Frequently Asked Questions

Codeproof is a modern mobile device management (MDM) and security platform that allows organizations to securely manage and deploy employee-owned and company-owned devices from a centralized, cloud-based platform. With a user-friendly interface and easy onboarding process, IT administrators can easily manage all their endpoints including mobile phones, PCs, and rugged devices across a wide range of operating systems such as iOS, Android, Windows and MacOS, OEMs, and across all telephone carriers. The platform offers advanced security features, including device encryption, password policies, remote wipe, multi-factor authentication, mobile threat defense, compliance checks, content filtering and secure app management, to protect against cyber threats and ensure compliance with industry regulations. Additionally, Codeproof's platform can be customized to meet specific business requirements, and the company offers personalized customer support. With Codeproof, IT administrators can easily enroll devices, distribute and manage apps, enforce security policies, track device usage and location, and ensure compliance across all devices. This allows organizations to increase productivity, improve security and compliance, and reduce costs associated with managing and securing mobile devices.

Codeproof uses a combination of device management protocols, such as Android's Device Administration API and iOS' Device Enrollment Program, to remotely manage and secure devices. Once a device is enrolled in Codeproof, it can be managed through the Codeproof cloud console.

Yes, Codeproof allows you to manage and secure Android, iOS, Windows and MacOS devices from a single central cloud console.

Mobile device management (MDM) is a type of software that allows organizations to secure, monitor, and manage mobile devices such as smartphones and tablets that are used by employees. MDM solutions are typically used by companies to protect sensitive data that is stored on or accessed by these devices, as well as to ensure compliance with various security and data protection regulations.

For more information, read our MDM page.

Enterprise mobility management (EMM) is the process of managing and securing mobile devices, apps, and data in an enterprise setting. EMM solutions, like Codeproof, provide a way to manage and secure mobile devices, laptops, and desktops, from a single console to improve productivity and ensure data security.

For more information, read our EMM page.

Codeproof provides a comprehensive EMM solution that allows you to manage and secure all your mobile devices, laptops, and desktops, from a single console. With Codeproof, you can easily enroll devices, distribute and manage apps, enforce security policies, track device usage and location, and ensure compliance across all your devices.

Cyber Device Manager is a type of technology that enables organizations to manage and secure all endpoints, such as mobile devices, laptops, desktops, and IoT devices, from a single console. The goal of UEM is to provide a holistic approach to endpoint management by centralizing the management and security of all endpoints, regardless of their type or operating system.

For more information, read our UEM page.

Codeproof is a modern mobile device management (MDM) and security platform that offers unified endpoint management (UEM) capabilities. The platform allows organizations to manage and secure all endpoints, such as mobile devices, laptops, and desktops, from a single console.

Codeproof supports both Android and iOS devices, as well as Windows and MacOS devices, allowing you to manage all your endpoints from a single console. This ensures that all your devices, regardless of their operating system, are secure and compliant with your organization's policies.

Codeproof provides a variety of features that are typically found in UEM solutions, such as device enrollment, app distribution, security policy enforcement, content management, device tracking, remote wipe, and more. These features enable organizations to easily manage and secure all their endpoints, improve productivity, and ensure compliance with various regulations and industry standards.

Additionally, Codeproof's platform provides a single pane of glass interface that allows IT administrators to view and manage all endpoints in one place, making it easier to identify and resolve issues. The solution also allows for customization based on customer requirements and easy onboarding. CodeProof also integrates with other IT systems such as Active Directory, G Suite, and Office 365 to provide a seamless and unified experience.

In summary, Codeproof's UEM capabilities make it an ideal solution for organizations looking to centrally manage and secure all their endpoints, regardless of their type or operating system, while also providing advanced security features, easy onboarding, customization options and integration with other IT systems.

Apple Business Manager (ABM) is a web-based portal for IT administrators to control and deploy Apple devices like iPhone, iPad, some iPods, Apple TV, and Macs from one portal. When mated to a UEM platform like Codeproof, ABM helps IT administrators configure, manage, and secure company and employee-owned devices. ABM makes the device company owned, enables supervised mode and offers zero-touch MDM enrollment.

