{"id":163,"date":"2024-03-14T07:38:26","date_gmt":"2024-03-14T06:38:26","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/?post_type=knowledgebase&#038;p=163"},"modified":"2025-04-16T11:39:12","modified_gmt":"2025-04-16T09:39:12","slug":"introduction-to-apptec360","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/general-overview\/introduction-to-apptec360\/","title":{"rendered":"Introduction to AppTec360"},"content":{"rendered":"\n<p>AppTec&#8217;s Enterprise-Mobile-Management-Solution offers the option to manage and configure all mobile devices with its intuitive management console. In this scenario, the EMM server can either run in your own surroundings or you can utilize our cloud based solution.<\/p>\n\n\n\n<p>Even on the topic of a central installation of corporate applications on to smartphones, you have come to the right place. With the Enterprise Mobile Manager, you can distribute corporate applications and documents onto devices within seconds or block undesirable applications with white\/blacklisting.<\/p>\n\n\n\n<p>The usage of private devices in companies poses a new challenge for securing smartphones and tablets. Due to the fact that employees want to use their smartphones more and more, ITadministrators must protect a large number of different types of devices. We will help you with securing all devices and the sensitive data that is stored on them and manage them from an intuitive console.<\/p>\n\n\n\n<div class=\"pagebreak-after\"><\/div>\n","protected":false},"parent":131,"menu_order":0,"template":"","class_list":["post-163","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":18,"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/163\/revisions"}],"predecessor-version":[{"id":58238,"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/163\/revisions\/58238"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/131"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/media?parent=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}