Mobile Productivity

Seamlessly and securely connect users to corporate networks when they’re on the go.

Access corporate web apps (like SharePoint) and intranet sites without manually connecting to a VPN
Find information quickly with pre-configured corporate bookmarks and home pages
Save personal bookmarks which automatically sync across devices
Eliminate challenges with typing in passwords to backend websites with built-in SSO
Integrate with VMware Boxer to seamlessly access web app links from business emails

[+] Read More

Enterprise-grade Security

Built-in security, compliance and privacy controls help keep your corporate data safe.

Achieve end-to-end encryption of data at rest and in-transit with AES 256-bit encryption
Separate business and personal data and manage security policies while keeping individual information private
Provide advanced security with data loss prevention (DLP) controls such as blacklist or whitelist web pages, cut/copy/paste restrictions, enable/disable cookies and more
Trigger manual or automatic compliance actions to block or wipe enterprise data based on password policies, jailbreak/root detection, device compatibility, OS compatibility and other factors

[+] Read More

Kiosk and Line of Business Controls

VMware Browser is customizable to meet your unique needs.

Lock the device into a single, configurable web
application kiosk
Control browsing to specific home pages, web apps
and links
Configure settings to remove the
navigation bar
Enable shared device modes using VMware Browser as the central point for users to log in and out

[+] Read More

Connectivity

Bring people, information and ideas together in one place to get work done faster.

Enable secure instant messages between individuals or groups, both public and private, via real-time chat
Bring people, content, data, and systems together in one, easy-to-search platform
Share and organize documents, images and videos by group or topic, keeping conversations open and always in context
Join groups, conversations, projects and more from anywhere, on any device
Find experts, get answers and discuss topics relevant to your work with real-time feedback for faster innovation

[+] Read More

Collaboration

Discover, share and collaborate from anywhere, with anyone, on any device.

Bridge the gap between employees and executives by holding virtual meetings via Town Halls, and empower people with a direct channel to engage with leadership
Drive collaboration between employees, teams, executives and external contributors in one place
Use built-in analytics to recognize common trends and usage patterns among users
Tap in to the imagination and ingenuity of every employee to drive business forward with Socialcast Challenges
Enable better ways to align vision and values across the entire organization with Socialcast Town Halls

[+] Read More

Streamlined Workflows

Support daily workflows by plugging in to the systems you use every day.

Integrate with industry-leading hybrid cloud management solutions to provide admins, IT ops and developers a collaboration framework to help expedite the process of resolving multi-faceted issues
Solve complex problems that require multiple systems and various experts with seamless integration capabilities from the Integration Store
Enable admins and support teams to see and respond to relevant updates side-by-side in the Socialcast activity stream
Provide authorized users seamless access to their Socialcast community with single sign on (SSO) and automatically provision their Socialcast account

[+] Read More

Anytime, Anywhere Access

Simplify access to all corporate content across multiple content repositories and devices.

Single access point to content across OneDrive, Google Drive, Box, Dropbox and more with support for 30+ content repositories
Support for various device types (phone, tablet, desktop) and file types
Aggregated search across repositories makes locating content easy
Simple file sharing keeps your team in sync with the latest content from your private network
Available on Android, iOS and Windows

[+] Read More

Efficient Mobile Workflows

Achieve a new level of mobile productivity with an intuitive app experience.

Share, comment and @tag others on files to work collaboratively and stay productive
Quickly edit and annotate Office and PDF files online or offline
Securely capture images, videos or audio content securely with metadata with content archiving
Leverage integrations with other business apps to help employees easily complete tasks on-the-go

[+] Read More

Data Security and DLP

Powerful security, compliance and DLP controls protect your corporate data.

Integrate with content in the cloud, on premises or hybrid with flexible storage options
Enforce strong authentication to protect access to content with multi-factor authentication and passcode requirements
Secure content with AES 256-bit, FIPS 140-2 encryption in-transit and at-rest
Apply dynamic watermarking technology to protect proprietary data
Protect content on BYO devices with remote wipe and data loss prevention
Leverage real-time dashboards and analytics with full audit trails to analyze trends

[+] Read More

Mobile Productivity

Enable a new level of mobile productivity with an intuitive user experience.

