{"id":23551,"date":"2026-03-03T15:53:15","date_gmt":"2026-03-03T14:53:15","guid":{"rendered":"https:\/\/coreit.se\/tjanster\/mobility-business-telephony\/mobile-device-management"},"modified":"2026-04-01T14:44:32","modified_gmt":"2026-04-01T12:44:32","slug":"mobile-device-management","status":"publish","type":"tjanster","link":"https:\/\/coreit.se\/en\/services\/mobility-business-telephony\/mobile-device-management","title":{"rendered":"Mobile Device Management"},"excerpt":{"rendered":"<p>Mobile Device Management Control and security for mobile devices Full control. Minimal administration. Maximum security. Mobile devices are an integral part of everyday working life. Mobile phones, tablets and laptops are used to access emails, business systems and sensitive information &#8211; often outside the office. This places higher demands on both security and control, without [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":23473,"menu_order":0,"template":"","meta":{"_acf_changed":false},"utseende":[25],"class_list":["post-23551","tjanster","type-tjanster","status-publish","hentry","utseende-elementor"],"acf":[],"_links":{"self":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/23551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster"}],"about":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/types\/tjanster"}],"version-history":[{"count":0,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/23551\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/23473"}],"wp:attachment":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/media?parent=23551"}],"wp:term":[{"taxonomy":"utseende","embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/utseende?post=23551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}