|
 |
|
|
 |
MAM (Mobile Application Management)
MAM can make unified hosting, approval, going online, pushing configuration of apps developed by enterprise itself and the third-party apps, and make comprehensive management of mobile app authority.
|
Enterprise app store |
Enterprise app store can make unified management of multi-platform apps, and realize the unified hosting, approval, going online, update of mobile apps. |
App monitoring |
Scan the apps uploaded deep, check security state of apps. |
App encapsulation |
Inject codes into the apps, implant the enterprise security strategy. There is no need for secondary development. |
App reinforcement |
Add shell and encryption to original apps of enterprise to prevent apps from being analyzed reversely, cracked, and tampered. |
 |
Apps of black and white list |
|
Support setting the black and white list strategy for apps, and forbid installing and running unauthorized apps. It is the only system that supports black and white list strategy in the industry. |
|
|
 |
MCM (Mobile Content Management)
MCM can store centrally, approve, push remotely, recycle enterprise documents, etc.
|
 |
Enterprise document center |
|
Exclusive mobile document center within the enterprise. Use private cloud architecture, safely and conveniently. |
 |
Strategy management
of documents |
|
Carry out the strategy management of enterprise documents, limit and manage the document sharing, copying, etc |
 |
Document content
encryption |
|
Encrypt the documents with high-strength encryption algorithm to prevent the risk of document leakage. |
|
 |
|
 |
MSM (Mobile Security Management)
MSM provides comprehensive security protection for mobile device operating system.
|
Enterprise anti-virus |
Enterprise anti-virus server. Kill viruses efficiently, deep, comprehensively. |
 |
Unknown threat monitoring technology |
|
Unique patented technology of applied behavior analysis in the industry, monitor the abnormal behavior of mobile apps, which can effectively identify and kill
unknown viruses. |
 |
Mobile device security assessment |
|
Make security assessment for the mobile devices connected to the enterprise intranet to prevent the invasion of malicious devices. |
|
 |
|
 |
MIM (Mobile Information Management)
MIM provides functions of safe, inexpensive, fast enterprise internal information push and management. |
 |
Enterprise multimedia information |
|
Support the words, pictures, videos, audios, documents, URL, etc. |
Push over the air |
Push and manage information remotely through the network in real time, which could replace operators’ SMS Gateway and reduce business operating costs. |
Anti-tamper |
The information uses high-strength encryption protection and digital signature technology to guarantee the security and credibility of information. |
|
 |
|
 |
MSAG (Mobile Access Gateway)
MSAG establishes a safe and reliable encryption channel for mobile apps to make mobile apps have efficient, convenient access to the intranet apps and data.
|
Diverse access patterns |
Use the specially designed secondary agent security access mode based on terminal network authority. |
 |
Comprehensive security system |
|
Establish secure access environment for mobile terminals combined with multiple hardware password devices. |
Diverse access terminals |
With the cross-platform kernel secondary agent technology, the mobile security client components support iOS, Android, Windows platforms. |

|
 |
 |
DSA (Data Security Area)
DSA adopts virtual file system technology, provides transparent file I/O operation at the simulation file system bottom, stores automatically the sensitive enterprise data and standard mobile terminal file system separately with high-strength encryption. |
Data security isolation |
Establish enterprise mobile device security area, isolate enterprise data from personal data effectively. |
Disk space of black box |
Adopt the virtual file system technology, provide transparent file access interface for enterprise mobile apps, realize the secure storage of enterprise sensitive data. |
|
 |
|
| |
|
|