Give users everything they need to be productive in a single app with integrated mail, calendar and contacts
Boxer seamlessly integrates with Exchange, Office 365, Outlook, Gmail, Yahoo and iCloud email systems
Enable productive quick actions including pre-determined email replies, predictive move to folders and one-tap sharing of calendar availability
Allow users to personalize their experience with customizable swipe gestures, contact avatars and more
Integrate with third-party business apps like Box, Evernote and Google Drive to simplify attachment and note workflows

[+] Read More

Enterprise-grade Security

Built-in security, compliance and privacy controls protect your corporate data.

Ensure end-to-end encryption of data at-rest and in-transit with AES 256-bit encryption
Trigger manual or automatic compliance actions to block or wipe enterprise data based on password policies, jailbreak/root detection, device compatibility, OS compatibility and other factors
AirWatch Secure Email Gateway (SEG) provides compliance around mobile mail connections, allowing for refined policies and comprehensive visibility to managed and unmanaged connections.
Separate business and personal data to manage security policies while respecting user privacy on the device
Enforce access control policies by preventing users from configuring accounts and monitor email traffic remotely from the admin console

[+] Read More

Comprehensive Solution

Future-proof your mobile strategy with scalable, unified solutions.

Integrate with our entire productivity apps suite for enhanced mobile workflows across email, calendar and contacts, content, identity and more
Seamlessly click into intranet sites without the need for VPN or excessive logins with AirWatch Browser integration
Attach files to emails directly from AirWatch Content Locker, Box, Dropbox, OneDrive for Business and more
Enable true single sign on (SSO) with VMware
Identity Manager

[+] Read More

Secure SSO Access

Get users up and running quickly with self-service and secure single sign on (SSO) to Office 365.

Deploy Office 365 email and apps automatically or on-demand from your own, custom app store
Federate your existing on-premises corporate directory to enable a common identity for SSO authentication across Office and all other apps
Restrict access to Office 365 to licensed users only and automatically revoke access to unauthorized users without calls to IT
Support password-free and certificate-based authentication even extending Azure AD or other identity solutions

[+] Read More

Conditional Access

Provision adaptive access to Office 365 based on user entitlement and mode of access.

Restrict access to Office 365 apps and services such as Exchange Online, OneDrive for Business and Skype for Business to only trusted users and compliant devices
Check for compliance based on user groups, device type, app type, OS version, device management, compromised status and more
Set access policies based on the device type or platform (mobile, desktop or Web)
Support different authentication methods (certificates, domain membership, VPN-based) and strength requirements to provide an excellent user experience while enforcing IT policies

[+] Read More

Data Loss Prevention

Take Office data protection to a new level with advanced security and data loss prevention (DLP) features.

Leverage native platform controls to containerize apps, encrypt data, set DLP policies (like open-in and cut/copy/paste restrictions) and prevent access to company data from untrusted apps
Enable security measures – encryption, device passcode, selective wipe or remote wipe of apps and email – that protect data at rest
Protect data in use by separating work and personal apps and setting up work email and apps inside a work container on the device
Restrict sharing of data, emails and attachments to only approved corporate apps and prevent moving emails to and opening attachments in personal apps
Encrypt data in transit and, for security sensitive deployments, expose a limited set of data center resources to your Office apps via app- and network-level micro-segmentation

[+] Read More

Built-in Privacy Framework

Configurable policies and controls enable corporate data security and provide IT with the tools to enforce privacy policies multiple levels.

Customizable privacy notices for user device enrollment, app downloads and policy updates
Remote file storage solutions for countries with data residency laws
Enabling anonymized API calls to de-identify and generalize app lists
Assignment of a singular privacy officer role to ensure privacy configurations have a strong checks and balances process

[+] Read More

Work Data Separation

Containerization protects corporate data.

Keep work and personal apps and data separate and restrict the flow of information between them
Install only approved, authorized apps in the corporate container
Detect jailbroken or rooted devices and take compliance action to protect work data
Take advantage of DLP and privacy features offered within the operating system itself

[+] Read More

User Confidence

Build user trust by offering transparency, access and choice.

Privacy app provides real-time visibility of corporate privacy policy in one click
Establish employee trust in the software through educational tools
Self-service portal keeps the employee in control of their own device

[+] Read More

Asset Inventory and Lifecycle Management

Ease the burden on IT with streamlined deployments, automated configurations and full visibility for desktop, laptop and mobile devices alike.

