|SANCTION is the Device Management component of the OpenPeak ADAM suite of products. SANCTION allows SMBs, enterprises, and service providers to track, provision, and fully manage their customers’ mobile devices and applications while providing policy and security controls via the OpenPeak ADAM Administrator web portal.
SANCTION can be deployed as a stand-alone device management solution or in tandem with other products within OpenPeak’s ADAM platform to provide a complete end-to-end solution. This includes full separation of work and personal workspaces, the ability to push applications and content, revoke problem applications on specific devices, and manage configuration bundles that can be distributed to a large group of devices.
SANCTION is the Device Management component the OpenPeak ADAM suite of products. SANCTION allows SMBs, enterprises, and service providers to track, provision, and fully manage their customers’ mobile devices and applications while providing policy and security controls via the OpenPeak ADAM Administrator web portal.
SANCTION under ADAM allows an organization to keep track of its deployed devices and manage the users associated with the devices. An administrator can examine the firmware version of a device, assign a device to a user or reassign a device, including transferring settings.
The IT administrator can exercise a detailed level of control over deployed devices. Data roaming can be enabled or disabled. Firmware can be uploaded and the device can be rebooted remotely. On-device hardware, such as the camera, speaker, and microphone, can be disabled or enabled dynamically. A comprehensive logging capability reports Bluetooth, Radio Interface Layer (RIL), and Wi-Fi statistics as well as device configuration details, device usage statistics, and event logs.
SANCTION allows network settings to be provisioned remotely, including pushing certificates to devices, configuring VPNs, and configuring SSIDs on Wi-Fi networks. Once a device is enabled with SANCTION, the ADAM portal tracks cellular data usage and can log roaming activity, call statistics, and dropped calls.
A powerful capability within SANCTION is Policy-based Management. This provides rules-based, event-driven control of on-device operations.
For example, a policy may force the use of a VPN if a user is not on a particular Wi-Fi network. Another policy may ensure compliance by disallowing the use of an application or entire virtual workspace during certain times. Geolocation can be incorporated into policies to, for example, lock a device if it is outside a particular geographic region.
SANCTION provides a notification service where an administrator can send audio or text alerts to a single device or a group of devices. These alerts can be anything from lost device messages, to meeting notices, to weather condition or safety notifications.
To aid in customer support, an administrator or customer support agent can request a web-based presentation of a user’s mobile desktop, updated dynamically. This is ideal for troubleshooting with a the device user on the phone.
Via SANCTION, IT administrators can define a password policy for devices, configure VPNs, and force the use of VPNs. If a device is lost, its location can be obtained from the ADAM portal. The device can be remotely locked and both audible and visual notifications can be sent to it. If a device is truly lost, stolen, or taken out of service, the administrator can remotely wipe all data from the device. If an employee forgets a password, the administrator can reset it remotely.
Sanction contains a policy-driven reporting engine that provides both device-based and application-based reporting functionality. Device-based reporting provides feedback such as firmware version, installed apps, application usage, device location, etc. Application-based reporting focuses on application specific extensions. These might include things like call history, energy usage, test scores, etc. Administrators can effectively use this data to streamline business operations and reduce costs. This can be accomplished by identifying network performance issues and coordinating network optimizations more effectively.