Maintain security and compliance through selective remote wipe
of privileged data and wipe when a device un-enrolls from Intune.
Some of the prominent use cases at UPL are Digital Rights Management (DRM) on all shared files, FTP replacement (secure and managed file transfer), Control on Email attachments (through Outlook Plugin), anywhere remote access to enterprise content repositories (ECM), Endpoint Backup, Endpoint Encryption, Remote Wipe
and Mobile Content Management (MCM) for enterprise mobility.
Administrative Controls Core provides an administrative dashboard as well as capabilities for user management, access management and remote wipe
like remote lock, remote wipe
, password reset, theft protection, Wi-Fi
The Windows To Go drive can be centrally managed and offers remote wipe
features to protect against loss and theft.
Beyond apps and messaging, Blackphone ships with anonymous web browsing, built-in virtual private network access, and remote wipe
tools, as well as SpiderOak's encrypted cloud storage.
Enhanced security policies including Remote Wipe
and Device Access Control capabilities to securely remove all data from BYOD devices in the event of theft or data breach
It also comes with additional exclusive apps like Blackphone Security Center, Blackphone Activation Wizard and Blackphone Remote Wipe
, giving more security to guard data in the smartphone.
Physical security for mobile devices is inherently limited, thus reliance on remote wipe
functionality/enforcement of security is the best option.
8220;Unlike conventional remote wipe
, which is heavy handed, that can potentially wipe out personal data as well, Vaultize selectively wipes only enterprise-controlled data based on corporate policies and without affecting the personal content - thus reducing the risk of negative consequences of erroneous wipe and privacy concerns,” said Anand Kekre, CEO and Co-founder of Vaultize.
Alternatively, officers may prevent a remote wipe
from occurring by
KRMC includes support for remote wipe
and password management, as well as updating, tracking and auditing.