TCS recognizes that security
is one of the most critical and resource intensive components
of any enterprise solution. This is especially true
with mobile solutions, where corporate data is taken
beyond the physical confines of the office.
This is why TCS has taken end-to-end
mobile security a step beyond the competition with a
unique solution that addresses all states of mobility.
In addition to providing best-of-breed authentication
and encryption for data communications, TCS has
developed a unique Lease Key technology that :
applications & data when the device is offline,
of applications and data without having to repopulate
from the server.
The TCS Mobile Application Platform solves the
shortcomings of traditional mobile security by transferring
the TCS Lease Key along with the application data.
This lease key is used to fully secure the application
data throughout its lifespan, even when the device is
taken offline, or is invisible to the network. By effectively
providing users with an administrator defined window
of access, TCS’ unique lease key approach
provides two critical benefits to our customers:
Data is fully
secured, even when the device is taken offline:
Since the lease key can expire while the device is not
connected to the network, the TCS application data
becomes immediately inaccessible to the user. When the
lease key expires, the data on the device is rendered
“invisible” and is inaccessible until the
user is re-authenticated with the backend server.
Data is kept
secure, without being deleted: The expiration
of the lease key does not delete the data on the device.
However, the data is inaccessible until the user is
re-authenticated with the backend server.
This re-authentication process generates a new lease
key for the device, which then makes the data immediately
available, without having to wait for it to be repopulated.
This approach helps to maximize user productivity, without
forcing administrators to sacrifice security for usability.