The Pro Plan offers enhanced visibility into employee routes with notifications and automated actions tailored to your needs. This plan includes all the functionalities listed below.
Inventory Management:
Device inventory report.
Device data such as internal storage, memory card, user data, manufacturer, model, version, IMEI, Serial Number, activation date, user email, ID.
Audit Logs:
View actions performed in the Pulsus database (WEB).
Identify affected items, actions taken, the administrator responsible, and the origin of the action.
Allowed Actions:
Reboot, synchronization, push message, sound alert, user recertification, lock and unlock, data wipe, management removal.
Parameter:
Information capture time: 60 minutes.
Alerts:
SIM card change alert.
Notification tab for WEB admin with information on SIM card removal or insertion.
Location:
View the last 15 captured locations of the device.
Disable Factory Reset Settings:
Protects the device against unauthorized factory reset actions through the settings menu.
Restrict Account Activation after Factory Reset:
FRP (Factory Reset Protection) prevents the device from restarting without adding the account registered in Pulsus after a factory reset.
Disable Screenshot Capture:
Prevents the user from taking screenshots of confidential corporate information.
Disable USB File Transfer:
Prevents file sharing via USB, avoiding the export of corporate data to unauthorized devices.
Disable Debugging Features:
Prevents debugging on the device, reducing the risk of data leaks and associated risks.
Installation of Apps from Unknown Sources:
Prevents unauthorized installation of apps from unauthorized sources, avoiding the installation of malicious apps or apps that may impact device performance or user productivity.
Disable Physical Media Card Reading:
Blocks the use of SD cards, preventing the insertion, copying, or importing of unauthorized and contaminated content and files.
Disable NFC Data Sharing:
Prevents extraction of files/information with potential sensitive corporate data.
Manage System Update Policy:
Define a permissible period for possible system updates, allowing the IT team to work on necessary adjustments before updates occur and also avoiding OS (operating system) updates during business hours, impacting operations.
Set Date and Time Automatically:
Automatically set date and time to prevent potential fraud by users attempting to manipulate the system or applications that use date/time as a reference for user-performed actions.
Force High Precision Location:
Activates features in the Android operating system, such as GPS, WiFi, and mobile networks, to determine the device's location with greater accuracy and speed.
Prevent User from Adding or Removing Accounts:
Prevents the user from adding unauthorized accounts to the device, mitigating risks with improper actions, such as installing unauthorized apps and using unofficial email tools from the company, compromising security, performance, and productivity.
Prevent Google Play Protect from Being Turned Off on Devices:
Essential feature to ensure that Play Protect is running and checking for the presence of malicious applications in real-time, using a global database of information from Google and other partners.
SSO Login:
Allows the WEB Administrator's login to use Single Sign-On (SSO) through SAML (Security Assertion Markup Language), a feature that not only simplifies day-to-day tasks but also enhances digital security.
Allowed Sites:
Important for controlling access to inappropriate content, for example, preventing students from accessing pages verified in advance by educational institution authorities.
Device Password Pattern:
Security feature that forces the user to implement a screen lock password on the device, according to the complexity level defined by the company administrator.
Certificates - CA Distribution via Upload:
Allows the upload and installation of CA certificates on company devices. With CA certificate installation, it is possible to: enable secure access to corporate sites (SSL) and enable data traffic encryption.
Launcher or Kiosk Mode:
Allows the administrator to replace the original interface of the devices, customizing the wallpaper, available applications, and authorized features.
BYOD: Profile Separation (Work/Personal):
Allows the creation of an isolated work profile, separating personal and corporate data. Typically used for personal devices accessing corporate resources while maintaining the security of company data or corporate-enabled devices for personal use, isolating corporate information for secure and separate personal resources.
App Installation Report:
Provides an overview of installed applications on active devices in the environment, with installation status information and their versions. This view allows more effective management of applications, such as outdated versions that may impact technical compatibility or security issues.
Disable Firmware Update (OTA):
This function allows blocking device firmware updates. This feature is important if your company has applications that may not be ready to run automatically on new versions of the operating system.
