Device’s Main Security Features

AVB – Android Verified Boot
It controls OS updates for different partitions and protects from attackers rolling back to a vulnerable version of Android.

Device Encryption
If the device goes to the wrong hands, local data will be safe.

App Store
No installation from third-party, insecure App Stores.

Locked Bootloader
No fastboot flashing unlock, keeping your device protected.

Network Attack Protection
Detects network attacks (MITM, rogue Wi-Fi, cellular networks) as well as attempted network scanning

Password configuration
• Erases the device after 5 unsuccessful login attempts;
• It forces biometry usage
• It forces biometry usage

Device Security
• Disables remote login
• Blocks factory reset
• Enables device location
• Blocks the user for bad use
• Blocks personal apps, if not in compliance
• Blocks factory reset
• Enables device location
• Blocks the user for bad use
• Blocks personal apps, if not in compliance

Attack Detection
Detects attacks on web browsers, emails, SMS spear phishing and privilege escalation attacks

App Analysis
- Performs in-depth application analysis using Machine Learning to protect against advanced threats, including zero-day threats.
- Features mobile threat intelligence (forensic analysis reporting)
- Malware Analysis and Anti-malware (on-device)
- Mobile App Automated Scanning
- Dynamic Mobile App Analysis

Controls
Assesses control over corporate email, VPN and Wi-Fi, application installation and uninstallation

Location Services Off
By default, it turns location services off so that you will be sure that only the ones you chose would be on.

Remote Wipe
Wipe everything off, and recover sensitive data

Operating System Updates
Latest versions, always up to date, reinforcing security

Unneeded Apps removed
Keep the device light and safer, with only the Apps you need.

App Compliance
• Controls the installation of applications, as defined by the Company, being able to separate personal and professional areas
• Device blocking, if not in compliance
• Device blocking, if not in compliance

Developer options
• Blocks file transfer through USB
• Blocks physical media mounting
• Blocks physical media mounting

Data security
• Blocks screen capture
• Restricts input methods
• Restricts input methods

Device functionalities
• Blocks printer usage
• Blocks Bluetooth sharing
• Blocks Bluetooth sharing

Jailbreaking
Detects basic and advanced jailbreaking/rooting

Access Revocation
Allows you to revoke access to non-compliant devices

Detection
- Detects if the device has security settings enabled (PIN, On-Device Encryption, etc.)
- QR Code scanning
- Rogue Access Point Detection