Security for mobile devices, applications and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email and more from their mobile devices. These user actions require you to implement a mobile strategy with strong security policies.
Security is at the core of AirWatch® Enterprise Mobility Management. AirWatch Mobile Security Management ensures your enterprise mobility deployment is secure and corporate information is protected with end-to-end security extending to users, devices, applications, content, data, email and networks. AirWatch provides real-time device details and continuous compliance monitoring to ensure your devices and corporate data are secure.
Ensure the security of all devices, whether they are corporate or employee-owned. Limit enrollment to approved devices by platform and device type and use multi-factor authentication during enrollment and before granting access to corporate resources like email and applications. Restrictions can be configured for device features, content and web browsing, and continuous monitoring keeps devices compliant. If a device is lost or stolen, you can remotely lock or wipe the device.
AirWatch protects and secures your apps with device and application-level policies. Native apps can be restricted, app whitelists and blacklists can be configured and use policies can be set. Access to corporate data can be disabled if a device is compromised or non-compliant keeping your corporate data secure. If you develop internal applications, the AirWatch Software Development Kit (SDK) and AirWatch App Wrapping enable you to add AirWatch security features directly to your applications.
AirWatch Content Locker containerizes corporate content and keeps it secure with FIPS-140 compliant 256-bit SSL encryption, location and time-based access, and printing restrictions. AirWatch can also automatically disable access and wipe content if a device is compromised, non-compliant or the user leaves the company.
AirWatch can require that devices be enrolled, encrypted and compliant before granting access to corporate email. Administrators can configure policies to prevent copy/paste, email forwarding and disable access if a device is compromised, noncompliant or the user leaves the company. You can require attachments to be opened, viewed and stored securely in AirWatch Content Locker, and AirWatch Email Container provides a secure, sandboxed email client and a native user experience on Android devices.
AirWatch enables administrators to prevent unknown devices from connecting to corporate networks, and configure certificate-based access to corporate VPN and Wi-Fi networks. Network Access Control (NAC) integration, AirWatch VPN On Demand and AirWatch AppTunnel enable you to grant access based on compliance, provide access to internal sites and secure mobile communication with enterprise networks.
The AirWatch compliance engine continuously monitors devices and performs escalating actions to prevent noncompliance. If a noncompliant device is detected, preconfigured escalating actions are performed automatically to bring the device back into compliance. Once a user corrects the compliance issue, any actions taken can be reversed.
AirWatch Mobile Security Alliance (MSA) extends and enhance advanced security for business mobility with AirWatch Enterprise Mobility Management. MSA allows administrators to integrate predictive, contextual and advanced behavioral threat analysis for mobile devices, apps and networks from the industry’s leading cybersecurity solutions seamlessly into the AirWatch platform to simplify security administration and remediation against mobile cybersecurity threats.
VMware NSX for AirWatch extends security beyond your digital workspace and into the data center by integrating identity, application, and enterprise mobility management with intelligent networking and micro-segmentation. This enables business mobility, agility, flexibility and productivity for end users while limiting access to corporate intellectual property and data.