For more information, read our Apple Business Manager page.

Supervision or supervised mode is a special mode that allows IT administrators and organizations to gain extensive remote controlling capability over Apple devices (iPhone, iPad and Mac). It allows some device restrictions like turning off iMessage or content erase. It also provides additional device configurations and features like web content filtering, preventing app deletion, silently installing and removing apps, disabling access to AirDrop, configuring a global proxy, enabling single-app mode, MDM lockdown, etc.

For more information, read our help center page on supervised devices.

Android Enterprise (AE) is an EMM framework that enables IT administrators to manage Android devices in a workplace. Its range of functionalities for enterprise use includes complete device management, mobile app management, and data containerization for corporate data in company and employee-owned devices operating within a workplace. AE also offers zero touch enrollment.

For more information, read our Android MDM page.

BYOD or “bring-your-own-device" refers to the policy of permitting employees to bring personally owned devices (laptops, tablets, smartphones, etc.) to their workplace, and using those devices to access corporate applications and data alongside personal use.

QR Code enrollment is a fast and efficient method of enrolling a large number of Android devices and optionally connect to a Wi-Fi supported wireless network in both device-owner and profile-owner mode. It is particularly useful in cases where traditional methods like email enrollment are unviable. It offers a zero-touch enrollment without entering user info or credentials.

Device provisioning refers to the process of configuring a device to suit an organization’s needs, including pairing it with an MDM, EMM, or UEM solution. It involves ensuring that the device sends data to the correct place and is identified as trusted on the network. MDMs, EMMs, and UEMs usually allow bulk provisioning of devices.

Kiosk mode is a mode which enables a device to run only one app or a few apps while restricting most other functionalities. Businesses use mobile device management solutions to restrict the functionality of devices to increase employee productivity or restrict users to only specific apps. Devices in kiosk mode are found in restaurants, retail stores, ticket kiosks, hospitals, and other applications where limited functionality is necessary.

In the modern mobile device management solutions, geofencing is a security feature that allows an organization’s policies to be enabled within an administrator specified geographical perimeter or “geofence.” Geofencing policies may include camera blocking, application blocking and email or SMS notifications to administrators.

SiteSecure® is Codeproof’s campus camera blocking solution, which uses geofencing technology to disable smartphone cameras within an administrator specified geographical radius. IT administrators can specify multiple geographical regions from the Codeproof cloud console. SiteSecure® uses a combination of GPS technology, WiFi networks, and BLE beacons to deploy company SiteSecure policies on smartphones.

For more information, visit our SiteSecure® page.

Smart Mobile Hotspot is a solution which turns smartphones into secure mobile hotspots managed from the Codeproof cloud console. It can then be used in lieu of a router to connect any devices to the internet when dealing with untrustworthy networks or in areas where WiFi is in short supply.

For more information, visit our Smart Mobile Hotspot page.

Codeproof supports Android OS 2.2 (Froyo) and above, iOS 4.1 and above, and Windows 10 and above, and MacOS 10 and above.

Codeproof supports mobile phones, tablets and PCs including (but not limited to) iPhone, iPad, Samsung, LG, Sonim, Kyocera, Motorola and various rugged devices.

For list of supported devices visit here.

COPE stands for Corporate Owned Personally Enabled refers to the company owned mobile devices. It allows employees to choose the company approved device they prefer while also enabling them to use it both personally and professionally.

Codeproof built a web-based console that can be accessed from any device by simply signing in to your account. Using the Codeproof Cloud Console, you have complete control over all your mobile devices. Codeproof Console is hosted on Amazon cloud.

Codeproof Mobile Antivirus scans and removes malicious malware apps from your phones and tablet devices. It is built on the cloud, so devices always have up-to-date malware signatures. (you don’t have to worry about updating malware databases on the devices).

iOS doesn't not allow installation of apps outside of the iTunes App Store, unless the device is jailbroken. Since all iOS apps are rigorously checked during the application review process, Apple has created a very secure platform.

