Dell Mobile Security and Control
Mobile devices provide access to your business data from virtually anywhere. And that means your business data is flowing outside of your secured network. Dell can help you build layered mobile security that gives you the same level of control on mobile devices as any other part of your network.
Mobile Data Security
Customer contacts, lead lists, pricing information, contract terms — your data is your business. Loss or theft of a mobile device containing this information can be devastating. Accidental data loss through social networks or consumer email services is equally dangerous. Dell can help you secure your business data from the firewall to the mobile device.
- Dell can give you strong authentication policies enforced consistently across platforms
- Data is encrypted with AES 192-bit encryption — the same encryption used by some government agencies
- Data is encrypted on device and in transit using keys that only exist behind your firewall
Enforcing Access Controls
Building a business-class security strategy means policy enforcement across your network. With Dell, you can apply those same types of controls to mobile devices outside your network. Dell can help you set policies to ensure that only approved devices can access corporate data and can give you dashboard visibility to policy compliance by device.
- Dell allows administrators to restrict access to corporate data by user
- IT can establish role-based permissions for each mobile user
- Policy administration and control can be delegated or tightly controlled
Consistent Mobile Device Security
Smartphones and tablets give your employees unprecedented access to your network. Whether iOS, Android™ or Windows phone, you need consistent security on all mobile devices. Dell can show you how to "wall off" your business intelligence regardless of operating system or device.
- A secure corporate container keeps business data separate from other applications
- The container provides consistent security across iOS, Android and Windows phone models
- This solution provides "sandboxed" access to email, calendar, contacts and a secure browser
- The container can be controlled and wiped without negative impact on personal devices