and audit the management policies of your organisation to help you optimise the deployment and management of your devices.