Enable hardware and software inventory management for Chrome OS, macOS and Windows alongside mobile devices—all in a single solution
Support corporate-owned, BYO and line of business (kiosk or shared device) use cases
Streamline deployments with out-of-the-box onboarding to deliver settings and configurations over the air
Remotely provision apps, email, Wi-Fi, VPN, branding and compliance policies to eliminate high touch for IT
Distribute software and OS patches and upgrades—based on a schedule or conditions—utilizing caching servers or peer to peer delivery to reduce network bandwidth usage

[+] Read More

App Delivery and User Enablement

Deliver any app to enable users on any endpoint.

Deploy apps from any source, including the App Store, Windows Business Store, the Apple Volume Purchase Program (VPP), or enterprise-developed apps
Enable self-service access to any app type—native, web, virtual—in a unified app catalog with built-in single sign on (SSO)
Integrate with services like Apple VPP and Microsoft Business Store to procure, deploy and manage licenses purchased in bulk
Remotely install drivers, firmware updates and other scripts following rules, schedules and dependencies

[+] Read More

Endpoint Security and Compliance

Secure your data with settings, policies and rules to keep users and devices compliant.

Allow only authorized users, apps and compliant devices to access enterprise resources with conditional access and per-app VPN segmentation
Disable app downloads from unknown sources to protect against malware and malicious apps
Force device encryption through BitLocker or FileVault, escrow recovery keys, and configure firmware passcodes to prevent users from tampering with the OS
Define automated escalation actions to notify users or perform remediation actions on compromised devices without IT involvement
Push critical security patches at any time with real-time visibility to compliance status across the organization

[+] Read More

Knox Workspace Management

Deploy and manage the Knox Workspace from the AirWatch console.

Deploy the Samsung Knox Workspace to fit your needs for both dual persona and container-only use cases
Integrate with Knox Mobile Enrollment to register devices in bulk with a simplified user experience
Configure secure native email with additional policies such as encryption and digital certificate signatures
Perform remote actions such as clear passcode and enterprise wipe to apply only to the Knox Workspace

[+] Read More

App Security and Management

Manage and secure enterprise apps within the Knox Workspace.

Install internal applications automatically within the Workspace and enable secure single sign on (SSO)
Maintain separate versions of common apps inside and outside the Workspace with dual persona
Allow the use of only approved apps by configuring whitelists, blacklists and required apps groups
Separate work and personal data through device and app containerization to prevent data from being shared from the work side to the personal side
Enable Google Mobile Services apps, such as Google Chrome, Google Play Store, Google Maps and more, inside the Workspace

[+] Read More

Multi-layered Security

Security that starts with the hardware.

Enforce a Knox passcode and enable multifactor authentication which requires a pattern, PIN or passcode in addition to a fingerprint
Configure the Knox Workspace to lock the device into Container Only Mode where the entire device is restricted to the Workspace to isolate, encrypt and protect work data
Enable advanced security features such as enabling Common Criteria mode, enabling TIMA CCM KeyStore, SmartCard authentication, ODE Trusted Boot verification, and more
Secure network traffic specifically for applications inside the Knox Workspace by configuring per-app VPN for container applications
Detect rooted devices automatically and configure actions and escalations to remediate device compliance

[+] Read More

Separate Work and Personal

Enable a familiar experience for users while separating data at the OS level.

Allow users to bring their own device (BYOD) to work while preserving the native Android user interface
Deploy a Work Profile to create a dedicated space for only work apps away from the personal side of the device
Define work apps versus personal apps with the badged icon and receive separate notifications
Provide transparency and peace of mind for users that their personal data is kept private and separate from the work data that’s visible to IT

[+] Read More

Enable Business Apps

Give users the apps they need to be productive on Android.

Purchase bulk app licenses through Google Play for Work and manage license distribution
Configure email, calendar and contacts in the Work Managed productivity client, Gmail, or VMware Boxer
Distribute work apps automatically through a silent install or on-demand through a custom app catalog
Enable secure single sign on for users to seamlessly access apps without complicated passwords
Allow system apps in the Work Profile such as Work Chrome, Google Play, Google settings, Contacts and Camera
Create pre-defined application groups for blacklists and prevent un-install for required apps

[+] Read More

Keep Work Data Secure

Configure policies to protect corporate data.

