+1.855.SYNCDOG (1-855-796-2364)

Frequently Asked Questions

Do You Have Questions?

We have answers (well, most of the times!)

Below you’ll find answers to the most common questions you may have on SyncDog’s products. Also please feel free to check out our Products page. If you still can’t find the answer you’re looking for, just Contact us!

No, SyncDog allows for flexibility when using the Trusted Mobile Workspace, especially for organizations that want security without the complexity of an EMM.  Unlike Android for Work or Samsung KNOX, an EMM is not required to manage the SyncDog Trusted Mobile Workspace, making it an ideal solution for BYOD environments. SyncDog is EMM-agnostic and can be used with an EMM solution or as a standalone solution.

Yes, any natively developed iOS or Android application can be applied to the SyncDog Trusted Mobile Workspace.  The application will need to be placed within the framework of SyncDog by a SyncDog engineer.

Yes, for 3rd party business applications not embedded into the SyncDog Trusted Mobile Workspace, we provide the ability to wrap the application in encryption for protecting data at rest and in transit.

SyncDog provides applications for e-mail, calendar, and contacts connectivity.  Currently SyncDog supports Microsoft Exchange, Office 365, Gmail, Zimbra, and IceWarp implementations out of the box.  Custom installations can be completed for additional mail systems.

SyncDog is the most secure solution on the market employing FIPS 140-2 certified cryptography algorithms, plus AES 265 bit encryption for all data at rest and in transit between the smartphone and the enterprise network.

No, SyncDog does not require a 3rd party VPN solution to connect to the network securely for several reasons – (1) VPNs can be difficult to configure and manage and are prone to easily disconnect and interrupt work being done, (2) VPN’s only secure the transport data, doing nothing to secure data at rest on the device.

The SyncDog Trusted Mobile Workspace connects to the secure management server via a relay in the DMZ using an AES 256-bit encrypted SSL tunnel between the device and the management server behind the firewall.

In theory, all software can be hacked, but SyncDog has taken all methods that are available today to protect against hacking. The SyncDog Trusted Mobile Workspace is protected by code obfuscation, which makes reverse engineering difficult, and runtime memory heap protection, which helps prevent exploits like buffer overflows. Combined with SyncDog’s multi-OS isolation, it creates a highly secure environment.

No, because SyncDog’s secure transport methodology protects against MIM attacks, which is a crucial layer of defense, especially with the growing sophistication of MITM attacks.

No, SyncDog uses a multi-part key structure which disseminates the key in various places, but is also composed of several key components in order to be fully secure.

There is no limit to the number of applications which can be embedded into SyncDog Trusted Mobile Workspace, and that flexibility is important, especially for enterprises with diverse app needs.  The only limit would be based on the maximum physical storage capacity of the device.

Yes, SyncDog provides both the ability to store and sync documents with a network drive or desktop, as well as open and edit the documents, spreadsheets or slide decks in an Office Suite within SyncDog Trusted Mobile Workspace. This is an essential productivity feature, especially for users who need seamless access to work files while maintaining security.

Yes, SyncDog provides a secure browser which does not connect to the internet directly via the device, but by the secure connection on the secure management server through the encrypted SSL tunnel. This adds another strong layer of security, preventing direct exposure of the device to potential web-based threats.

Yes, the SyncDog Trusted Mobile Workspace can be installed on multiple devices and will sync content between the devices so you can start an e-mail on your iPhone and finish it on your iPad.  This seamless experience is a big advantage for professionals who switch between devices throughout the day.

No, currently SyncDog can only support a single connection to Microsoft Exchange, Office 365, Gmail, Zimbra, and IceWarp.  Multiple mailbox functions are on the SyncDog roadmap and will be available in a future release.

Multiple versions of SyncDog Trusted Mobile Workspace can be made available if required, for organizations with diverse security needs.

SyncDog understands that scalability and redundancy is crucial for enterprises with global operations, so our secure management server has been designed to scale according to the size of the deployment.  When implemented, the secure management server and the secure relay can be installed in multiple locations and geographies to maximize the capacity and provide redundancy for the deployment.

SyncDog’s Trusted Mobile Workspace provides an extensive feature set, covering both productivity and security needs.  E-mail, Calendar and Contacts, secure browser, Office Suite for documents and files, secure camera and maps application, File Manager which allows users to Manage, View, Edit, Copy and/or delete files synced between a device and backend, a Briefcase which is a shared workspace for centralized distribution and access to files and docs, and ChatGPT for increased productivity. Integrations are also available with OneDrive, Box and DropBox.

SyncDog provides a smart balance between usability and security.  SyncDog allows copy and paste between applications running WITHIN the SyncDog Trusted Mobile Workspace, while at the same time, we prevent copying and pasting data from within the SyncDog Trusted Mobile Workspace to other device applications running outside of the secure workspace.

SyncDog adjusts this functionality based on platform constraints.  For Android, no - screen capture is disabled when you are running within SyncDog Trusted Mobile Workspace.  For iOS, SyncDog has specific screen shot policies to capture the screenshot and take preemptive actions such as locking the application and alerting the admin.

SyncDog has an over-the-air function to wipe the SyncDog Trusted Mobile Workspace from the device without impacting or wiping any data or apps outside of the Trusted Mobile Workspace.  This is a management command from the secure management console which can only be accessed by a qualified administrator and will wipe all data within the SyncDog Trusted Mobile Workspace.

SyncDog includes a special policy for a feature called “Time Bomb”, specifically for to safeguard against lost or compromised devices.  When enabled the administrator will define a period of time (i.e. 30 days) and if the SyncDog Trusted Mobile Workspace on the device has not checked in with the secure management server the SyncDog Trusted Mobile Workspace on the device will automatically wipe itself.

SyncDog supports iOS versions starting with iOS 15 up to the most current version available today.

SyncDog supports Android versions starting with Android 11 up to the most current version available today.

SyncDog does not store the crypto keys in the local key store of the device, because that makes the data vulnerable to hacks.  SyncDog uses a multi-part key structure which disseminates the key in various places but is also composed of several key components in order to be fully secure.