Frequently Asked Questions
Do You Have Questions?
We have answers (well, most of the times!)
Do you have to have your smartphone managed by an EMM to use SyncDog?
No, SyncDog allows for flexibility when using the Trusted Mobile Workspace, especially for organizations that want security without the complexity of an EMM. Unlike Android for Work or Samsung KNOX, an EMM is not required to manage the SyncDog Trusted Mobile Workspace, making it an ideal solution for BYOD environments. SyncDog is EMM-agnostic and can be used with an EMM solution or as a standalone solution.
Can I add applications to my instance of SyncDog workspace?
Yes, any natively developed iOS or Android application can be applied to the SyncDog Trusted Mobile Workspace. The application will need to be placed within the framework of SyncDog by a SyncDog engineer.
If I have 3rd party applications I use for business on my smartphone can they be protected by SyncDog?
Yes, for 3rd party business applications not embedded into the SyncDog Trusted Mobile Workspace, we provide the ability to wrap the application in encryption for protecting data at rest and in transit.
How does SyncDog work with my corporate e-mail system?
SyncDog provides applications for e-mail, calendar, and contacts connectivity. Currently SyncDog supports Microsoft Exchange, Office 365, Gmail, Zimbra, and IceWarp implementations out of the box. Custom installations can be completed for additional mail systems.
How secure is SyncDog?
SyncDog is the most secure solution on the market employing FIPS 140-2 certified cryptography algorithms, plus AES 265 bit encryption for all data at rest and in transit between the smartphone and the enterprise network.
Does SyncDog require a VPN Solution?
No, SyncDog does not require a 3rd party VPN solution to connect to the network securely for several reasons – (1) VPNs can be difficult to configure and manage and are prone to easily disconnect and interrupt work being done, (2) VPN’s only secure the transport data, doing nothing to secure data at rest on the device.
The SyncDog Trusted Mobile Workspace connects to the secure management server via a relay in the DMZ using an AES 256-bit encrypted SSL tunnel between the device and the management server behind the firewall.
Can SyncDog be hacked?
In theory, all software can be hacked, but SyncDog has taken all methods that are available today to protect against hacking. The SyncDog Trusted Mobile Workspace is protected by code obfuscation, which makes reverse engineering difficult, and runtime memory heap protection, which helps prevent exploits like buffer overflows. Combined with SyncDog’s multi-OS isolation, it creates a highly secure environment.
Is SyncDog vulnerable to a man-in-the-middle attack?
No, because SyncDog’s secure transport methodology protects against MIM attacks, which is a crucial layer of defense, especially with the growing sophistication of MITM attacks.
Does SyncDog store encryption keys in the local key store of the device?
No, SyncDog uses a multi-part key structure which disseminates the key in various places, but is also composed of several key components in order to be fully secure.
How many applications can be put into SyncDog?
There is no limit to the number of applications which can be embedded into SyncDog Trusted Mobile Workspace, and that flexibility is important, especially for enterprises with diverse app needs. The only limit would be based on the maximum physical storage capacity of the device.
Can I store and retrieve documents in SyncDog?
Yes, SyncDog provides both the ability to store and sync documents with a network drive or desktop, as well as open and edit the documents, spreadsheets or slide decks in an Office Suite within SyncDog Trusted Mobile Workspace. This is an essential productivity feature, especially for users who need seamless access to work files while maintaining security.
Can I use my smartphone to view internal LAN pages on my company intranet?
Yes, SyncDog provides a secure browser which does not connect to the internet directly via the device, but by the secure connection on the secure management server through the encrypted SSL tunnel. This adds another strong layer of security, preventing direct exposure of the device to potential web-based threats.
Can I run SyncDog on multiple devices?
Yes, the SyncDog Trusted Mobile Workspace can be installed on multiple devices and will sync content between the devices so you can start an e-mail on your iPhone and finish it on your iPad. This seamless experience is a big advantage for professionals who switch between devices throughout the day.
Can I have multiple mailboxes on an instance of SyncDog?
No, currently SyncDog can only support a single connection to Microsoft Exchange, Office 365, Gmail, Zimbra, and IceWarp. Multiple mailbox functions are on the SyncDog roadmap and will be available in a future release.
Can I run multiple instances of SyncDog on a single device?
Multiple versions of SyncDog Trusted Mobile Workspace can be made available if required, for organizations with diverse security needs.
How many users can be supported by SyncDog?
SyncDog understands that scalability and redundancy is crucial for enterprises with global operations, so our secure management server has been designed to scale according to the size of the deployment. When implemented, the secure management server and the secure relay can be installed in multiple locations and geographies to maximize the capacity and provide redundancy for the deployment.
What applications are available with SyncDog?
SyncDog’s Trusted Mobile Workspace provides an extensive feature set, covering both productivity and security needs. E-mail, Calendar and Contacts, secure browser, Office Suite for documents and files, secure camera and maps application, File Manager which allows users to Manage, View, Edit, Copy and/or delete files synced between a device and backend, a Briefcase which is a shared workspace for centralized distribution and access to files and docs, and ChatGPT for increased productivity. Integrations are also available with OneDrive, Box and DropBox.
Can you copy data from SyncDog to an application on the device?
SyncDog provides a smart balance between usability and security. SyncDog allows copy and paste between applications running WITHIN the SyncDog Trusted Mobile Workspace, while at the same time, we prevent copying and pasting data from within the SyncDog Trusted Mobile Workspace to other device applications running outside of the secure workspace.
Can you take screenshots of screens within SyncDog and save on the device?
SyncDog adjusts this functionality based on platform constraints. For Android, no - screen capture is disabled when you are running within SyncDog Trusted Mobile Workspace. For iOS, SyncDog has specific screen shot policies to capture the screenshot and take preemptive actions such as locking the application and alerting the admin.
Can I wipe the device or specific data from the device?
SyncDog has an over-the-air function to wipe the SyncDog Trusted Mobile Workspace from the device without impacting or wiping any data or apps outside of the Trusted Mobile Workspace. This is a management command from the secure management console which can only be accessed by a qualified administrator and will wipe all data within the SyncDog Trusted Mobile Workspace.
Can I wipe data from the device if the device is not connected to the network?
SyncDog includes a special policy for a feature called “Time Bomb”, specifically for to safeguard against lost or compromised devices. When enabled the administrator will define a period of time (i.e. 30 days) and if the SyncDog Trusted Mobile Workspace on the device has not checked in with the secure management server the SyncDog Trusted Mobile Workspace on the device will automatically wipe itself.
What OS versions does SyncDog support for iOS?
SyncDog supports iOS versions starting with iOS 15 up to the most current version available today.
What OS versions does SyncDog support for Android?
SyncDog supports Android versions starting with Android 11 up to the most current version available today.
MDM/MAM solutions store their crypto keys in the device key store, where does SyncDog store encryption keys?
SyncDog does not store the crypto keys in the local key store of the device, because that makes the data vulnerable to hacks. SyncDog uses a multi-part key structure which disseminates the key in various places but is also composed of several key components in order to be fully secure.