Features include:
Customizable reporting of status and device risks/conditions
Remote enforcement of password and security policy
Full encryption of all sensitive data on the devices
Immediate data access elimination with instant, administrator-enabled remote restoration
Complete data wipe capability when devices are stolen
Broad range of both administrator-enabled and automatic security responses to threat conditions