Jailbreaking is a term used to describe the application security state in a mobile device. If a device is jailbroken, that means, an app can gain access and control any part of the phone's operating system, regardless of the original protections put in place by the OS manufacturer. For instance, one app can access other app's data, make changes, communicate sensitive data, etc. Phones that are jailbroken are therefore more vulnerable to external threats. For more info, go here.

Sideloading is a term used to describe the way apps are installed on a device. Typically, if you install apps without using official built-in app stores then it is called sideloading. This is very common in Android OS.

Data wipe means deleting all the data on a device, including installed apps, contacts, photos, documents from a phone or tablet device. Used as a last-line-of-defense security measure (for instance if a phone is misplaced that has very sensitive data on it) a data wipe can be issued remotely using the Codeproof Console.

Yes. Our entire backend is built and hosted on Amazon AWS. Amazon AWS is compliant with PCI and FIPS 140-2. All the communications from our App in the device to backend uses industry standard SSL encryption. For more info about AWS data protection standards and compliance, visit AWS’ compliance page.

To read more about how Codeproof secures you, visit our compliance page.

Devices can be enrolled in Codeproof through the Codeproof mobile app or by using the QR code or token provided during the initial setup.

Yes, Codeproof allows you to manage both corporate-owned and employee-owned devices through the use of the Android Enterprise or iOS device enrollment program.

Yes, Codeproof allows you to distribute and manage apps on enrolled devices, including the ability to restrict access to certain apps.

Yes, Codeproof supports multi-factor authentication to ensure that only authorized users can access the management console.

Codeproof allows you to enforce a variety of security policies on enrolled devices, including password policies, device encryption, and remote wipe.

Yes, Codeproof allows you to track the location of enrolled devices in real-time.

Codeproof allows you to manage and secure your mobile devices through features such as device enrollment, app distribution, security policy enforcement, and device tracking. With Codeproof, you can ensure that your mobile devices are secure and compliant with your organization's policies.

Codeproof allows you to manage and secure all your endpoints, including mobile devices, laptops, and desktops, from a single console. With Codeproof's unified endpoint management, you can easily manage and secure all your devices, regardless of their operating system or device type.

Yes, Codeproof allows you to enforce security policies that help keep your devices compliant with industry regulations and standards, such as HIPAA and PCI-DSS.

Yes, Codeproof allows you to deploy updates and patches to your devices, ensuring that they are always up-to-date with the latest security fixes and features.

Yes, Codeproof allows you to restrict access to certain features on your devices, such as the camera, microphone, and cellular data, to ensure that your devices are being used in compliance with your organization's policies.

Yes, Codeproof allows you to remotely lock or wipe a device in case it is lost or stolen, ensuring that your data remains secure.

Yes, Codeproof allows you to monitor device usage to ensure that your devices are being used in compliance with your organization's policies.

Codeproof can integrate with other IT systems such as Active Directory, G Suite, and Office 365 to provide a seamless and unified experience.

Yes, Codeproof allows you to manage and secure IoT devices as well, ensuring that all your devices are secure and compliant with your organization's policies.

Yes, Codeproof allows you to check the compliance of your devices with your organization's policies and ensure that they are configured correctly and are secure. Compliance checks can include checks for device encryption, password policies, and software updates.

Yes, Codeproof allows you to create custom policies for your devices, giving you full control over how your devices are configured and secured.

Yes, Codeproof allows you to monitor your device inventory, including information such as device model, OS version, and app version, to ensure that your devices are up-to-date and fully compliant with your organization's policies.

Yes, Codeproof allows you to generate reports on device usage and compliance, giving you a comprehensive view of your device fleet and helping you identify any issues that need to be addressed.

Yes, Codeproof allows you to set up automatic alerts for compliance issues, so you can take action quickly and keep your devices secure.

Yes, Codeproof supports mobile application management, which allows you to manage and secure the apps installed on your devices, including the ability to distribute and remove apps, set up app whitelists and blacklists, and monitor app usage.