Disable Airplane Mode:
For operations that do not depend on this mode, the policy prevents devices from being placed in airplane mode to avoid interruptions in information synchronization. Use cases include device theft, where the thief puts the device in airplane mode to avoid tracking.
Disable Tethering Mode:
Assists companies in controlling expenses with mobile data packages and disables the internet sharing mode to other devices, helping companies control mobile data expenses.
APN Configuration:
Allows manual configuration of APN (access point name), carrier connectivity configuration, which in some operations may need to be done manually (MVNOs, private APNs, etc.).
Location Report:
Ideal for advanced administrators to conduct more complex analyses involving location, speed, etc. With these reports, our clients have conducted analyses of absence at points of sale or points of interest.
WiFi Management:
Allows the administrator to manage WiFi connection, pre-configuring networks (SSID, protocol, and password), and defining the WiFi status (Force on, off, or neutral). For example, in operations with very sensitive data, forcing WiFi off can be important to prevent sensitive data traffic on unknown networks.
Prevent User from Turning Off WiFi:
Allows the company administrator to prevent the user from turning off the device's WiFi, interrupting synchronization of the device with the Pulsus platform.
Allowed Phones:
Allows controlling the device to make and/or receive calls, choosing which phones the user is allowed to call or receive calls from.
Email - Remote Configuration of Corporate Email Account:
Allows pre-configuration of the email client when installed on devices, depending on the implementation inserted by the email client developer.
PlayStore Access Control (Whitelist/Allowed):
Allows Pulsus Administrator to restrict the apps available in the Play Store for the user to access through the device. Only apps defined by the Administrator will be accessible to the user, preventing the installation of unauthorized apps.
Overall Data Consumption:
View mobile data usage by company group and by device in the last 45 days.
Remote View:
The company administrator will be able to remotely access the system and provide visual guidance to the user on the necessary actions to resolve the problem.
App Installation Parameterization:
Installation through the Store (Play Store and Apple Store).
Installation through the installer app (APK, IPA).
Custom app settings (Managed Configuration).
Creation and distribution of WebApps (WebView).
Distribution of Files and Folders (Android Only).
Distribution limit of 250mb.
Dashboard:
App Installation Statistics.
Inventory by Model and by Operating System Version.
General Battery Status.
General Memory Status.
General Storage Status.
Call Reports:
Allows viewing calls made on devices in a report, with information such as ID, name, call date, contact number, call type, and duration.
Application Data Usage Reports:
Allows exporting the time (in seconds) of app usage that remained in the foreground during device use, as well as the date of last usage, among other information. You will have access to the last 7 days of usage.
Logs of Outgoing, Incoming, and Missed Calls:
Record of all calls made, received, and missed by a device.
Advanced WiFi:
WiFi network configuration with a certificate.
VPN Configuration (even more secure access):
Allows the administrator to select the default VPN app (always-on VPN) and behavior in case the connection is unavailable (allow or block traffic).
Overall Data Consumption in the Last 6 Months:
Analyze your users' data consumption and gain insights such as the best data plan to be contracted, users who use the most, applications that consume the most resources, etc.
Driver Mode:
Accident protection feature where the administrator can select which applications can be used during travel (e.g., Waze, Google Maps). Prevents distraction while driving, avoiding fines, accidents, and associated costs.
Time Fence (Operating Hours):
Allows defining days and hours for access to corporate resources/apps, avoiding unnecessary overtime.
Remote View:
The company administrator will be able to remotely access the system and provide visual guidance to the user on the necessary actions to resolve the problem.
Remote Control:
More advanced than Remote View, it allows the administrator to access and operate their devices remotely. This way, the support person will be able to control the device remotely and perform necessary actions on the devices.
[Battery] Energy and Health Management:
Monitor technical battery issues through the health indicator and temperature.
Terms of Use:
Allows the mass sending of Acceptance Terms to users with active devices on Pulsus and also acts in the control/management of users who have already accepted the terms.
Geofence:
Allows the creation of geographical fences and application of rules based on entry and/or exit from defined areas. With Geofence, it is possible to record events or even block the device if it is not desirable to allow use inside or outside the fence.
Tracking:
Allows generating estimated movement based on captured locations, identifying approximate routes. Useful to assist in travel cost analysis and reimbursement.