Configure data loss prevention (DLP) policies to prevent sharing data between work and personal apps
Deploy Work Managed Device mode for corporate-owned devices to manage the entire device
Secure devices with disk encryption and passcode requirements, and remotely wipe enterprise data if device is lost or stolen
Secure connections to VPN to provide an encrypted tunnel to access internal resources such as email, files, and content
Configure restrictions such as disable factory reset, screen capture, Bluetooth, USB file transfer, prevent removal of the Android Work account and more
Manage Work Chrome Browser settings to prevent cookies, popups, printing and more without affecting the personal Chrome app

[+] Read More

Rapid Deployment and Provisioning

Save time and resources with zero-touch configuration for rugged laptops, tablets, smartphones, and handheld scanners and RFID readers.

Automate device enrollment through barcode scanning, cradle, SD card and OTA activation
Sequence installations of profiles (Wi-Fi, VPN, email), applications, files and actions using product provisioning
Use multi-user mode to enable check in/out flow for shared devices
Enable deployment on-demand, on a schedule, or based on condition such as time of day or battery level with rules-based policies
Utilize distribution nodes to reduce network bandwidth and WAN usage
Extend provisioning workflows into third party systems with extensive APIs

[+] Read More

Device Security and Controls

Protect corporate data with device controls and policies.

Enforce passcode and encryption policies
Restrict device camera, screen capture, external storage usage, Bluetooth, tethering and more
Monitor device compliance and remediate with automated actions
Secure device access using certificate lifecycle management for Wi-Fi and VPN access

[+] Read More

App Delivery and User Enablement

Give field workers access to mission-critical apps that drive business operations.

Silently install both internal and public applications
Enable testing or rollback to new or older versions of an app with multi-version support
Configure hardware and soft key button configurations and app launch
Lock device into an app kiosk, restrict access to settings and customize screen layout with AirWatch Launcher
Automatically launch applications on boot or event
Integrate security into existing apps using the AirWatch Software Development Kit

[+] Read More

Remote Management and Control

Assist users in the field with remote control, diagnostics and remote management tools.

Gain real-time visibility with dashboards that show provisioning status, compliance and activity
Collect system diagnostics, network information, installed apps, IT-defined custom attributes and more
Locate lost devices or nearby users using GPS tracking with built-in privacy
Manage folders, upload, copy, move and download files
Perform remote actions such as send messages, clear passcode, warm or cold boot, remote wipe and others

[+] Read More

Single Sign On

Remove the friction of access security with one-touch convenience.

Eliminate the need for users to remember multiple usernames and passwords
Enable two-factor authentication (2FA) for an additional layer of security
Integrate with existing identity providers or use the included identity provider or token generator (IDP)
Support web apps, virtual desktops, published apps, packaged apps and native mobile apps

[+] Read More

Self-Service App Catalog

Deliver the right apps to the right people with an identity-defined app catalog.

Provide a single app catalog with a consistent user experience across any device, including: Android, iOS, macOS and Windows
Deliver the widest variety of legacy and modern Windows apps, web-based, SaaS and native mobile apps, and virtualized desktops and apps to any device
Enable self-service by allowing employees to subscribe to the apps they need across all their devices
Brand the app catalog experience with personalization options including company logo, colors, backgrounds, textures and design elements

[+] Read More

Security and Control

Secure and protect corporate data with advanced administrative controls.

Enforce conditional access policies based on authentication strength, data sensitivity, user location, device compliance and more
Enable advanced data loss prevention (DLP) policies to protect against rooted or jailbroken devices, whitelist and blacklist apps, set open-in and cut/copy/paste restrictions and more
Leverage easy-to-use analytics to understand usage trends and assist with capacity planning, licensing management and new service development

[+] Read More

Trust the User

Remove the friction of complicated logins by establishing trust between the user, device and the enterprise.

Enable one-touch single sign on (SSO) or multifactor authentication across web, cloud and native apps
Enforce conditional access based on authentication strength, data sensitivity, user location, device compliance and more
Revoke access automatically if compliance policies are violated or an employee leaves the company
Deliver the right apps to the right people with an identity-defined app catalog

[+] Read More

Manage the Endpoint

Protect corporate information through device security and data loss prevention (DLP) policies.

Enable device-level encryption, data encryption and hardware security policies
Enforce a device-level passcode with complexity and history requirements
Configure policies including: app blacklists, device pairing, Wi-Fi security, TLS enforcement and more
Monitor for malware threats or jailbroken devices and automatically remediate with a remote lock, device wipe or customizable device quarantine controls

[+] Read More

Secure the App

Add enterprise-grade security and configurations to apps while separating corporate data.