Yes, Codeproof now supports Windows and MacOS device management. This allows you to manage and secure all your devices, including mobile, laptops, desktops running Windows and MacOS, from a single console. This feature allows you to enforce security policies, distribute and manage apps, track device usage and location, and ensure compliance across all your devices.

Codeproof provides a variety of security features, including device encryption, password policies, remote wipe, multi-factor authentication, and compliance checks. These features help ensure that your devices and data are secure and compliant with your organization's policies.

Codeproof ensures data security through a combination of security features such as device encryption, password policies, remote wipe, and compliance checks. Codeproof also provides the ability to manage and secure apps, allowing you to control access to sensitive data.

Yes, Codeproof provides a mobile threat defense feature that allows you to detect and prevent mobile threats on your devices, including malware, phishing, and other malicious activities.

Yes, Codeproof supports containerization which allows you to separate personal and corporate data on the device, ensuring that sensitive company data remains secure while still allowing employees to use their own devices for work.

Codeproof allows you to enforce security policies and compliance checks on your devices, ensuring that they are configured correctly and are in compliance with industry regulations and standards such as HIPAA and PCI-DSS.

Codeproof provides a comprehensive solution for securing mobile devices, laptops and desktops and provides a number of security features such as device encryption, password policies, remote wipe, multi-factor authentication, mobile threat defense, compliance checks, and secure app management to help protect against cyber threats.

Codeproof provides a mobile threat defense feature that allows you to detect and prevent mobile malware on your devices. It uses advanced machine learning algorithms and security intelligence to detect and block mobile malware, including malware, phishing, and other malicious activities.

Yes, Codeproof provides a mobile threat defense feature that can detect and prevent phishing attacks on mobile devices. It can block malicious links and detect phishing attempts, including SMS phishing, email phishing, and browser-based phishing.

Codeproof provides a number of security features to help protect against data breaches, including device encryption, password policies, remote wipe, and secure app management. These features help ensure that your devices and data are secure and that sensitive data is not accessible to unauthorized users.

Codeproof provides a number of security features to help protect against data loss, including device encryption, password policies, remote wipe, and secure app management. These features help ensure that your devices and data are secure and that sensitive data is not lost or stolen.

Codeproof allows you to enforce security policies and compliance checks on your devices, ensuring that they are configured correctly and are in compliance with industry regulations and standards such as HIPAA and PCI-DSS. Codeproof also provides the ability to generate compliance reports, making it easy to demonstrate compliance with these regulations.

Yes, the Codeproof dashboard is designed to be user-friendly and easy to navigate, even for non-technical administrators. The dashboard shows device icons in a tree structure, making it easy to navigate to a specific device and push policies.

Yes, the Codeproof dashboard is designed to be user-friendly and easy to navigate, even for non-technical administrators.

Yes, Codeproof offers personal customer support and is known for going the extra mile to help customers with their needs.

Yes. Email technical support is available 24/7. The telephone support is available Monday to Friday from 9AM to 6PM.

For more information, please contact our support page.

Yes, Codeproof offers customization of its MDM product based on customer requirements to cater to the specific needs of the organization.

Yes, Codeproof subscription can be purchased online securely using major credit cards.

Yes, Codeproof offers a 14-day free trial for interested users to test out the platform's features and functionality before subscribing to a paid plan.

To get started with Codeproof, simply sign up for a free trial at codeproof.com. After signing up, you can start enrolling devices and managing them through the Codeproof cloud console.

In order to cancel your Codeproof service, please contact our support page.

Yes, Codeproof's MDM software technology is patented in the United States. They have been granted U.S. Patent No. 9,083,752 for their technology. This patent means that the technology is protected by the patent laws of the United States and gives Codeproof the exclusive right to prevent others from making, using, selling, and importing their invention for a certain number of years. This patent is an indication of the uniqueness and originality of the technology that Codeproof has developed and it gives them a competitive advantage in the market.

Codeproof Technologies Inc is headquartered in Sunnyvale, CA.

Maximize employee productivity through Codeproof