Data Sheet ZENworks Mobile Workspace

ZENworks Mobile Workspace

Almost every end user wants mobile access to valuable company resources. But some of these resources are full of sensitive information: contacts, attachments, appointment details, and more. Regardless of how sensitive this data is, users want access without giving complete control of their mobile devices to the company. With ® ZENworks® Mobile Workspace, you can strike the right balance. Companies can allow mobile access to corporate applications through a company-controlled workspace while users retain control of their devices and personal data.

Product Highlights Secure Mobile Calendars: Employee calen- ZENworks Mobile Workspace ZENworks Mobile Workspace is a simple, highly dars—including appointments, meetings, and at a Glance: secure mobile application management (MAM) attachments—also stay protected via contain- solution for companies that want to enable ers on mobile devices. • Mobile Email Access: Enable your workforce to conveniently access corporate email accounts in a mobile device use for their internal or external secure container on their mobile device. workforce. Users can access sensitive data Access corporate documents: Provide con- through a mobile workspace that uses unique, venient access to a corporate collaboration • Containerized Contact Lists: Keep the contact info of employees, customers, and partners acces- independent security mechanisms that the repository or file repository, allowing users to sible and secure in a mobile device container. company controls. As a result, business assets easily access their data from the workspace. stay protected—whatever the configuration or • Secure Mobile Calendars: Employee calendars— ownership of the device. And users get to keep Read documents: A built-in viewer for Office including appointments, meetings, and attachments—­ also stay protected via containers on mobile devices. their mobile habits, apps, and privacy without and PDF files enables users to review items suffering from frustrating device restrictions. they receive in their email or that are accessible • Mobile Browser Access: Provide off-site access to via their documents repository. company intranet resources and web ­applications without having to expose them directly to the internet. Key Features and Benefits Browse intranet: When using the browser built Business Workflows into the workspace, users are always brows- ZENworks Mobile Workspace enables end us- ing through the secure gateway. This feature ers to access professional resources from their eliminates inadvertent browsing through the mobile devices: corporate VPN. Additionally, the administrator can control which websites are accessible from Mobile Email Access: Enable your workforce within the workspace. to conveniently access corporate email ac- counts in a secure container on their mobile Browse web applications: Users can readily device. add links to their internal web applications for quick and easy access within the workspace. Containerized Contact Lists: Keep the con- tact info of employees, customers, and part- Support for PIM Tasks: Create, edit, and de- ners accessible and secure in a mobile device lete tasks from your GroupWise, Exchange, or container. Notes task list. NPNS and GCM push notification support: Data in-transit protection: All communication Even when you don’t have the application run- between the agent and the server is encrypted, ning, you are notified that there are new emails, both at the data level and over the HTTPS calendar alerts, or tasks via push notifications. transport.

Easy Management Data-at-rest encryption: The workspace uses Workspace management: Centrally manag- banking-grade encryption to secure all of the ing the resources available to users and devices local data in the workspace. allows you to limit the workspace to only the capabilities that a user needs. Strong two-factor authentication: Use Java Authentication and Authorization Service Apps management: Implement a simple land- (JAAS) to implement two-factor authentication ing page where users can download the appli- with access management systems such as cations that the corporation supports, without NetIQ® Access Manager™ and Active Directory the need for intrusive management agents. Federation Services (ADFS). Built-in two-factor www.microfocus.com enrollment is also available. User and group management: Use your cor­ porate directory (Active Directory or eDirect­ Secure user activation: Depending on the ory™) to leverage your current users, passwords, level of security you need, you can allow the and groups. user to request access or require an administra- tor to manually enable user enrollment. Micro Focus UK Headquarters Web-based administration: Manage devices United Kingdom from anywhere by using the web-based man- Device integrity control: Implement rules to +44 (0) 1635 565200 agement console. control access to the workspace based on hours and days, location, jailbreak status, and more. U.S. Headquarters Over-the-air configuration: Users can enroll Rockville, Maryland the device with the workspace server and gain Threat Prevention 301 838 5000 access with nothing more than an email that From unauthorized data sharing to jailbreaking, 877 772 4450 includes the enrollment URL. prevent risky activity within the workspace with Additional contact information and office locations: policies you set: www.microfocus.com Controlled time of content to sync: End us- ers and admins control time of content to sync. Data sharing: Control whether users can share data outside of the workspace. You can include Independent Security restrictions such as preventing screenshots, There’s no need to enforce policies that control sharing calendars and contacts, and copying entire devices to secure your corporate data. and pasting outside of the container. ZENworks Mobile Workspace uses its own keystore and encryption to remove potential Unsecure caches: Control whether the work- vulnerabilities: space provides online only or offline access. Sensitive data isolation: All corporate data Securely encrypt the local data store with remains in the secure workspace, so when banking-grade encryption. users access it, they know they’re entering a corporate data island. And because the data is Data theft on lost devices: In the event that an encrypted, you can be sure it’s secure. employee loses a device or leaves the company, you can wipe just the workspace and prevent Dedicated encryption: The workspace does­ access to your sensitive data. n’t rely on the underlying OS for encryption. Instead, it uses dedicated, banking-grade en- Jailbreak: If a user jailbreaks his or her device, cryption for local storage. you can restrict access to the workspace.

160-000185-002 | M | 08/17 | © 2017 Micro Focus. All rights reserved. Micro Focus, the Micro Focus logo, Access Manager, eDirectory, NetIQ, and ZENworks, among others, are trademarks or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the property of their respective owners.