Secure app data at rest and in transit with AES 256-bit encryption
Detect threats and automate remediation for apps and cloud services with VMware TrustPoint
Use standalone MAM to add security and DLP to apps with the AirWatch SDK or app wrapping
Take advantage of native security and DLP controls built in to the operating system with OS MAM

[+] Read More

Safeguard the Data

Secure access to data from any device, any app and any network.

Secure corporate data with FIPS 140-2 compliant 256-bit SSL encryption
Enforce containerization of apps and data using native OS controls
Configure policies to tag work data based on the source and enable access to only authorized users and apps
Protect proprietary data with dynamic watermarking and open-in and copy/paste restrictions
View detailed system reporting and logs to analyze enterprise data

[+] Read More

Protect the Network

Prevent unknown devices from connecting to corporate networks and configure certificate-based access to corporate VPN and Wi-Fi networks
Allow both internal and public apps to access corporate resources residing in your secure enterprise network on a per-app basis with AirWatch Tunnel
Combine per-app VPN through AirWatch Tunnel with VMware NSX (our network virtualization platform) to deliver user-level micro-segmentation into the datacenter

[+] Read More

Distribute

Get the right apps to the right users with a custom app catalog.

Distribute publicly available or internally developed native, hybrid, web/SaaS or virtual Windows apps
Target apps specific to user role based on Active Directory organization groups and AirWatch smart groups
Distribute bulk-purchased apps from Apple, Google and Microsoft app stores
Provide a consistent app catalog across mobile phones, tablets, laptops and desktops

[+] Read More

Secure

Enable apps with enterprise-grade security and configurations while separating corporate data.

Achieve end-to-end security for data at rest and in transit with AES 256-bit encryption
Create rules to flag non-compliant devices and configure automated remediation actions
Limit content sharing between work apps only with advanced data loss prevention (DLP) policies
Secure access to business systems behind the corporate firewall with the AirWatch Tunnel

[+] Read More

Manage

Protect apps and their data with our flexible management options.

Use standalone MAM to add security and DLP to apps with the AirWatch SDK or app wrapping
Take advantage of native security and DLP controls built in to the operating system with OS MAM
Unlock a vast ecosystem of ISV apps with the AirWatch Workspace Services profile and adaptive management capability

[+] Read More

In-the-moment Productivity

Increase productivity with a BYOD program that allows employees to complete work tasks from the personal device that never leaves their side.

Enable employees to access any app from the convenience of their own mobile device with VMware Workspace ONE
Give users access to critical business apps through a single catalog across any device
Automatically authenticate users for all apps at once with mobile single sign-on
Provide frictionless access to company email, calendar, contacts, content repositories, intranet sites, social network and chat with our suite of consumer-simple mobile productivity apps

[+] Read More

Data Security and Privacy

Secure your corporate data while providing IT teams with the tools for privacy controls.

Leverage native OS platform features without managing the device
Encrypt and remotely wipe corporate data leaving personal info untouched
Built-in privacy app educates users about work data separation to increase BYOD program adoption

[+] Read More

Adoption and Self Service

Once your BYOD strategy is in place, make your users comfortable enough to participate and empower them to troubleshoot simple issues on their own.

Push relevant and contextual messages, offers and alerts to employee-owned devices from the console
Suggest useful apps based on user role and remind users to update existing apps
Use our custom messaging framework to tailor system messages to meet your specific needs
Notify users when their device is out of compliance and tell them how to fix it through a self-service process

[+] Read More

Easy Onboarding and Configuration

Add new devices quickly and easily provision with apps and policies without IT involvement.

Configure devices during initial power on with bulk provisioning programs such as the Apple Device Enrollment Program (DEP) and Windows Out-of-Box Enrollment (OOBE)
Enable users to self-activate devices by entering their corporate credentials in a simple MDM onboarding workflow
Configure MDM policies for device restrictions, layout, settings access, notifications and more and assign based on OS or ownership type (BYO or corporate-owned)
Deploy public, internal or bulk-purchased apps to devices automatically or to an enterprise app catalog for on-demand install
Connect to enterprise email, VPN, Wi-Fi, content, intranet sites and other backend resources

[+] Read More

Device and Data Security

Protect corporate information through device security and data loss prevention (DLP) policies.

