{"id":1906,"date":"2019-11-27T08:00:40","date_gmt":"2019-11-27T08:00:40","guid":{"rendered":"https:\/\/cortadoblog1.wpengine.com\/android-device-management\/"},"modified":"2024-01-11T10:14:44","modified_gmt":"2024-01-11T10:14:44","slug":"android-device-management","status":"publish","type":"post","link":"https:\/\/blog.cortado.com\/en\/android-device-management\/","title":{"rendered":"Android Enterprise Management Explained"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">This guide looks at the management of Android devices in the enterprise, classroom and more. It introduces the Android Enterprise management features and how to use them.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"959\" height=\"544\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg\" alt=\"Thanks to Android device management, Android devices serve a secure companion for everyday work. \" class=\"wp-image-1934\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg 959w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management-300x170.jpg 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management-768x436.jpg 768w\" sizes=\"(max-width: 959px) 100vw, 959px\" \/><figcaption class=\"wp-element-caption\">Thanks to Android device management, Android devices serve as secure companions to everyday work. <\/figcaption><\/figure>\n\n\n\n<p><strong>Overview<\/strong>:<\/p>\n\n\n\n<strong><ul><li><a href=\"#power-of-android\">The Power of Android at Work<\/a><\/li><li><a href=\"#android-enterprise\">What is Android Enterprise?<\/a><\/li><li><a href=\"#importance-android-device-management\">What Are the Risks?<\/a><\/li><li><a href=\"#management-overhead\">Mobile Devices Also Increase the Management Overhead<\/a><\/li><li><a href=\"#important-features\">Important Features to Know<\/a><\/li><li><a href=\"#deployment\">How to Manage Android Devices with MDM<\/a><\/li><li><a href=\"#takeaways\">Key Takeaways<\/a><\/li><\/ul><\/strong>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-introduction-the-power-of-android-at-work\">Introduction: <strong>The Power of Android at Work<\/strong><\/h2>\n\n\n\n<p>Android, Google\u2019s incredibly powerful mobile operating system, is secure and feature rich. It is also supported by the world\u2019s largest app distribution platform, offering access to over a million apps. <\/p>\n\n\n\n<p>Businesses and organizations worldwide are using Android devices to increase productivity, whether for their users working remotely, or on the shop floor, in the warehouse or in the classroom. <\/p>\n\n\n\n<p>However, if you want to use consumer-grade mobile devices for professional purposes, you should be aware of the challenges and risks.<\/p>\n\n\n\n<p>With <strong>Android Enterprise<\/strong> management features and a&nbsp;<strong>mobile device management solution (MDM)<\/strong>, it&#8217;s easier to minimize security risks and still turbo-charge productivity.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Android Enterprise: Transform Your Business\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/LUBImNLv86A?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"android-enterprise\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-android-enterprise\"><strong>What Is Android Enterprise? <\/strong><\/h2>\n\n\n\n<p>Essentially, Android Enterprise is a framework of management APIs (application programming interfaces) from Google. Mobile Device Management providers use these to enable management of Android devices.<\/p>\n\n\n\n<p>IT admins can deactivate individual components on a device if needed (like camera usage, changing a wallpaper or copying and pasting text), quickly set up multiple devices for workers (like pre-installing apps and setting up e-mail) and more. <\/p>\n\n\n\n<p>It has seen a lot of changes since its first release in 2014, back when it was called Android for Work.<\/p>\n\n\n\n<p>Now it offers a wealth of different features and capabilities that enable the <strong>secure<\/strong> and <strong>simplified<\/strong> management of Android devices in the enterprise.<\/p>\n\n\n\n<a name=\"importance-android-device-management\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-are-the-security-risks\"><strong>What Are the Security Risks?<\/strong><\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/youtu.be\/jnUiJi4hts4?t=2799\">Cybercrime costs amounted to 1 trillion dollars in 2018<\/a><\/strong>. Employees and their mobile devices can sometimes be inadvertently responsible for these costs. For example, workers regularly bring mobile devices to work and open documents, emails or make business calls \u2013 regardless of whether it is actively encouraged or not. This alone poses a <strong>minimum of two<\/strong> <strong>risks<\/strong>. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Smartphones, like all other endpoints, are vulnerable to malicious attacks. Workers can download unsafe apps from untrusted app stores. Sometimes they are unaware of what connections their apps have with outside servers and what information they are capable of accessing on the device. If unencrypted Wi-Fi connections are used on the move, these devices can open the door for company data to be intercepted and accessed.