
(16)
4.9 out of 5
Visit Website
Sponsored
Multi-Systems Support | Supports differing operating systems and mobile devices This feature was mentioned in 123 Scalefusion reviews. | 91% (Based on 123 reviews) | |
Apple Support | As reported in 93 Scalefusion reviews. Supports Apple devices | 85% (Based on 93 reviews) | |
Android Support | Support Android devices 152 reviewers of Scalefusion have provided feedback on this feature. | 91% (Based on 152 reviews) | |
Multiple Mobile Operating System Support | Supports differing operating systems and mobile devices This feature was mentioned in 43 Scalefusion reviews. | 90% (Based on 43 reviews) | |
Apple Support | Based on 30 Scalefusion reviews. Supports Apple devices | 80% (Based on 30 reviews) | |
Android Support | Based on 50 Scalefusion reviews. Support Android devices | 90% (Based on 50 reviews) |
Applicatons Management | Centrally manages, configures, and oversees applications on employees' mobile devices This feature was mentioned in 159 Scalefusion reviews. | 91% (Based on 159 reviews) | |
Applications Consolidation | As reported in 108 Scalefusion reviews. Separates work apps and data from personal apps and data | 90% (Based on 108 reviews) | |
Whitelist | Implements whitelist policy to easily and securely deploy recommended or required applications This feature was mentioned in 139 Scalefusion reviews. | 90% (Based on 139 reviews) | |
Blacklist | Based on 115 Scalefusion reviews. Implements blacklist policy to block unwanted or suspicious applications | 89% (Based on 115 reviews) | |
Usage Information | Offers visibility into employee mobile device activity This feature was mentioned in 138 Scalefusion reviews. | 90% (Based on 138 reviews) | |
Applicatons Management | Based on 51 Scalefusion reviews. Centrally manages, configures, and oversees applications on employees' mobile devices | 88% (Based on 51 reviews) | |
Applications Consolidation | As reported in 46 Scalefusion reviews. Separates work apps and data from personal apps and data | 89% (Based on 46 reviews) | |
Whitelist | Implements whitelist policy to easily and securely deploy recommended or required applications 47 reviewers of Scalefusion have provided feedback on this feature. | 87% (Based on 47 reviews) | |
Blacklist | Implements blacklist policy to block unwanted or suspicious applications 40 reviewers of Scalefusion have provided feedback on this feature. | 86% (Based on 40 reviews) | |
Usage Information | Based on 47 Scalefusion reviews. Offers visibility into employee mobile device activity | 90% (Based on 47 reviews) | |
Device Enrollment | Based on 23 Scalefusion reviews. Registers employee-owned or company-distributed devices for IT access. | 92% (Based on 23 reviews) | |
Device Configuration | Based on 22 Scalefusion reviews. Configures devices to seamlessly work with business-required applications, WiFi, VPN, etc. | 89% (Based on 22 reviews) | |
Device Compliance | Ensures that employee devices are compliant with business regulations and requirements. 19 reviewers of Scalefusion have provided feedback on this feature. | 94% (Based on 19 reviews) | |
Usage Information | Offers visibility into employee device activity. 18 reviewers of Scalefusion have provided feedback on this feature. | 93% (Based on 18 reviews) | |
Data Separation | Separates personal data on devices from business-specific data. This feature was mentioned in 17 Scalefusion reviews. | 95% (Based on 17 reviews) |
Remote Wipe | As reported in 113 Scalefusion reviews. Enable the remote locking down and encryption of employee mobile devices | 89% (Based on 113 reviews) | |
Security | Protects employee, company, and data from potential vulnerabilities or malware This feature was mentioned in 138 Scalefusion reviews. | 91% (Based on 138 reviews) | |
Device Management | Based on 54 Scalefusion reviews. Unifies endpoint management of employee devices | 88% (Based on 54 reviews) | |
Custom Alerts | Based on 40 Scalefusion reviews. Creates custom reports and alerts about existing or upcoming software licenses and security updates | 82% (Based on 40 reviews) | |
Security | Based on 45 Scalefusion reviews. Protects employee, company, and data from potential vulnerabilities or malware | 86% (Based on 45 reviews) | |
Reporting and Alerts | As reported in 19 Scalefusion reviews. Creates custom reports and alerts about security updates, existing or upcoming software licenses, data access, and more. | 94% (Based on 19 reviews) | |
Endpoint Protection | Based on 18 Scalefusion reviews. Protects employee, company, and data from potential vulnerabilities or malware. | 90% (Based on 18 reviews) | |
Remote Wiping | As reported in 18 Scalefusion reviews. Remotely clears all data from compromised devices. | 93% (Based on 18 reviews) |
Regulation Compliant | Ensures that employees mobile devices are compliant with business regulations and requirements This feature was mentioned in 126 Scalefusion reviews. | 90% (Based on 126 reviews) |
Regulation Compliant | Based on 44 Scalefusion reviews. Ensures that employees mobile devices are compliant with business regulations and requirements | 86% (Based on 44 reviews) | |
Device Enrollment | As reported in 52 Scalefusion reviews. Registers employee-owned or company-distributed mobile devices for IT access | 92% (Based on 52 reviews) | |
Device Configuration | As reported in 52 Scalefusion reviews. Configures mobile devices to seamlessly work with business-required applications, WiFi, VPN, etc. | 90% (Based on 52 reviews) |
Endpoint Inclusiveness | Manages numerous endpoint types, including mobile, desktop, IoT, and wearable. This feature was mentioned in 19 Scalefusion reviews. | 89% (Based on 19 reviews) | |
Multi-OS Support | Based on 23 Scalefusion reviews. Supports diverse operating systems across several endpoint types. | 93% (Based on 23 reviews) |
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. | Not enough data | |
Password manager | Offers password management tools to end users. | Not enough data | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | Not enough data | |
Enforces policies | Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | Not enough data | |
Authentication | Authenticates users prior to granting access to company systems. | Not enough data | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. | Not enough data |
On-premises solution | Provides an IAM solution for on-prem systems. | Not enough data | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Tracking | Tracks user activities across protected systems. | Not enough data | |
Reporting | Provides reporting functionality. | Not enough data |