Enable device-level encryption, data encryption and hardware security policies (TPM, biometrics, etc.)
Enforce a device- and/or app-level passcode with complexity and history requirements
Configure policies including: app blacklists, device pairing, Wi-Fi security, TLS enforcement and others
Prevent data loss with app sharing permissions, copy/paste restrictions, geo-fencing policies, and more
Monitor for malware threats or jailbroken devices and automatically remediate with a remote lock, device wipe or customizable device quarantine controls

[+] Read More

Asset Inventory and Management

Gain full visibility and management of all endpoints from a single admin console.

Gain visibility into all endpoints across BYO, corporate-owned and line of business use cases in a single admin console
Delegate management across divisions, regions and departments with our multitenant architecture and role-based access controls
Get real-time MDM deployment analytics from modular and role-based dashboards by devices, apps, email, security, telecom and more
Capture detailed analytics with report templates and granular device, app and console event logging
Export deployment analytics to third-party business intelligence (BI) solutions with data mart integration

[+] Read More

Remote Support and Troubleshooting

Enable remote commands and controls to easily troubleshoot devices.

Request device information and perform remote commands such as clear passcode, send message, lock device, or perform an enterprise or device wipe
Troubleshoot devices using remote control to view the device screen and gain access to the file manager, command prompts and more
Enable users with self-service access to basic management capabilities, such as resetting a passcode, to alleviate IT ticket requests

[+] Read More

Manage Users Across All Endpoints

Enable a user-centric management approach for all your endpoints in a single solution.

Support major mobile operating systems including Android, iOS, QNX, Tizen, Windows CE, Windows 10, and frameworks like Android for Work and Samsung Knox
Monitor and manage peripherals and IoT devices like wearables, printers and endpoints running the QNX platform
Support varying use cases across your business including: corporate-owned, BYO and line of business
Leverage our platform-agnostic solution and close relationships with major OEMs for same-day support for new releases and the latest features

[+] Read More

Full Lifecycle Management and Security

Manage the full lifecycle for all endpoints from on-boarding to retirement.

Register devices during initial power up or through a user self-service workflow using corporate credentials
Configure device restrictions and layout along with enterprise email, VPN, Wi-Fi, apps, content, intranet sites and other backend resources
Protect corporate data through encryption, passcodes, DLP policies, and remote lock and wipe if a device is compromised
Gain visibility into asset inventory with real-time modular dashboards, pre-configured reports and granular event logs
Request device information and troubleshoot common issues with commands and remote management

[+] Read More

Consistent User Experience

Deliver a common experience for users to access applications on all their devices.

Unify management of corporate-owned, BYO and line of business use cases across your organization
Support BYO devices with separation of work and personal apps and data
More About BYOD
Manage corporate-owned assets with advanced management capabilities for additional device control
Configure a single device to be used by multiple users through multiuser mode with check-in and check-out functionality

[+] Read More

Unified Solution

Scale your deployment as initiatives grow with a complete unified endpoint management solution.

Gain visibility into device deployment with role-based contextual dashboards and access controls
Manage devices across divisions, regions, departments and more with our multitenant architecture
Automate processes through dynamic and intelligent policy engines to alleviate manual tasks for IT
Enable users with self-service access to common requests, reducing helpdesk tickets and increasing employee satisfaction

[+] Read More

Unified Endpoint Management

Stop managing multiple tools and simplify your mobility program with EMM.

Gain visibility into all smartphones, tablets, laptops, rugged, peripheral and IoT endpoints across Android, iOS, macOS, QNX, Tizen, Windows CE and Windows 10 platforms
Manage the device from initial on-boarding, configure apps and settings, apply security policies and remotely troubleshoot issues
Support all use cases across your organization including corporate-owned, BYO and line of business such as kiosks or shared devices

[+] Read More

Mobile Productivity

Engage users with mobile-optimized apps that provide a consumer-simple experience with enterprise-grade security.

Give users seamless access to all apps – native, web, remote – through a unified app catalog with built-in single sign on (SSO)
Provide a better-than-native email experience with turbo-charged productivity features and integrated mail, calendar and contacts with VMware Boxer
Deliver seamless access to intranet apps without requiring a VPN with VMware Browser
Secure and protect content and integrate with internal and cloud content management systems with AirWatch Content Locker
Bring people, information and ideas together with VMware Socialcast for enterprise chat and social collaboration

[+] Read More

Enterprise Security

Protect corporate data at every layer.

