Airtight MOBILE non-controller architecture Enterprise Wireless network security solution

Source: Internet
Author: User

airtight MOBILE650) this.width=650; "Src=" http://s3.51cto.com/wyfs02/M00/6C/75/ Wkiom1vjso7jpvyuaabm-eh3evm365.jpg "style=" float:right; "title=" QQ picture 20150506141945.jpg "alt=" Wkiom1vjso7jpvyuaabm-eh3evm365.jpg "/>

More and more businesses rely on mobile offices, and these employees need to stay connected to the business, whether they are on the road, in hotels, airports, restaurants, cafes, at home, or in remote offices. With the culture of bringing your own device (BYOD), employees are increasingly using corporate and personal devices-laptops, smartphones, and the board computers. Because these mobile devices are in and out of the enterprise, they connect to multiple known or trusted or untrusted networks, and in order to avoid attacks on these devices, the enterprise's network security boundaries must be moved with these devices, regardless of where they are located.

Mobile Security Perimeter

Airtight Moblie will give you a "always on" mobile security perimeter. Once the airtight mobile Agent is installed on a mobile device, it allows IT administrators to clearly understand the connection and operation of the device, and more importantly, to implement the company's 7x24 security policy regardless of where the device is placed.

Secure Wi-Fi use 650) this.width=650; "Src=" http://s3.51cto.com/wyfs02/M01/6C/71/wKioL1VJtQSiAs2AAAB8AzCpaZ0655.jpg " Style= "float:right;" title= "QQ picture 20150506142113.jpg" alt= "Wkiol1vjtqsias2aaab8azcpaz0655.jpg"/>

Now almost every laptop and mobile device has built-in wi-fi,wi-fi everywhere, and Wi-Fi has become mainstream at home, in the office, or on the go. Airtight Mobile protects these mobile devices when they access the Internet, eliminating the misuse of Wi-Fi or attacks by Wi-Fi hackers. The airtight Mobile Agent can implement the following policies:

·  Block unsecured Wi-Fi connections, such as Open, WEP, Ad-hoc Networks.

·  A VPN connection is required when you are not connected to a trusted network.

·  Remove unused SSIDs from the cache list to prevent further exploration and connectivity to Wi-Fi.

·  According to the location of the device, execute the corresponding strategy, for example: Office, home, airport, etc.

Mobile device Connection management 650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/71/wKioL1VJtRTQW_anAAA2l6BQm2Q651.jpg "style = "float:right;" title= "QQ picture 20150506142309.jpg" alt= "Wkiol1vjtrtqw_anaaa2l6bqm2q651.jpg"/>

Airtight mobile clients can manage various transport and storage interfaces on laptops, smartphones and tablets, and enterprises can set policies to standardize the use of these interfaces, such as when a user connects to a corporate Ethernet (LAN) This device is not allowed to connect to an unauthorized device or Wi-Fi network. The airtight mobiile agent can perform the following policies:

·  control various device interfaces: Wi-Fi, Bluetooth, 3G/4G, Ethernet, USB, infrared, mobile storage devices, modems, etc.

·  prevents unauthorized access to the corporate intranet through bridging.

·  block the Enable mobile Hotspot feature on smartphones and tablets.

Secure access and control for BYOD

Airtight Mobile solutions seamlessly integrate airtight Wi-Fi systems and wips systems to provide a fully automated end-to-end mobile device access control. An enterprise can use airtight's mobile client to authenticate and authorize devices that attempt to connect to a corporate network over a Wi-Fi network, which can include an employee's own smartphone or tablet, or a mobile device that does not have a airtight client, which can be automatically categorized to an unauthorized user , and access to the corporate network by these mobile devices is directly blocked.

On the Microsoft Windows platform, airtight mobile clients can be deployed through a common software distribution and management system, such as Microsoft SMS, Altiris, and McAfee EPO, and mobile devices from the Android app market or itune App Store to download and install the client, or deploy it through the mobile Device Management system (MDM). For BYOD access control, when a user is connected to a Wi-Fi network, it is redirected to the captive portal, where a pre-defined client can be placed on the captive portal for download and installation by the user.

Network administrators can use the unified Management console for security configuration and management policy push, but also manually generated or scheduled tasks to generate wireless security incidents and risk level of the comprehensive report. Key features of the airtight mobile solution:

·  easy to deploy, and can be done using common enterprise software distribution systems.

·  intuitive device access and record viewing.

·  centralized management of security profiles and policies.

·  a variety of comprehensive reports can be customized.

Beijing Hongtai co-creation Technology Co., Ltd. is a company focused on wireless network security and intelligent interconnection solutions. In the industry has a good corporate image, the company in particular in the wireless network security and cloud connectivity in the forefront of the industry. Beijing Hongtai co-creation Technology Co., Ltd. in the product has made the international brand Air tight Trust, now has become the air tight Beijing, the sole general agent.

Beijing Hongtai co-creation Technology Co., Ltd. Recruitment Division Agents, sincerely hope you come to my company, Beijing Hongtai co-creation Technology Co., Ltd. welcome you to join. Beijing Hongtai co-creation Technology Co., Ltd. with your hand to go to a better connected world.


Airtight MOBILE non-controller architecture Enterprise Wireless network security solution

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.