More

    Introducing App Catalog for Android Devices

    Share On

    We are excited to announce that we have now introduced the App catalog feature for Android devices, including BYO (Bring your own) devices.

    App catalog for Android Devices

    App Catalog for android device management or app library enables IT teams managing large and distributed device inventories to curate a list of applications that is made available on the enrolled android devices and can be installed whenever a use-case demands.

    The major difference between pre-installed applications on managed devices and apps in App Catalog lies in the nature of their installation. While other work apps are made available on the devices via silent app installation, the applications in the App Catalog are simply made available on the devices ready for installation. The installation can be completed when the end-user initiates the same.

    App Catalog is a repository of all the apps that the IT admins intend to publish on the devices- be it from Play Store or Enterprise Store (for native, private applications).

    How does it work?

    The App Catalog feature has to be enabled for the desired device profile on the Scalefusion dashboard. The devices enrolled under this profile will have App Catalog enabled. This App Catalog is displayed as a web clip on the device’s home screen.

    App Catalog for Android Devices
    App Catalog for Android Devices

    Whenever the end-user clicks on the web clip for the App Catalog, a list of applications available for publishing is displayed. End-users can complete the installation of these published apps by clicking on the button displayed next to the application.

    Currently, the App Catalog is available for both company-owned (COD) and employee-owned (BYOD) Android and iOS devices enrolled on Scalefusion MDM. You can read more about this feature here.

    Free trial
    Renuka Shahane
    Renuka Shahane
    Renuka Shahane is an avid reader who loves writing about technology. She is an engineering graduate with 10+ years of experience in content creation, content strategy and PR for web-based startups.

    Latest Articles

    Understanding LDAP: The Lightweight Directory Access Protocol

    Lightweight Directory Access Protocol, or LDAP, isn’t a new kid on the block. In fact, its history dates back to 1993. Tim Howes and...

    Who Verifies Your Identity Online? Understanding Identity Providers

    Hey You! The eternal Pink Floyd song! Decades later, a similar question beckons us online in a world outside that musical masterpiece. It goes...

    From Onboarding to Offboarding: User Lifecycle Management Explained

    It’s always exciting for organizations when their business scales well, and with that, there’s an increase in their employee base. This also means onboarding...

    Latest From Author

    What is Mobile Application Management: All You Need to Know

    Apps are the bedrock of smartphones, tablets, and now, even laptops and desktops. Without apps, modern devices are defunct. And that applies to both...

    Beyond Mobile: The Power of EMM for Holistic IT Management

    Keeping track of multiple devices is key, especially if you manage remote teams with a constant influx of smartphones, tablets, and laptops. Without any...

    Unlocking Workplace Agility Online: How Mobile Tech Drives Digital Transformation

    When you integrate digital technology into all aspects of your business, you transform the traditional ways you operate your business and deliver value and...

    More from the blog

    Who Verifies Your Identity Online? Understanding Identity Providers

    Hey You! The eternal Pink Floyd song! Decades later, a similar question beckons us online in a world outside...

    From Onboarding to Offboarding: User Lifecycle Management Explained

    It’s always exciting for organizations when their business scales well, and with that, there’s an increase in their employee...

    Multi-Factor Authentication (MFA): The Extra Layer of Security for...

    Ever thought of the risks associated with accessing sensitive data using just a single set of credentials? Enter user...