Adopt a Zero Trust approach
to enterprise security

MobileIron Sentry is an in-line gateway, which has been designed to manage, encrypt and secure traffic between your employee’s mobile devices and your back-end enterprise systems.

Deny access to corporate information and resources in real time

Data and traffic between the mobile device and corporate resources can be configured to flow through Sentry, providing real-time secure tunnelling and access control. Sentry enforces the security policies set by IT in MobileIron Core. So, Sentry can allow or deny access to corporate information and resources in real time.

Use Sentry to address your key mobile requirements

Security

Prevents unauthorised interception and malicious manipulation of data through its support for certificate-based authentication.

Sentry can encrypt email attachments to protect them from unauthorised apps or cloud services.

Sentry ensures the integrity of mobile app traffic by restricting access to the right corporate destinations and applications.

Scalability

Sentry can scale to meet the high-volume performance and redundancy requirements of global organisations.

Your enterprise can set up multiple Sentry gateways in a cluster to accommodate standard and peak data volume scenarios.

User experience

Sentry supports certificate-based SSO authentication, which can eliminate the need for users to enter their username and password when accessing email, intranet sites, and corporate data behind the firewall.

Sentry provides on-demand, app-specific VPN’s, greatly improving user experience by eliminating the need to manually enable device-wide VPN’s.

Addressing fundamental needs.

Data and traffic between the mobile device and corporate resources can be configured to flow through Sentry, providing real-time secure tunneling and access control. Sentry enforces the security policies set by IT in MobileIron Core, enabling it to allow or deny access to corporate information and resources in real time.

Ready to Talk?

For more information about our privacy practices please visit our Privacy Statement.
For more information about our terms of use please visit our Terms & Conditions Statement.

I agree to the terms of use and privacy statements outlined above.