Secure access to sensitive data with conditional access

 

Conditional access is the process of dictating the level of access granted to corporate endpoints based on their fulfillment of specific security polices. Admins can enable conditional access to corporate apps and data only when the devices accessing the data meet certain qualifications like having a secure password configured on them or already being under management. With Mobile Device Manager Plus, you can create and implement a range of context-based conditional access policies to ensure your enterprise's data is accessible only through trusted devices and to authorized users.

Start your free, 30-day trial

 

Mobile Device Management for

Assess your device security posture based on a spectrum of device security signals

Ensure devices accessing corporate apps, data, and servers are compliant with a range of security policies

Content Management
  • Mandate password protection on corporate devices and the corporate container on personal devices in BYOD environments. Employees will be required to configure a secure passcode before gaining access to devices and data.
  • Enforce the encryption of corporate data to add an extra layer of security to sensitive data.
  • Automate the detection and removal of jailbroken and rooted devices to ensure only secure devices are allowed on the network.
  • Leverage device attestation to assess and classify devices based on the risk they pose to the network.
Content Management
  • Have tested OS updates pushed to devices on a preconfigured schedule, ensuring devices that access corporate data have the latest patches applied.
  • Test and schedule work app updates to be silently installed on devices to fix security vulnerabilities on existing apps.
  • Ensure the use of corporate-provided eSIMs for communications by restricting their removal.
Content Management
  • Enable Google Play Protect to keep device apps constantly verified and secure.
  • Restrict side-loading third-party apps onto devices to minimize the risk of malicious apps.
  • Keep an eye on system integrity by leveraging the Android Play Integrity API and allow only verified devices to access corporate data by detecting and removing untrustworthy devices.
  • Monitor and dynamically classify devices based on the security risk they present by integrating Mobile Device Manager Plus with mobile threat defense (MTD) solutions.

Facilitate conditional access to corporate data at the granular level

Facilitate conditional access by How it can be accomplished How it can be used
Device-based conditional access
Granting access to enrollment only when the device meets specific conditions. Restrict enrollment and provisioning based on device type, ownership, OS, and directory group. Limit enrollment only to specific OSs, BYOD devices, or only to specific users, depending on how you wish to set up your mobile IT infrastructure.
Granting access to corporate resources based on a device's group membership. Automatically assign devices to groups with pre-configured policies to dictate the level of access allowed to each device based on its group. Implement stricter device configuration policies for business-critical device groups. For instance, kiosk devices can be locked down to only the needed app, while devices serving both personal and corporate uses can be configured with less restrictions, with the corporate workspace containerized.
Granting access to corporate resources based on user role. Implement thoroughly configured policies to each team to limit employees access to only the apps, content, and permissions needed to fulfill their tasks. Configure devices based on the user's job. For instance, an HR employee can access only the HR app, while someone in sales will be allowed access to CRM, sales tools, and files containing customer details.
Granting access to Exchange only to managed devices. Restrict access to your Exchange server and Microsoft 365 apps only to managed devices. Ensure employees accessing corporate data through mobile devices have the needed security measures configured and are compliant with your policies.
Granting access to enrollment only to users who accept predefined terms. Configure the Terms of Use and require it to be accepted by employees before enrolling their devices and allowing access to sensitive corporate data. Ensure employees read and agree to device management terms that outline the aspects of the device that the IT team can control and what data is collected. This is crucial, especially when managing BYOD devices.
App-based conditional access
Granting access to Microsoft apps only to secure devices. Restrict Microsoft 365 app access to devices that fulfill specific security conditions, OS, and patch versions. Allow the access of Microsoft 365 apps on unmanaged Apple and Android devices that have passwords, DLP policies, specified OS and app versions, and other requirements configured.
Granting access to internal apps based on group membership and user role. Restrict internal app access only to specific directory groups and users on an as-needed basis. Deploy internal apps containing or allowing access to sensitive data on an as-needed basis. For instance, devices held by hospital staff can have access to the patient database app, while devices deployed as self-service kiosks will have access only to the check-in app.
Granting access to work files only through secured devices and trusted apps. Restrict corporate mailboxes, attachments, and documents to be accessed through trusted apps, and apply DLP policies to prevent data exports. Allow corporate data to be accessible only through internally-built apps to negate the security risks of having these files accessed through third-party and malicious apps.
Risk-based conditional access
Granting access to corporate data only to devices that fulfill specific security policies. Restrict devices until they comply with customized sets of security restrictions like mandated password, forced encryption, scheduled un-skippable OS updates, and more. Configure a password and define the minimum level of password strength required to fulfill security and compliance requirements. Device users will be forced to configure the password before being able to access their work device.
Granting access to corporate data only to non-vulnerable devices. Restrict access from jailbroken, rooted, and legacy devices by automating their detection and removal. Monitor and constantly assess the security posture of your fleet by removing these devices from management and eliminate any possible security threats they pose.
Granting access to corporate data only to devices that don't register as a security threat. Restrict devices that don't meet compliance standards by integrating with MTD apps. When devices are detected to pose a high threat, block the access of work apps and data on them, thereby allowing the conditional access of corporate resources only to secure devices. Dynamically group and filter devices that register as high threat, and automatically restrict their access to corporate apps and data by initiating Kiosk Mode on them with access only to non-corporate apps.
Network-based access
Granting access to corporate data only after the device is connected to a VPN. Facilitate an automatic VPN connection to be established when a corporate app is launched. Have devices connect to your internal network when work apps are launched to monitor and secure securing communications carrying sensitive corporate data.
Granting access to corporate data only after the device is connected to a safe internet connection. Allow devices to connect only to trusted and pre-configured Wi-Fi networks. Prevent devices from connecting to public and open Wi-Fi networks to secure device communications. For added security, you can also ensure devices only connect to the office Wi-Fi to safeguard devices and data from network-based threats.
Granting access to corporate data only after the device is verified with certificates. Restrict corporate network access only to devices verified with certificates. Keep work devices secured with certificates that are automatically renewed, preventing access from non-verified devices.
Location- and time-based access
Granting access to devices located within specific boundaries. Block the access of corporate data when devices are outside specific geographical boundaries, thereby enabling location-based access through geofencing. Ensure business-essential data stays within the office premises by wiping it if the device is taken out of the defined boundary.
Granting access to device apps only during a specified time. Automate an app to launch only during a certain time of day, thereby enabling time-based access to apps through Autonomous app mode. Allow access to apps during a specific event like an exam, conference, or meeting.

