View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

JanusNET Janusgate Mobile

With Janusgate Mobile, email, calendar, contacts, tasks and notes traffic can be filtered before it reaches the mobile device. If sensitive, users are alerted with a simple message enabling access to the full information from their corporate desktop, within the corporate-approved container or VDI window. What’s more, configurable filtering rules allow you to customise security settings to meet your specific organisational needs. With Janusgate Mobile, you can:
  • Identify privileged information by email subject and/or body
  • Allow people to use their device’s native email apps
  • Restrict content based on email classification
  • Block all attachments while allowing the email body to pass
  • Prevent email delivery while allowing calendar or contact information to pass
  • Stop any Personally Identifiable Information (PII) being delivered to devices
  • Redact specific types of information
Features: COMPLY WITH CORPORATE SECURITY POLICY Janusgate Mobile operates as a security enforcement point, and segregates the e-mail that is retained within the enterprise’s secure local area network from that which is synchronised with its less secure smartphone fleet. Janusgate Mobile can distinguish between devices , users and content to ensure that only appropriate messages are delivered to smartphones. KEEP COMMUNICATION FLOWING If Janusgate Mobile detects that an e-mail containing sensitive information is being delivered to a smartphone, Janusgate Mobile can notify the recipient that the original message is not accessible on the smartphone and inform the recipient of how to access the original message. Alternatively, if personal or confidential information is detected in a message, such as a credit card number, a tax file number, a social security number or a keyword, that portion of the message can be replaced. MEASURE RISK Use Janusgate Mobile to measure the amount of sensitive information stored on smartphones. Used in this fashion, Janusgate Mobile does not impact the flow of information delivered to smartphones, but allows assessment and approval of the impact of a mobile e-mail enforcement policy by board and senior executive prior to its introduction. MANAGE RISK Janusgate Mobile can minimise the risk of leakage by replacing sensitive information prior to its delivery to a smartphone. Messages which are too sensitive to deliver to smart phones can be substituted with notification messages. These messages can be used to notify the recipient that the original message is available. If a credit card number or similar is detected, Janusgate Mobile can replace the number with predefined character. MAXIMISE USAGE OF EXISTING INFRASTRUCTURE Enterprises can take advantage of the pool of existing e-mail ready smartphone fleet. Janusgate Mobile allows enterprises to utilise the latent capabilities of these phones, and can boost productivity by simply allowing staff to synchronise contacts, calendar and low sensitivity e-mail between the corporate mail system and their smartphones. ADVANCED DETECTION AND PROCESSING Janusgate Mobile can detect and process:
  • security classifications in subject lines or in the body of a message
  • numeric sequences such a credit card numbers, social security numbers and taxation file numbers
  • keywords
  • attachment name and extensions
EASY DEPLOYMENT The operation of Janusgate Mobile does not affect remaining system configuration. There are no changes to existing firewall rules, nor to smartphone configuration. iPhones, Windows Mobile, Android and Symbian phones operate in their native mode. No additional software is required on these phones. No additional hardware is required. A basic installation can be completed in less than 1 hour.
... Learn more
-
-
ROI-
-
14
10

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.