Product Information
Mobile and BYOD are creating a wave of security, compliance and access challenges for IT organizations. Security breaches can occur from unauthorized persons accessing lost or stolen devices, unmanaged mobile devices serving as a conduit to infect the network with malware, the interception of corporate data over unsecured third-party wireless networks or mobile services, or rogue apps gaining access to data stored on a device. To address these challenges, many organizations are considering or have already deployed hosted virtual desktop (HVD), enterprise mobility management (EMM) or other data encryption solutions to secure business data on mobile and remote devices. This a great start, but if only on-device data protection is addressed, company data and networks are still at risk. Security is an end-to-end mobile workflow challenge.
- Secure, policy-enforced access to network resources
IT can easily provision policy-enforced SSL VPN access and role-based privileges for mobile users with managed and unmanaged devices. With the Mobile Connect app, mobile workers can initiate an encrypted SSL VPN connection to an SMA gateway appliance and quickly access the allowed corporate data, applications and resources they need - including webbased, client/server, host-based, VDI and back-connect applications like voice over IP (VoIP). The solution protects the corporate network from mobile security threats, such as unauthorized access to data and malware attacks. - Per-application VPN
Administrators can establish and enforce policies to designate which mobile apps on a mobile device are granted VPN access to the network. This ensures that only authorized mobile business apps gain VPN access. Plus, the SMA gateway requires no modification of mobile apps. Any mobile app or secure container can be supported with no modifications, app wrapping or SDK development. - BYOD device registration and security policy management
If a user attempts access from a mobile device that has not yet been registered with the SMA appliance, the user is presented with a personal device authorization policy. Administrators can customize the terms of the security policy. The user must accept the terms of the policy to register the device and gain access to allowed corporate resources and data. Requiring policy acceptance reduces the business risk associated with implementing a BYOD policy. - Easy access to authorized resources
With the intuitive Mobile Connect app, iOS, MacOS X, Android, Kindle Fire and Windows 8.1 mobile devices can connect to allowed network resources over encrypted SSL VPN connections. Once a user and device are verified, Mobile Connect offers pre-configured bookmarks for one-click access to permitted corporate applications and resources. - Context-aware authentication
Access to the corporate network is granted only after the user has been authenticated and mobile device integrity has been verified. - Session persistence technology
The SMA gateway appliance provides robust and reliable secure access for laptops, smartphones and tablets, featuring session persistence across different locations (office, home or mobile) without re-authentication.