<br><br><\/li>\n\n\n\n<li>Sensitive data and login credentials quickly accumulate on work devices, meaning unmanaged smartphones infringe internal IT compliance guidelines and other legal requirements. Furthermore, international obligations imposed by the <strong><a href=\"https:\/\/www.cortado.com\/en\/resource\/enterprise-mobility-eu-gdpr\/\">European General Data Protection Regulation<\/a><\/strong> can lead to heavy fines. Add this to the fact that devices are often lost or stolen, and a major risk develops.<\/li>\n<\/ul>\n\n\n\n<a name=\"management-overhead\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mobile-devices-also-increase-the-management-overhead\">Mobile Devices also Increase the Management Overhead<\/h2>\n\n\n\n<p>That being said, the Android Enterprise management isn&#8217;t just about increasing security. IT admins use Android Enterprise to quickly integrate multiple mobile devices with existing company infrastructure. Let&#8217;s take a look at an example scenario:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Imagine that the decision has just been taken to roll out 250 mobile devices to help workers work remotely. Custom apps need to be installed on each device. Each user needs to be able to access their emails too. Some devices require extra policies or connection settings. Consider the amount of resources required to manually implement these changes across a large scale, alongside the room for error without automation.<br><br><\/li>\n\n\n\n<li>Now, expand this further into the phase where dozens of users are already using Android devices at work. A new situation arises which forces changes to be made on all devices: perhaps a new app is developed or some devices require an operating system update. How do you implement the changes? <br>What if there was an efficient, remote way for the IT department to take care of this? A way which automates device setup, and makes it easy to apply new configurations, install new system updates and handle app distribution remotely, even for hundreds of devices? <br><\/li>\n<\/ul>\n\n\n\n<p>The two crucial tools needed are an <strong><a href=\"https:\/\/www.cortado.com\/en\/\">MDM solution<\/a><\/strong> and Android Enterprise.<\/p>\n\n\n\n<a name=\"important-features\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-android-enterprise-management-the-main-features\"><strong>Android Enterprise Management: The Main Features<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-device-selection-made-easy-with-android-enterprise-recommended-aer\">1. Device Selection Made Easy with Android Enterprise Recommended (AER)<\/h3>\n\n\n\n<p>The right mobility strategy starts with suitable devices. Google has made selecting optimal devices for the enterprise uncomplicated, thanks to Android Enterprise Recommended. Now decision makers looking for the right hardware can simply look for the Android Enterprise Recommended status. AER devices are great for professional use because they:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>receive regular 90-day security updates.<\/li>\n\n\n\n<li>support the current operating system release and are guaranteed to receive the next major upgrade too (example: an AER device that shipped with Android 10 will also receive the Android 11 upgrade).<\/li>\n\n\n\n<li>must meet recommended minimum device specifications for business use (e.g. drop test integrity for rugged devices) and support the latest MDM enrollment options (e.g. zero-touch).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-automated-enrollment-with-android-zero-touch\">2. Automated Enrollment with Android Zero-Touch<\/h3>\n\n\n\n<p>Once a device is selected, the Android Enterprise management features need to be enabled on the device. This process of \u201cenrolling\u201d Android devices is ideally done with Android zero-touch enrollment. Here are the key benefits at a glance:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Zero-touch enrollment is faster than manual enrollment as the process can be automated and simplified. It is therefore great for large-scale deployments or corporately owned devices. <\/li>\n\n\n\n<li>In a single transaction the reseller can create your accounts and enroll devices for zero-touch.<\/li>\n\n\n\n<li>Zero-touch enrollment also acts as an added safeguard in the event of device theft, as users cannot remove the MDM-profile from the device, even after a hard reset. This is an important feature, particularly during the period of time between a device loss and the point where the <strong><a href=\"https:\/\/blog.cortado.com\/en\/mdm-concept-how-to-maintain-data-security-when-mobile-devices-are-lost\/\">MDM&#8217;s &#8220;Lost Mode&#8221; setting<\/a><\/strong> is activated on the device.<\/li>\n<\/ul>\n\n\n\n<p><a>We went into more depth on <\/a><strong><a href=\"https:\/\/blog.cortado.com\/android-zero-touch-enrollment-how-it-works\/\">how Android zero-touch enrollment works<\/a><\/strong> earlier in another post.