Why Bastion Built Its Own MDM
Why Build an MDM?
Working with hundreds of startups on compliance, we kept seeing the same gap: most companies had no device management at all. When they looked for solutions, enterprise MDM vendors presented three problems:
- Roadmap misalignment — Mature MDM vendors prioritize enterprise clients. We needed deep integration with our compliance and security posture platform, and no third-party roadmap could guarantee that.
- Data sovereignty — Most MDM solutions lack self-hosting options. It felt wrong to ask customers to trust us with their security data while delegating device data to a vendor we don't control.
- Feature bloat and pricing — Enterprise MDM solutions bundle expensive capabilities startups never use, making them economically unjustifiable for a 50-person team.
So we built our own — from scratch. Not a fork of an open-source project. Not a white-label resale. A purpose-built MDM designed for the companies we work with every day.
Built on Native OS Protocols
Bastion's MDM uses the management protocols built directly into each operating system:
| Platform | Protocol | Capabilities |
|---|---|---|
| macOS | Apple MDM (APNs + SCEP) | Device lock, remote wipe, profile installation, encryption enforcement, inventory queries |
| Windows | OMA-DM / CSPs | Configuration management, policy enforcement, inventory, encryption status |
| Linux | Bastion agent (DEB/RPM) | Software inventory, vulnerability scanning |
This means no proprietary agents running with elevated privileges beyond what the OS vendor intended. On macOS, the enrollment profile is visible in System Settings > General > Device Management. On Windows, it appears in Settings > Accounts > Access work or school. Everything is declared — there is no hidden access.
Security-First by Design
The most important architectural decision we made was deliberately excluding remote script execution.
Some MDM platforms (including Apple's supervised mode and Microsoft Intune) let administrators push and execute arbitrary scripts on managed devices. This is powerful — but it turns your MDM server into a high-value target. A compromised MDM becomes a deployment vector for enterprise-wide malware.
For a large organization with a dedicated security team monitoring their MDM infrastructure around the clock, that trade-off may be acceptable. For a 50-person startup, it's a catastrophic risk.
We chose to trade capability for attack surface reduction.