Trust the user with identity management for advanced user authentication and conditional access controls
Secure the endpoint with policies for encryption, passcode and compromised device detection with remote lock or wipe
Containerize the app with separation of work and personal data, and enable secure data flow between enterprise apps
Safeguard company data and prevent data loss across work and personal applications
Protect data over the network by ensuring app traffic between the device and backend corporate network is managed, encrypted and secure
Integrate with your existing security products for even more advanced security with the VMware Mobile Security Alliance (MSA)

[+] Read More

Deployment, Configuration and Management

Eliminate high touch for IT, get devices up and running quickly and have full visibility into your deployment.

Support corporate-owned and BYO Macs, as well as line of business kiosk or shared device use cases in a single management solution
Streamline setup with out-of-the-box configurations through integration with the Device Enrollment Program (DEP) and Apple School Manager
Set up Macs over the air to enable users with network connectivity (Wi-Fi and VPN), email, apps, content and more
Configure local and admin accounts and deliver security policies, compliance rules and restrictions
Define dock settings, wallpaper, web clips, launch behavior, login window branding, energy saver settings and more to customize the look, feel and experience
Gain full visibility into your Mac deployment, including AppleCare integration to track warranty information

[+] Read More

App Delivery and OS Updates

Manage the complete app lifecycle from procurement, security and deployment to management and reporting.

Deploy any application – native, web, virtualized, publicly available or internally developed – to a unified app catalog with single sign on (SSO) for users
Enable critical Windows apps to run on Macs, allowing users to work on the latest macOS laptop and still have access to an app that may require Windows XP or Internet Explorer
Support managed license assignments for apps purchased through the Volume Purchase Program (VPP)
Create products containing profiles, apps, files and actions that follow rules, schedules and dependencies with streamlined product provisioning
Deliver software and security updates on a defined schedule through relay servers and take advantage of same day support for the latest OS releases

[+] Read More

Data Security and Compliance

Define the settings, policies and rules to keep users, devices and data compliant and secure.

Define settings for FileVault to ensure devices are encrypted and Gatekeeper to protect devices from apps downloaded from unknown sources
Maintain control of the admin account on devices and utilize firmware passwords to prevent users from changing critical security settings and policies
Discourage users from sharing sensitive data by highlighting unmanaged domain email addresses and setting automated escalation policies to notify users when devices are out of compliance
Use conditional access controls so only authorized users and compliant devices have access to enterprise resources
Expose a limited set of data center resources to your apps via app- and network-level micro-segmentation and per-app VPN

[+] Read More

Device Lifecycle Management

Get Apple devices up and running quickly and gain full visibility to devices connecting to corporate resources.

Manage iPhone, iPad and iPod touch alongside your macOS and Apple TV devices and make sure they’re always on the latest OS with our same-day support
Support varying device use cases across your organization, including: corporate-owned, BYOD, kiosk, shared and iBeacons
Use industry templates to guide you through setup of key mobility initiatives in your industry with recommended workflows, apps and policies
Leverage DEP integration for out-of-the-box configurations
Gain full visibility over all assets through real-time dashboards, including AppleCare warranty information
Tailor the admin management experience for unique industries, like Education

[+] Read More

App Management

Enable users with the apps that keep them productive.

Deploy any app to any iOS device with a silent install, prompted install or in an enterprise catalog
Integrate directly with the App Store to easily import any publicly available app into the console for distribution
Support user- or device-based license assignments for apps purchased through the VPP
Develop internal apps using tools like our SDK or following AppConfig Community standards
Manage the full app lifecycle spanning procurement, security, deployment and management

[+] Read More

Data Security and Privacy

Secure corporate data while restricting IT access to an employee’s own information.

Separate work data from an employee’s own information using native management framework in iOS
Set restrictions to disable the device camera, sharing between apps, syncing with unknown devices and more to prevent data loss
Get multi-layer security using built-in features for system settings, encryption, data protection, apps, network connections, device controls and more
Supervise corporate-owned devices for additional control over configurations and restrictions
Use built-in controls to customize management for supervised, corporate-owned and BYO devices

[+] Read More

Enable Personal Devices

Give users access to resources on their personal devices regardless of OEM.

