With today’s technologies, end-users working within the company have begun to access company resources via mobile devices, making the control of the scattered data structure difficult for the processors. The applications on the device have become important for the ownership, security and storage of the data. With mobile application management, the security and distribution of data which moved to mobile devices can be controlled. It is aimed to increase both the security and the end-user experience, such as the creation of application-based virtual networks, access to company data, productivity-enhancing applications, safe storage of company data with MAM on mobile devices provided by the companies or end users themselves. MAM solution is an application management platform that provides central management capability to corporate applications of companies and provides integration with classical IT infrastructure. The mobile application management platform allows you to write policies that prevent data leakage on applications.
Within the scope of KVK Law, personal data / special personal data can be carried to mobile devices via applications. Data takers are required to perform the security and tracking of the data moved on these mobile devices. In mobile devices, the ability to store data in crypto areas and the management of crypto areas by the IT departments can be provided centrally. In case of any incident / violation, mobile applications can destroy themselves, crypto areas cannot be opened in case of loss of devices and any data can be prevented from leaking out.
With MAM Solution;
- Enterprise data can be stored on the end users’ own devices in the crypto area. By using efficiency enhancing applications, data can be prevented from going out of the encrypted area.
- The corporate applications are installed only in this field by providing management of the encrypted area. Application interactions can be managed centrally within the encrypted area. Data leakage policies can be written on applications to prevent end users from transferring data to applications they download from public stores.
- With the secure e-mail application, security policies can be written to the e-mail application for the data leakage and the e-mail application. In order to increase security, server access to the mail application can be restricted.
- With secure browser applications, a secure browser experience can be provided in the cryptic domain. Using a connection to application-based virtual networks, only the browser in the secure area can access internal resources.
- Files can be edited with secure editors in the encrypted area. With application interactions, data can only be streamed from the cryptographic applications.
- With Single Sign-On, all applications can be accessed via the login account. Thanks to the integrations, direct access to internet applications serving internal resources can also be provided.
- The developed corporate applications are managed in the cryptographic domain and managed by data leakage policies. Access to internal resources according to needs is accessed through virtual private networks.
- In cases of possible infringement, an destruction policy can be written on the devices which do not communicate with the system within the periods specified. Corporate data are destroying themselves.
- With the rules prepared automatically, it is possible to stop access to corporate data and to destroy existing data in case of termination of work.
The MAM solution provided to the IT departments technically;
1. Application Inventory Management
a. Managed application tracking on the device
b. Managed application version tracking on device
c. Application life cycle
2. Application Policy Management
a. Setting the application settings from the center
b. Password requirement on applications
c. Restrict access to device resources
d. Implementation of network settings
e. Management of application interaction
3. Application Security Management
a. Encrypting application data
b. Managing application interactions
c. Ensuring application secure network connections
d. Remote application locking
d. Delete remote application data
f. Data leak policies on application
g. Automating application ID entries
• Data protection with active policy enforcement
• Data protection with separate encryption
• Data protection over the air
• User authentication policies
• Online session policies
• Geofencing policies
• Kill pill
• Data encryption and secure VPN options
• Secure productivity apps
• Software development kits (SDKs) and application wrapping
• Device level MAM
• App. level MAM