Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

AirTight MOBILE

2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

AIRTIGHT MOBILE

More and more companies are relying on mobile work, and these employees need to stay connected to the business, whether they are on the road, in hotels, airports, restaurants, coffee shops, at home, or in remote offices. With your own BYOD culture, employees are increasingly using corporate and personal devices-laptops, smartphones, and tablets. As these mobile devices move in and out of the enterprise site, they are connected to multiple known or trusted or untrusted networks, in order to prevent these devices from being exposed, no matter where they are, the enterprise's network security boundaries must move with these devices.

Mobile security perimeter

AirTight Moblie will give you a "Always ON" mobile security perimeter. Once AirTight Mobile Agent is installed on a mobile device, it gives IT administrators a clear understanding of the connection and operation of the device and, more importantly, implements the company's 74th security policy no matter where the device is placed.

The use of secure Wi-Fi

Now almost every laptop and mobile device has built-in Wi-Fi,Wi-Fi everywhere; Wi-Fi has become mainstream at home, in the office, or on the way. AirTight Mobile can protect these mobile devices from misuse by Wi-Fi or Wi-Fi*** when accessing the Internet, thus protecting mobile devices. The policies that AirTight Mobile Agent can implement are as follows:

Block insecure Wi-Fi connections, such as Open, WEP, Ad-hoc Networks.

Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx connections are required for untrusted network connections.

Remove unused SSID from the cache list to prevent further exploration of the connection to Wi-Fi.

Implement corresponding policies according to the location of the equipment, such as office, home, airport, etc.

Mobile device connection management

AirTight Mobile clients can manage a variety of transport and storage interfaces on laptops, smartphones, and tablets, and companies can set policies to regulate the use of these interfaces, for example, when a user connects to a corporate Ethernet (LAN), the device is not allowed to connect to an unauthorized device or Wi-Fi network. AirTight Mobiile Agent can enforce the following policies:

Control various device interfaces: Wi-Fi, Bluetooth, 3G/4G, Ethernet, USB, infrared, removable storage devices, and modems, etc.

Prevent unauthorized access to the enterprise's internal network through bridging.

Block the ability to enable mobile hotspots on smartphones and tablets.

Secure access and Control of BYOD

AirTight mobile solutions seamlessly integrate AirTight's Wi-Fi and WIPS systems to provide a fully automated end-to-end mobile device access control. Enterprises can use AirTight's mobile client to authenticate and authorize devices that try to connect to the corporate network through the Wi-Fi network, which can include employees' own smartphones or tablets; mobile devices without AirTight clients can be automatically classified as unauthorized users, and their access to the corporate network will be directly blocked.

Centralized deployment, management, and reporting

On the Microsoft Windows platform, AirTight Mobile clients can be deployed through common software distribution and management systems, such as Microsoft's SMS, Altiris, and McAfee ePO; mobile devices can download and install clients from the Android APP Market or iTune APP Store, or through the Mobile device Management system (MDM). For BYOD access control, when users connect to the Wi-Fi network, they will be redirected to Captive Portal, and pre-defined clients can be placed on Captive Portal for users to download and install.

Network administrators can configure security and push management policies through a unified management console, and can also generate comprehensive reports of wireless security incidents and risk levels manually or in the form of scheduled tasks. Key features of the AirTight Mobile solution:

Easy to deploy; can be done using common enterprise software distribution systems.

Intuitive device access and record viewing.

Centralized management of security profiles and policies.

A variety of comprehensive reports can be customized.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report