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Work-Profile-Cortado-512x1024.jpg\" alt=\"The Android Work Profile, and important Android Enterprise feature \" class=\"wp-image-1923\" width=\"234\" height=\"466\"\/><figcaption class=\"wp-element-caption\"> The &#8220;Personal&#8221; and &#8220;Work&#8221; tabs allow users to quickly switch between both profiles  <\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-work-and-play-combined-with-android-s-work-profile\">3. Work and Play Combined with Android&#8217;s Work Profile<\/h3>\n\n\n\n<p>The Android work profile is the innovative way to keep work data separated from personal data, giving businesses the security they need. Acting as a \u201ccontainer\u201d on the mobile device, the Android work profile improves security and the end user experience:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It allows for two instances of the same app on mobile devices. Work apps are given a briefcase identifier (see image), so workers can easily separate work apps from personal apps.<\/li>\n\n\n\n<li>Enterprise data cannot be transferred into the personal side of the device. This is an essential mechanism that <strong><a href=\"https:\/\/blog.cortado.com\/en\/whatsapp-business-use\/\">prevents privately installed apps, like Whatsapp, from being able to access this data.<\/a><\/strong><\/li>\n\n\n\n<li>IT admins can effortless delete the work profile and its data if a device is no longer used by an employee or if the device becomes lost or stolen. <\/li>\n<\/ul>\n\n\n\n<p>You can learn <strong><a href=\"https:\/\/blog.cortado.com\/en\/android-work-profile-setup-benefits\/\">how to set up the Android work profile and why<\/a><\/strong> on Cortado blog. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-app-management-with-managed-google-play\">4. App Management with Managed Google Play<\/h3>\n\n\n\n<p>The Google Play store contains vast numbers of apps that employees and businesses can take advantage of. However, as a consumer-orientated portal, it is not perfect for business use.<\/p>\n\n\n\n<p>Managed Google Play is a version of Google Play which meets the security and deployment demands specific to business contexts. In enables businesses to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Search for apps and push them over the air to users\u2019 devices.<\/li>\n\n\n\n<li>Ensure that only whitelisted apps are available for employees to download.<\/li>\n\n\n\n<li>Convert web-URLs into web apps and deploy them just like other apps.<\/li>\n\n\n\n<li>Organize apps into collections for different departments.<\/li>\n\n\n\n<li>Upload and easily deploy private, company-developed apps.<\/li>\n<\/ul>\n\n\n\n<a name=\"deployment\"><\/a>\n\n\n\n<p>All the <strong><a href=\"https:\/\/blog.cortado.com\/en\/app-distribution-managed-google-play-integration\/\">features of managed Google Play<\/a><\/strong>, like browsing for apps, can be done within a compatible MDM program and are explained on our blog. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-manage-android-devices-with-mdm\"><strong>How to Manage Android Devices with MDM<\/strong><\/h2>\n\n\n\n<p>You can implement your Android Enterprise management configurations with an mobile device management solution (the term MDM is often used synonymously with EMM). <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to Set Up Android Enterprise\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/uwtVdB8RM0w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Using the Android device management features described above, IT admins can deploy multiple Android devices to employees, furnish them with the necessary apps, and make sure that they are securely configured for business use. <\/p>\n\n\n\n<p>Depending on whether the Android device is personally or corporately owned and what its intended purpose is, different management strategies are commonplace: <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cobo-cope-byod-managing-personal-devices-vs-corporately-owned\"><strong>COBO, COPE, BYOD: Managing Personal Devices vs. Corporately Owned<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"934\" height=\"923\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Device-Management-4.png\" alt=\"Three common deployment strategies in Android device management: privately-owned BYOD, corporately owned devices with personal use enabled and dedicated kiosk devices. \" class=\"wp-image-1922\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Device-Management-4.png 934w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Device-Management-4-300x296.png 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-Device-Management-4-768x759.png 768w\" sizes=\"(max-width: 934px) 100vw, 934px\" \/><\/figure>\n\n\n\n<p>Newcomers and IT admins already familiar with mobile device management can read this <strong><a href=\"https:\/\/www.cortado.com\/en\/resource\/android-enterprise-best-practices\/\">free best practice guide on Android device management with MDM<\/a><\/strong>, for an in-depth look at optimal configurations and setup procedures.   <\/p>\n\n\n\n<a name=\"takeaways\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-android-device-management-the-key-takeaways\">Android Device Management: The Key Takeaways<\/h2>\n\n\n\n<p>This guide to Android device management has attempted to show that managing a fleet of Android devices is neither complicated nor superfluous.<\/p>\n\n\n\n<p>With an MDM solution and Android Enterprise, all aspects of Android device management \u2013 from enrollment, deployment and group configuration \u2013 is kept very simple. Thereafter, it is easy to improve remote working, data security and take advantage of innovative apps. Meanwhile the individuals responsible for configurations aren&#8217;t burdened with time-consuming setups which require each device in the hand. <em>&nbsp;<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill has-background\" style=\"background-color:#f0f1f4\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/cortadoblog1.wpengine.com\/wp-content\/uploads\/woman-office-smartphone.jpg);background-position:50% 50%\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"650\" src=\"https:\/\/cortadoblog1.wpengine.com\/wp-content\/uploads\/woman-office-smartphone.jpg\" alt=\"Woman with smartphone at office desk.\" class=\"wp-image-3545 size-full\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/woman-office-smartphone.jpg 1000w, https:\/\/blog.cortado.com\/wp-content\/uploads\/woman-office-smartphone-300x195.jpg 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/woman-office-smartphone-768x499.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Android Enterprise Best Practices<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Three carefully crafted sets of configurations and policies for you to use<\/li>\n\n\n\n<li>Recommendations for managing and configuring business apps<\/li>\n\n\n\n<li>Best practices for password policies in your organization<\/li>\n<\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.cortado.com\/en\/resources-support\/register\/?whitepaper=Android-Enterprise-Best-Practices&amp;utm_source=blog.cortado.com&amp;utm_medium=referral&amp;utm_campaign=Blog+Android+Enterprise+Management\" style=\"border-radius:5px;background-color:#6fa12b\" target=\"_blank\" rel=\"noreferrer noopener\">Download For Free<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This guide explains all that there is to know about Android device management. It explains what Android Enterprise is, who needs to be using it and what potential Android Enterprise&#8217;s most important features possess.<\/p>\n","protected":false},"author":14,"featured_media":1934,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-1906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-administration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Explained: Android Enterprise Management - Cortado MDM<\/title>\n<meta name=\"description\" content=\"Want to ensure Android smartphones and tablets are used securely in your business or classroom We look at Android Enterprise management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cortado.com\/en\/android-device-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Enterprise Management Explained\" \/>\n<meta property=\"og:description\" content=\"Want to ensure Android smartphones and tablets are used securely in your business or classroom We look at Android Enterprise management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cortado.com\/en\/android-device-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Cortado Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-27T08:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-11T10:14:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"959\" \/>\n\t<meta property=\"og:image:height\" content=\"544\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jonathan Winterkorn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan Winterkorn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/\"},\"author\":{\"name\":\"Jonathan Winterkorn\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/1450e40d36f9f239c4fee69eff48bc86\"},\"headline\":\"Android Enterprise Management Explained\",\"datePublished\":\"2019-11-27T08:00:40+00:00\",\"dateModified\":\"2024-01-11T10:14:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/\"},\"wordCount\":1523,\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg\",\"articleSection\":[\"IT Administration\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/\",\"url\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/\",\"name\":\"Explained: Android Enterprise Management - Cortado MDM\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg\",\"datePublished\":\"2019-11-27T08:00:40+00:00\",\"dateModified\":\"2024-01-11T10:14:44+00:00\",\"description\":\"Want to ensure Android smartphones and tablets are used securely in your business or classroom We look at Android Enterprise management.