Frequently Asked Questions
Q. What platforms is SyncDog available for?
A. SyncDog is available on iOS, and Android devices. Our MDM Solution is available for iOS, Android, Windows and MacOS.
Q. Do you have to have your smartphone managed by an EMM to use SyncDog?
A. No, unlike Android for Work or Samsung KNOX, an EMM is not required to manage the SyncDog Trusted Mobile Workspace making it an ideal solution for BYOD environments. SyncDog is EMM-agnostic and can be used with an EMM solution or as a standalone solution.
Q. Can I add applications to my instance of SyncDog workspace?
A. Yes, any natively developed iOS or Android application can be applied to the SyncDog Trusted Mobile Workspace. The application will need to be placed within the framework of SyncDog by a SyncDog engineer.
Q. If I have 3rd party applications I use for business on my smartphone can they be protected by SyncDog?
A. Yes, for 3rd party business applications not embedded into the SyncDog Trusted Mobile Workspace, we provide the ability to wrap the application in encryption for protecting data at rest and in transit.
Q. How does SyncDog work with my corporate e-mail system?
A. SyncDog provides applications for e-mail, calendar, and contacts connectivity. Currently SyncDog supports Microsoft Exchange, Office 365, Gmail, Zimbra, and IceWarp implementations out of the box. Custom installations can be completed for mail systems like Lotus Notes and others.
Q. How secure is SyncDog?
A. SyncDog is the most secure solution on the market – providing AES 265 bit encryption for all data at rest and in transit between the smartphone and the enterprise network.
Q. Does SyncDog require a VPN Solution?
A. No, SyncDog does not require a 3rd party VPN solution to connect to the network securely. The SyncDog Trusted Mobile Workspace connects to the secure management server via a relay in the DMZ using an AES 256 bit encrypted SSL tunnel between the device and the management server behind the firewall.
Q. Can SyncDog be hacked?
A. All software can, in theory, be hacked, but SyncDog has taken all methods that are available today to protect against hacking. The client is protected, among other methods, with code obfuscation and runtime memory heap protection.
Q. Is SyncDog vulnerable to a man-in-the-middle attack?
A. No, SyncDog secure transport methodology protects against MIM attacks.
Q. Does SyncDog store encryption keys in the local key store of the device?
A. No, SyncDog uses a multi-part key structure which disseminates the key in various places, but is also composed of several key components in order to be fully secure.
Q. How many applications can be put into SyncDog?
A. There is no limit to the number of applications which can be embedded into SyncDog Trusted Mobile Workspace. The only limit would be based on the maximum physical storage capacity of the device.
Q. Can I store and retrieve documents in SyncDog?
A. Yes, SyncDog provides both the ability to store and sync documents with a network drive or desktop, as well as open and edit the documents, spreadsheets or slide decks in an Office Suite within SyncDog Trusted Mobile Workspace.
Q. Can I use my smartphone to view internal LAN pages on my company intranet?
A. Yes, SyncDog provides a secure browser which does not connect to the internet directly via the device, but by the secure connection on the secure management server through the encrypted SSL tunnel.
Q. Can I run SyncDog on multiple devices?
A. Yes, the SyncDog Trusted Mobile Workspace can be installed on multiple devices and will sync content between the devices so you can start an e-mail on your iPhone and finish it on your iPad.
Q. Can I have multiple mailboxes on an instance of SyncDog?
A. No, currently SyncDog can only support a single connection to Microsoft Exchange, Office 365, Gmail, Zimbra, and IceWarp. Multiple mailbox functions are on the SyncDog roadmap and will be available in a future release.
Q. Can I run multiple instances of SyncDog on a single device?
A. Multiple versions of SyncDog Trusted Mobile Workspace can be made available if required.
Q. How many users can be supported by SyncDog?
A. SyncDog and the secure management server have been designed to scale according to the size of the deployment. When implemented, the secure management server and the secure relay can be installed in multiple locations and geographies to maximize the capacity and provide redundancy for the deployment.
Q. What applications are available with SyncDog?
A. Along with E-mail, Calendar and Contacts, SyncDog also includes a secure browser, an Office Suite for documents, and access to files and docs. Along with a secure camera and maps application, SyncDog also includes File Manager which allows user to Manage, View, Edit, Copy and/or delete files synced between a device and backend, and a Briefcase which is a shared workspace for centralized distribution and access to files and docs. Integrations are also available with OneDrive, Box and DropBox.
Q. Can you copy data from SyncDog to an application on the device?
A. You can use copy and paste between applications running WITHIN the SyncDog Trusted Mobile Workspace while at the same time, we prevent copy and paste data from the SyncDog Trusted Mobile Workspace to other device applications running outside of the secure workspace.
Q. Can you take screenshots of screens within SyncDog and save on the device?
A. No, screen captures are disabled when you are running within SyncDog Trusted Mobile Workspace.
Q. Can I wipe the device or specific data from the device?
A. SyncDog has an over the air function to wipe the SyncDog Trusted Mobile Workspace from the device without impacting or wiping any personal apps or personal data on the same device. This is a management command from the secure management console which can only be accessed by a qualified administrator and will wipe all data within the SyncDog Trusted Mobile Workspace.
Q. Can I wipe data from the device if the device is not connected to the network?
A. SyncDog includes a policy for a feature called “Time Bomb”. When enabled the administrator will define a period of time (i.e. 30 days) and if the SyncDog Trusted Mobile Workspace on the device has not checked in with the secure management server the SyncDog Trusted Mobile Workspace on the device will automatically wipe itself.