Chat with us, powered by LiveChat

Secure enterprise mobility solution

The product is a secured system that encrypts and transports data between mobile devices and an enterprises’ backend. It allows an organization to control and manage how the employees exchange time-critical information across their wireless handheld devices.

The application secures data both in the data base and in transit. It allows users to enjoy all the features of their devices while storing a portion of the encrypted information for all enterprise-centric devices.
Project type: Enterprise data security system
InToSoft team: 9 specialists
Team structure: senior and mid android developer, team lead/senior iOS developer, 2 senior and 3 middle iOS developers, QA engineer
Project duration: 12 months
Platform: iOS, Android

About the client

The client’s company operates in data security domain and enterprise network protection.


By the time the cooperation began, the client had already implemented the back-end part, as well as some features in iOS and Android applications. InToSoft was to develop other features for the native applications and integrate them with the existing parts of the system.


The solution ensures military-grade security of corporate emails/contacts, Internet browsers, IM and business apps used in a BYOD or COPE (corporate owned personally enabled) setting.

Server and the corresponding framework enable IT security administrators to make mobile device security a part of organizational network management strategy.

• Mobile devices management includes cross-platform mobile device management, BlackBerry Enterprise/Good Technologies server monitoring, help-desk integration for fast alerts and quick remediation, AD/LDAP integrated, role-based and centralized administration with activity auditing, centralized event log management and system log storage/archiving for forensics and compliance, remote lock/unlock and wipe capabilities.
• Application security provides device containerization with encrypted corporate workspace with IT-managed access controls, usage policies and remote commands.
• Device log management system that analyzes the user’s behavior and detects potential threats.
• The solution boasts configurable compliance and cyber-threat detection reports out of the box that can be emailed at any chosen interval.

Developers worked in a distributed team with project management and PO on the client's side.

Download PDF


Go with us on an excursion to Minsk ➔