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.cortado.com\/en\/android-device-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg\",\"width\":959,\"height\":544,\"caption\":\"Android device management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.cortado.com\/en\/android-device-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.cortado.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Enterprise Management Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"name\":\"Cortado Blog\",\"description\":\"News from Cortado\",\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.cortado.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\",\"name\":\"Cortado Blog\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"width\":226,\"height\":32,\"caption\":\"Cortado Blog\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/1450e40d36f9f239c4fee69eff48bc86\",\"name\":\"Jonathan Winterkorn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0aff13b430ced6b67d3200243c03d1d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0aff13b430ced6b67d3200243c03d1d4?s=96&d=mm&r=g\",\"caption\":\"Jonathan Winterkorn\"},\"url\":\"https:\/\/blog.cortado.com\/en\/author\/johol\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Explained: Android Enterprise Management - Cortado MDM","description":"Want to ensure Android smartphones and tablets are used securely in your business or classroom We look at Android Enterprise management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cortado.com\/en\/android-device-management\/","og_locale":"en_US","og_type":"article","og_title":"Android Enterprise Management Explained","og_description":"Want to ensure Android smartphones and tablets are used securely in your business or classroom We look at Android Enterprise management.","og_url":"https:\/\/blog.cortado.com\/en\/android-device-management\/","og_site_name":"Cortado Blog","article_published_time":"2019-11-27T08:00:40+00:00","article_modified_time":"2024-01-11T10:14:44+00:00","og_image":[{"width":959,"height":544,"url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg","type":"image\/jpeg"}],"author":"Jonathan Winterkorn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jonathan Winterkorn","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/#article","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/"},"author":{"name":"Jonathan Winterkorn","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/1450e40d36f9f239c4fee69eff48bc86"},"headline":"Android Enterprise Management Explained","datePublished":"2019-11-27T08:00:40+00:00","dateModified":"2024-01-11T10:14:44+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/"},"wordCount":1523,"publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg","articleSection":["IT Administration"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/","url":"https:\/\/blog.cortado.com\/en\/android-device-management\/","name":"Explained: Android Enterprise Management - Cortado MDM","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg","datePublished":"2019-11-27T08:00:40+00:00","dateModified":"2024-01-11T10:14:44+00:00","description":"Want to ensure Android smartphones and tablets are used securely in your business or classroom We look at Android Enterprise management.","breadcrumb":{"@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cortado.com\/en\/android-device-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/#primaryimage","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/Android-device-management.jpg","width":959,"height":544,"caption":"Android device management"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cortado.com\/en\/android-device-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cortado.com\/en\/"},{"@type":"ListItem","position":2,"name":"Android Enterprise Management Explained"}]},{"@type":"WebSite","@id":"https:\/\/blog.cortado.com\/en\/#website","url":"https:\/\/blog.cortado.com\/en\/","name":"Cortado Blog","description":"News from Cortado","publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cortado.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cortado.com\/en\/#organization","name":"Cortado Blog","url":"https:\/\/blog.cortado.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","width":226,"height":32,"caption":"Cortado Blog"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/1450e40d36f9f239c4fee69eff48bc86","name":"Jonathan Winterkorn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0aff13b430ced6b67d3200243c03d1d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0aff13b430ced6b67d3200243c03d1d4?s=96&d=mm&r=g","caption":"Jonathan Winterkorn"},"url":"https:\/\/blog.cortado.com\/en\/author\/johol\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/1906"}],"collection":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/comments?post=1906"}],"version-history":[{"count":0,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/1906\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media\/1934"}],"wp:attachment":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media?parent=1906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/categories?post=1906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/tags?post=1906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}