Support a wide array of device manufacturers including Amazon, Asus, Barnes and Noble Nook, Google, HTC, Intel, Kyocera, Lenovo, LG, Motorola, Nexus, Panasonic, Samsung and Sony
Configure policies such as email, Wi-Fi and per-app VPN for seamless device connectivity to corporate resources from anywhere
Deploy a work profile to create a dedicated space for only work apps away from the personal side of the device
Differentiate work apps from personal apps with the badged icon and receive separate notifications
Provide transparency and peace of mind for users that their personal data is kept private and separate from the work data that’s visible to IT

[+] Read More

Secure Work Managed Devices

Prevent loss of critical work data on corporate devices.

Get up and running with intuitive user registration flows and device bulk enrollment methods
Secure data by deploying a work managed device or the Samsung Knox Workspace for a dedicated corporate device without access to personal content
Enforce complex passcodes and device encryption, configure firewall rules and deploy certificates for secure authentication into email, Wi-Fi and VPN
Set restrictions for device features, including: screen capture, camera, Bluetooth, copy and paste, factory reset, NFC and more
Enable app-level VPN access to only select resources within the data center using the micro-segmentation capabilities of VMware NSX
Detect rooted devices automatically and configure actions and escalations to remediate device compliance

[+] Read More

Adopt Purpose-Built Solutions

Drive innovation and optimize processes in the workplace.

Enable workers and improve workflows with tablets, smartphones, ruggedized devices and wearables
Manage and provision Bluebird, Cube, Getac, Honeywell, HP, Intermec, Lenovo, Mediawave, Panasonic, Sonim and Zebra devices by leveraging the OEM Service Kit for extended Android management capabilities
Configure AirWatch Launcher to lock a device into a single or multi-app kiosk, prevent access to settings and customize device layout and branding
Gain visibility using real-time dashboards and leverage remote control and management for easy over-the-air troubleshooting

[+] Read More

  1. Mobile Productivity
    /
  2. Enterprise-grade Security
    /
  3. Kiosk and Line of Business Controls
    /
  4. Connectivity
    /
  5. Collaboration
    /
  6. Streamlined Workflows
    /
  7. Anytime, Anywhere Access
    /
  8. Efficient Mobile Workflows
    /
  9. Data Security and DLP
    /
  10. Mobile Productivity
    /
  11. Enterprise-grade Security
    /
  12. Comprehensive Solution
    /
  13. Secure SSO Access
    /
  14. Conditional Access
    /
  15. Data Loss Prevention
    /
  16. Built-in Privacy Framework
    /
  17. Work Data Separation
    /
  18. User Confidence
    /
  19. Asset Inventory and Lifecycle Management
    /
  20. App Delivery and User Enablement
    /
  21. Endpoint Security and Compliance
    /
  22. Knox Workspace Management
    /
  23. App Security and Management
    /
  24. Multi-layered Security
    /
  25. Separate Work and Personal
    /
  26. Enable Business Apps
    /
  27. Keep Work Data Secure
    /
  28. Rapid Deployment and Provisioning
    /
  29. Device Security and Controls
    /
  30. App Delivery and User Enablement
    /
  31. Remote Management and Control
    /
  32. Single Sign On
    /
  33. Self-Service App Catalog
    /
  34. Security and Control
    /
  35. Trust the User
    /
  36. Manage the Endpoint
    /
  37. Secure the App
    /
  38. Safeguard the Data
    /
  39. Protect the Network
    /
  40. Distribute
    /
  41. Secure
    /
  42. Manage
    /
  43. In-the-moment Productivity
    /
  44. Data Security and Privacy
    /
  45. Adoption and Self Service
    /
  46. Easy Onboarding and Configuration
    /
  47. Device and Data Security
    /
  48. Asset Inventory and Management
    /
  49. Remote Support and Troubleshooting
    /
  50. Manage Users Across All Endpoints
    /
  51. Full Lifecycle Management and Security
    /
  52. Consistent User Experience
    /
  53. Unified Solution
    /
  54. Unified Endpoint Management
    /
  55. Mobile Productivity
    /
  56. Enterprise Security
    /
  57. Deployment, Configuration and Management
    /
  58. App Delivery and OS Updates
    /
  59. Data Security and Compliance
    /
  60. Device Lifecycle Management
    /
  61. App Management
    /
  62. Data Security and Privacy
    /
  63. Enable Personal Devices
    /
  64. Secure Work Managed Devices
    /
  65. Adopt Purpose-Built Solutions
    /
AirWatch Free Trial

Try AirWatch FREE
for 30 Days

  • star icon Fully Functional Product Trial
  • phone icon Enroll Up to 100 Devices
  • card icon No Credit Card Required

Get Started Now