IT Administrator’s Guide

The product (referred to as “ProductName” throughout this sample) injects security policies around individual Android/iOS applications. Administrators control the system through a browser-based console or a REST API. This excerpt, from the chapter “Managing and Injecting Applications,” shows some of the configuration procedures available through the console.

IT Administrator’s Guide Excerpt

Audience: IT administrators tasked with maintaining security for mobile devices

Industry: enterprise mobile security

Previous post: