Bluefire Mobile Enterprise is centrally deployable and configurable from an administration console. The administrative features of this product include the ability to enforce and update security policy, view logs, extract security logs and control devices regardless of location in the field. This transparent type of management is conducted in near real time without end-user intervention, leaving workflow and productivity uninterrupted. The Bluefire device is capable of secure data transmissions regardless of physical location for Wi-Fi and cellular, as well as wired network architectures.
We found this product to be quite simple from setup through managing devices. Installation is guided by a wizard and takes just a few simple steps. Once setup and configuration are complete, users and groups can be downloaded straight from Active Directory. The management console is also intuitive and well organized.
From a performance standpoint this is a great product. Many of the features are easily configured and deployed. User interaction is non-existent due to the transparency of the product. Once a policy is assigned to a device it is instantly pushed out by an administrator.
Bluefire documentation for this product is straight to the point and puts good emphasis on deployment and configuration issues. The installation guides designed for end-users were easy to understand and follow. All manuals were hyperlinked and finding information was streamlined. There is not an abundance of screen shots in the documentation, however, the images that were present were helpful in identifying key installation actions.
Bluefire support entitles customers to basic phone and email assistance and product updates. These include minor fixes, maintenance releases and feature enhancements.
The product is priced at $9,995 for a starter kit, which includes the Enterprise Manager and 100 user licenses. At just under $10,000, this product may seem a bit pricey. However, it does include many useful features and functionality beyond encryption, such as device firewalls and comprehensive granular security policies.