Proget MDM (Mobile Device Management) is the only fully Polish system for managing company mobile devices and protecting the data stored on them.

It meets the needs of the private and public sectors by offering the functionalities necessary to handle key security areas. This is why it is the recommended tool for supporting the implementation of obligations arising from the requirements of the GDPR and NIS2.

The quality and security of the Proget solution are confirmed by regular system updates and certifications. The company operates in accordance with the PN-EN ISO/IEC 27001:2023 Information Security and PN-EN ISO 9001:2015 Quality Management standards. It also holds an Industrial Security Certificate.

Devices and systems under full control

Proget facilitates the implementation of consistent security policies on a variety of mobile devices – smartphones, tablets, laptops, and a wide range of ruggedized devices. It optimizes and streamlines the work of administrators, giving them an effective tool for remote control of resources. It reduces the costs of implementing new devices and speeds up the introduction of changes with each update. Likewise, it provides all employees with secure and flexible access to data and applications from any device and anywhere in the world.

The advanced features of the All-in-One platform allow IT administrators to freely manage an unlimited number of devices with different operating systems (Android, iOS, iPadOS, macOS, and Windows) from an intuitive console.

Freedom of choice and full support

The system is available in two licensing options: as on-premise software installed locally or as a cloud service distributed in the SaaS model.
Regardless of the option chosen, each license provides access to all system functionalities, a technical support platform, and a practical knowledge base for IT administrators – without any additional or hidden costs.

Selected functionalities of the Proget system:

  • Automated and fast device registration and configuration.
  • Automatic responses to security incidents.
  • Remote support in case of problems, with the option of enabling remote desktop.
  • Secure application management – configuration, distribution, permissions, updates.
  • Creating and enforcing various policies, including device grouping.
  • VPN configuration – secure access to confidential company data behind a firewall.
  • Remotely lock a lost device, selectively erase data, and reset to factory settings.
  • Monitoring the location of the entire company fleet.