Although the office of enterprise employees is mainly on PCs, but PC is inconvenient to carry around, so mobile office is essential, mainly through mobile phones to deal with approval, view documents, forward documents, browse the company's internal H5 applications or Web applications (such as: OA, BI data reports, e-mail) and other work, which brings convenience for employees to handle work anytime and anywhere, and also adds many new challenges of mobile office to the enterprises.
Mobile devices usually use Internet networks such as 5G, home/public WiFi, etc. To be able to access the enterprise intranet anytime and anywhere, it needs to be open to the Internet. As the degree of enterprise mobility continues to increase, the external exposure of the enterprise intranet is getting bigger and bigger, and the risk of being attacked is getting higher and higher.
Even if connected to the enterprise intranet through VPN, it is impossible to achieve accurate access control at the personnel and application levels, and there is still a risk of unauthorized access.
Downloading, storing, viewing, and forwarding files on mobile phones are the most common mobile office scenarios. However, in the open network environment and BYOD device environment, enterprises have lost control, and enterprise files are at risk of leakage at any time.
Enterprise applications accessed through mobile phones are usually H5 applications or Web applications, but the access address and account system of each application are independent, which results in that employees need to manually enter and log in each time they visit, and when the application address changes, employees cannot know at the first time, resulting in unsuccessful access and poor access experience.
DACS supports mobile devices of Android, iOS, etc., providing zero-trust network access, fine-grained access permission control, trusted encrypted network transmission tunnel, mobile data security protection, secure sharing and other security capabilities for enterprise mobile office.
Enterprise intranet applications are all released through DACS Zero Trust Security Gateway and combined with Zero Trust SPA technology to achieve "invisibility" of intranet services.
Following the principle of "authentication before connection", DACS Mobile supports multiple authentication methods and two-factor authentication to ensure the legitimacy of personnel identity, and supports continuous access detection of mobile devices to ensure the legitimacy of devices.
It supports 7-layer of network access behavior control, and divides fine-grained access permissions for personnel and applications, making users invisible to applications that they are not authorized to access.
Establish a high-strength encrypted data transmission tunnel between mobile terminals and the DACS security gateway to ensure the secure transmission of enterprise data on the Internet.
An enterprise encrypted secure workspace is isolated on the mobile device, all files downloaded from intranet applications are only allowed to be viewed in the secure workspace and cannot be exported to the secure workspace, such as WeChat and Cloud Drive.
DACS supports sharing files between mobile and PC, and also supports sharing directly to other colleagues in the same secure workspace on mobile, providing a complete closed-loop secure file sharing system.
DACS provides enterprises with a unified access portal for mobile applications (H5, Web) and supports single sign-on, so employees can easily access enterprise applications by simply logging into the DACS client without having to enter addresses or repeatedly verify their identities.
DACS mobile client, providing the same use experience as personal Internet APPs.
Enterprise intranet applications are all released through DACS Zero Trust Security Gateway and combined with Zero Trust SPA technology to achieve "invisibility" of intranet services.
Following the principle of "authentication before connection", DACS Mobile supports multiple authentication methods and two-factor authentication to ensure the legitimacy of personnel identity, and supports continuous access detection of mobile devices to ensure the legitimacy of devices.
It supports 7-layer of network access behavior control, and divides fine-grained access permissions for personnel and applications, making users invisible to applications that they are not authorized to access.
Establish a high-strength encrypted data transmission tunnel between mobile terminals and the DACS security gateway to ensure the secure transmission of enterprise data on the Internet.
An enterprise encrypted secure workspace is isolated on the mobile device, all files downloaded from intranet applications are only allowed to be viewed in the secure workspace and cannot be exported to the secure workspace, such as WeChat and Cloud Drive.
DACS supports sharing files between mobile and PC, and also supports sharing directly to other colleagues in the same secure workspace on mobile, providing a complete closed-loop secure file sharing system.
DACS provides enterprises with a unified access portal for mobile applications (H5, Web) and supports single sign-on, so employees can easily access enterprise applications by simply logging into the DACS client without having to enter addresses or repeatedly verify their identities.
DACS mobile client, providing the same use experience as personal Internet APPs.
Enterprise intranet business "invisible", no need to expose business externally, reduce the risk of external attacks
End-to-end access security protection
Even on BYOD devices, enterprises can still manage and control their own data
Application release, policy configuration, and personnel management are all handled in the unified management backend
Lightweight unified portal for easy operation and maintenance
Unified access portal, single sign-on, easy and secure access for users
Native APP experience, no learning cost for employees, easy to promote to all employees
Contact Us