Amtel Authorized Online Reseller

Amtel Mobile Security
Help protect sensitive information, minimize risks, and meet regulatory compliance requirements

Mobile security policies help protect sensitive information, minimize risks, and meet regulatory compliance requirements. Enforce workspace restrictions on both corporate owned and BYOD mobile devices with pre-defined configuration settings for access control, content sharing and mobile app usage.

Mobile security policies help protect sensitive information, minimize risks, and meet regulatory compliance requirements

Mobile Device Security

Enforce access control by feature restrictions and configuration settings.

  • Detect and quarantine compromised device
  • Block Jailbreak (iOS) or Rooted (Android) device
  • Limit BYOD enrollment to approved devices
  • Encrypt content
  • Remotely lock and unlock device
  • Wipe content in full or selectively
  • Restrict device features
  • Email server, Wi-Fi, VPN, LDAP, CalDAV settings

Protect and secure enterprise apps and data with access control policies

Application Security

Protect and secure enterprise apps and data with access control policies that detect and disable access from compromised or non-compliant devices.

  • Restrict native apps via configuration profiles
  • Configure whitelist policies for apps
  • Restrict or block blacklist apps
  • Enforce strong authentication for corporate access
  • Set usage policies and threshold levels for alerts

Users can safely dock to the corporate network and quickly become more productive with simple user interfaces and secure defaults

Secure Workspace

Users can safely dock to the corporate network and quickly become more productive with simple user interfaces and secure defaults.

  • Control how users’ home screens look and operate
  • Restrict what apps can be accessed
  • Hide installed widgets and apps from users
  • Restrict browsing to selected URLs

Containerize and protect corporate content by sharing only in secure containers

Secure Container

Containerize and protect corporate content by sharing only in secure containers. Automatically disable access and wipe container if a device is compromised, non-compliant or when user leaves the company.

  • Push content updates centrally to container
  • Access control restrictions based on time of day and location of mobile access device
  • Keep content safe and secure with strong 256-bit SSL encryption
  • Remove content automatically upon exit from app

Remotely push files to mobile devices for reliable and secure document sharing

Secure Content Sharing

Remotely push files to mobile devices for reliable and secure document sharing. Organizations can take control of confidential corporate content such as briefing documents for executives, monthly sales reports, forms, or manuals while eliminating the inherent risk of information landing in the wrong hands.

  • Distribute, update and erase content remotely on mobile devices
  • Share files in multiple formats and versions without user intervention
  • Share content securely and reliably with profile based distribution

Secure email, calendar and contact list data accessed from mobile devices

Email Security

Secure email, calendar and contact list data accessed from mobile devices. Configure policies for data leakage prevention (DLP) such as restrictions on copy/paste and email forwarding. Disable access if a device is compromised, non-compliant or the user leaves the company.

  • Two factor authentication for corporate email access
  • Allow only MDM enabled, authorized devices to connect
  • Block unprotected, non-compliant and lost or stolen devices
  • Require Email attachments to be opened, viewed and stored only in secure container

Automatically activate or deactivate device features and access to apps

Geofencing Security

Automatically activate or deactivate device features and access to apps and corporate data based on GPS location of enrolled mobile devices relative to geofence boundaries.

  • Automatic Wi-Fi configuration as device moves in and out of geofence boundaries
  • Limit access to sensitive corporate apps only in geofenced work locations
  • Restrict market app access in geofenced area
  • Disable camera and other device settings to protect sensitive data

Secure authorized mobile access to enterprise networks from public places while preventing unknown devices from connecting to corporate networks

Network Security

Secure authorized mobile access to enterprise networks from public places while preventing unknown devices from connecting to corporate networks.

  • Enforce security policy for access to internal corporate sites
  • Configure certificate-based access to corporate VPN and Wi-Fi networks
  • Protect VPN connections via application tunneling
  • Integrate Network Access Control (NAC) devices

Centrally configure security policies and seamlessly deploy to remote devices over-the-air (OTA)

Security Management

Centrally configure security policies and seamlessly deploy to remote devices over-the-air (OTA). Handle policy violations through real-time notifications and alerts to network administrators and users for remediation.

  • Role based admin rights for profile groups
  • Data Leakage Prevention (DLP)
  • Remotely manage secure content

Amtel’s Mobile Device Management (MDM) solutions address and resolve critical issues facing IT professionals and helps minimize corporate and personal liability and risks related to mobile device security and management.

PDF File
Download the Amtel Mobile Device Management Solution: MDM Datasheet (PDF).