The product (referred to as “ProductName” throughout this sample) injects security policies around individual Android/iOS applications. Administrators control the system through a browser-based console or a REST API. This excerpt, from the chapter “Managing and Injecting Applications,” shows some of the configuration procedures available through the console.
Audience: IT administrators tasked with maintaining security for mobile devices
Industry: enterprise mobile security