最新发布|DACS-Gaming游戏行业解决方案重磅升级
了解更多
DATACLOAK LOGO
  • Requirement Challenges
  • Solutions
  • Value of Solutions

Challenges of Enterprise Mobile Office

Although the office of enterprise employees is mainly on PCs, but PC is inconvenient to carry around, so mobile office is essential, mainly through mobile phones to deal with approval, view documents, forward documents, browse the company's internal H5 applications or Web applications (such as: OA, BI data reports, e-mail) and other work, which brings convenience for employees to handle work anytime and anywhere, and also adds many new challenges of mobile office to the enterprises.

  • Expanded exposure of enterprise intranet

    Mobile devices usually use Internet networks such as 5G, home/public WiFi, etc. To be able to access the enterprise intranet anytime and anywhere, it needs to be open to the Internet. As the degree of enterprise mobility continues to increase, the external exposure of the enterprise intranet is getting bigger and bigger, and the risk of being attacked is getting higher and higher.

  • Difficult to manage and control employee access permissions

    Even if connected to the enterprise intranet through VPN, it is impossible to achieve accurate access control at the personnel and application levels, and there is still a risk of unauthorized access.

  • Enterprise files are leaked through mobile terminals

    Downloading, storing, viewing, and forwarding files on mobile phones are the most common mobile office scenarios. However, in the open network environment and BYOD device environment, enterprises have lost control, and enterprise files are at risk of leakage at any time.

  • Lack of mobile unified access portal

    Enterprise applications accessed through mobile phones are usually H5 applications or Web applications, but the access address and account system of each application are independent, which results in that employees need to manually enter and log in each time they visit, and when the application address changes, employees cannot know at the first time, resulting in unsuccessful access and poor access experience.

DACS Solution by DataCloak

DACS supports mobile devices of Android, iOS, etc., providing zero-trust network access, fine-grained access permission control, trusted encrypted network transmission tunnel, mobile data security protection, secure sharing and other security capabilities for enterprise mobile office.

  • Zero trust network access control
    • Reduce the exposure of enterprise intranet

      Enterprise intranet applications are all released through DACS Zero Trust Security Gateway and combined with Zero Trust SPA technology to achieve "invisibility" of intranet services.

    • Strict access authentication

      Following the principle of "authentication before connection", DACS Mobile supports multiple authentication methods and two-factor authentication to ensure the legitimacy of personnel identity, and supports continuous access detection of mobile devices to ensure the legitimacy of devices.

    • Fine-grained access permission control

      It supports 7-layer of network access behavior control, and divides fine-grained access permissions for personnel and applications, making users invisible to applications that they are not authorized to access.

    • High-strength data transmission encryption

      Establish a high-strength encrypted data transmission tunnel between mobile terminals and the DACS security gateway to ensure the secure transmission of enterprise data on the Internet.

  • Mobile enterprise data protection
    • Enterprise data leakage prevention

      An enterprise encrypted secure workspace is isolated on the mobile device, all files downloaded from intranet applications are only allowed to be viewed in the secure workspace and cannot be exported to the secure workspace, such as WeChat and Cloud Drive.

    • Secure enterprise data sharing

      DACS supports sharing files between mobile and PC, and also supports sharing directly to other colleagues in the same secure workspace on mobile, providing a complete closed-loop secure file sharing system.

  • Mobile-compatible access experience
    • Lightweight unified portal

      DACS provides enterprises with a unified access portal for mobile applications (H5, Web) and supports single sign-on, so employees can easily access enterprise applications by simply logging into the DACS client without having to enter addresses or repeatedly verify their identities.

    • The ultimate operating experience

      DACS mobile client, providing the same use experience as personal Internet APPs.

  • Zero trust network access control

    • Reduce the exposure of enterprise intranet

      Enterprise intranet applications are all released through DACS Zero Trust Security Gateway and combined with Zero Trust SPA technology to achieve "invisibility" of intranet services.

    • Strict access authentication

      Following the principle of "authentication before connection", DACS Mobile supports multiple authentication methods and two-factor authentication to ensure the legitimacy of personnel identity, and supports continuous access detection of mobile devices to ensure the legitimacy of devices.

    • Fine-grained access permission control

      It supports 7-layer of network access behavior control, and divides fine-grained access permissions for personnel and applications, making users invisible to applications that they are not authorized to access.

    • High-strength data transmission encryption

      Establish a high-strength encrypted data transmission tunnel between mobile terminals and the DACS security gateway to ensure the secure transmission of enterprise data on the Internet.

  • Mobile enterprise data protection

    • Enterprise data leakage prevention

      An enterprise encrypted secure workspace is isolated on the mobile device, all files downloaded from intranet applications are only allowed to be viewed in the secure workspace and cannot be exported to the secure workspace, such as WeChat and Cloud Drive.

    • Secure enterprise data sharing

      DACS supports sharing files between mobile and PC, and also supports sharing directly to other colleagues in the same secure workspace on mobile, providing a complete closed-loop secure file sharing system.

  • Mobile-compatible access experience

    • Lightweight unified portal

      DACS provides enterprises with a unified access portal for mobile applications (H5, Web) and supports single sign-on, so employees can easily access enterprise applications by simply logging into the DACS client without having to enter addresses or repeatedly verify their identities.

    • The ultimate operating experience

      DACS mobile client, providing the same use experience as personal Internet APPs.

Value to Enterprises

  • Provide a secure mobile office
    • Enterprise intranet business "invisible", no need to expose business externally, reduce the risk of external attacks

    • End-to-end access security protection

    • Even on BYOD devices, enterprises can still manage and control their own data

  • Improve management efficiency
    • Application release, policy configuration, and personnel management are all handled in the unified management backend

    • Lightweight unified portal for easy operation and maintenance

  • Improve user experience
    • Unified access portal, single sign-on, easy and secure access for users

    • Native APP experience, no learning cost for employees, easy to promote to all employees

Resource Center

Contact Us

  • Hotline: 400-688-5600
  • Contact Email: contact@datacloak.com

Follow Us

  • Follow us
    DataCloak

DATACLOAK

  • DataCloak is committed to the development of a zero trust data security platform to help enterprises quickly complete the digital transformation and infrastructure upgrades required in the cloud era, and achieve global borderless data security.
START YOUR TRIAL

Copyright © 2024 DataCloak, Inc. All Rights Reserved.

Privacy Policy | Terms of Service

Contact Us