Policy of the Week June 14: Introduction to OptioInsight and OptioCore

OptioLabs developed the OptioCore technology for Android devices so that Android OEMs can enable a richer set of security, compliance and productivity capabilities without having to develop customized features and APIs in Android OS. These capabilities go beyond traditional device management, containerization, and device security options to create an entirely new way of managing and controlling Enterprise devices. This series of blog posts will provide an outline of what Enterprises and OEMs can expect to achieve from the OptioCore solution.

To start with, let’s quickly cover the components and how you get them. OptioCore is an operating system software that OptioLabs licenses exclusively to Android OEMs. As a result, OptioCore gets built into the Android phone during the initial manufacturing process by the OEM as a new, integral part of the operating system. It’s not an application and therefore cannot be removed or bypassed by users or malicious attackers. Think of it as a security extension of Android that gives the Enterprise administrator very deep controls into the inner workings of the OS.

To manage those controls the Enterprise admin uses OptioInsight, the other part of our solution. OptioInsight is a web-based console developed for managing security controls and monitoring OptioCore-enabled phones. It’s a complement to your existing MDM solution (if you have one) that lets you do some very sophisticated things with Android OptioCore devices. However, it doesn’t replace your MDM, which you will continue to use for all traditional device management and configuration processes.

An Enterprise customer will typically purchase OptioCore devices from one of our OEM device partners and buy an OptioInsight subscription to manage them. We configure a unique OptioInsight server for your organization and enable you to register your new devices with that server. It’s an opt-in model where the device user takes an action to register a phone with OptioInsight. Once registered, the device can be secured with OptioInsight policies.

From there, an IT administrator will log into your OptioInsight server to configure user groups (typically synced from your Active Directory system for convenience) and to define policy sets to apply to those groups. With a simple click the policies are deployed and device compliance is tracked.

Coming Soon: An exploration of several customer use cases and the types of security policies we can create with OptioCore and OptioInsight!

Share this blog