Implement Zero Trust by integrating Mobile Device Manager Plus with your identity provider

Mandate the access of Zoho Workplace apps like Zoho CRM and Zoho Mail only though managed devices.

Allow only managed Windows devices to access Microsoft 365 apps. Additionally, configure data protection, access requirements, and conditional launch policies for Microsoft 365 apps even when they're installed on Apple and Android devices that are not managed by Mobile Device Manager Plus.

Enable Exchange and Azure servers to be accessible only through managed devices.

Integrate Google Workspace with Mobile Device Manager Plus and set the Managed Google Play app and app configurations on managed devices.

okta

Enable single sign-on by integrating Okta with Mobile Device Manager Plus. Also leverage Okta's conditional access capabilities based on device security posture.

Facilitate context-aware access to corporate apps and data

  • Provision apps, data, permissions, and device configurations based on the directory group they belong to and the user's role.
  • Allow the access of corporate data only when business-critical devices are located within specific geographical boundaries, revoking their access if they move out.
  • Limit the number of devices allowed to access corporate data per user.
  • Ensure an automated VPN connection is established when work apps are launched to secure communications.
  • Configure and restrict devices only to trusted Wi-Fi networks to protect corporate data from network-based security threats.
  • Enable corporate files and emails to be accessed only through pre-approved apps.
  • Apply DLP policies like restricting clipboard functionality to prevent corporate data exports.
Content Management
 

Trusted by leading brands across industry verticals

Here's what your peers think about us

We have been using Mobile Device Manager Plus for over a year now, and it has assisted us in staying compliant with our organization's security and compliance policies. We are able to safeguard our customer data, track our devices, and implement policies over the air.

Syed Ahmad Rasool Sr. manager of technology security, Vodafone

Mobile Device Manager Plus is a powerful safeguard against the threat of corporate content coming into the wrong hands. This robust solution enables us to centralize all mobile devices on the same console as a web-portal which is segmented by countries. The access for local IT teams in each country is restricted to the mobile devices in their respective country, ensuring better security.

Abdoul Karim Barry Systems engineer, Microcred Group

Manage your enterprise assets with a free, 30-day trial!