+1.855.SYNCDOG (1-855-796-2364)

Take SyncDog for a test drive by signing up for an online, no commitment 14-day free trial. Prefer to sit in the passenger seat? Request a demo and we’ll be happy to walk you through how SyncDog can help protect your organization from risky applications, like TikTok.

SyncDog keeps your data out of the hands of the Chinese when employees or students won’t give up TikTok.

When it comes to TikTok – and other suspicious apps – you have two choices:

1. Prevent employees from having the app on their device

2. Stop worrying about personal apps employees are loading by using an advanced mobile security solution like SyncDog to isolate and prevent invasive apps like TikTok from getting access to any work related data on the device.

Concerns over TikTok’s data protection and usage principles

As news of TikTok’s malicious use of personal data continues to make headlines, both corporate and government entities need to ensure the safety and security of their data. While discussions around China’s ability to access personal data collected by TikTok, and it’s implications on US national security continue, organizations need to be proactive by educating themselves on the possible threats to their private and sensitive information, and get ahead of these threats by implementing SyncDog to protect their most valuable asset – data!

Whether your organization enables BYOD, issues corporate devices or a combination of both, TikTok’s Terms of Service should frighten you and make you realize that the data on any device – BYOD or Corporate – is at serious risk.

Here is just a sample from their privacy policy…

Device Information

We collect certain information about the device you use to access the Platform, such as your IP address, user agent, mobile carrier, time zone settings, identifiers for advertising purposes, model of your device, the device system, network type, device IDs, your screen resolution and operating system, app and file names and types, keystroke patterns or rhythms, battery state, audio settings and connected audio devices. Where you log-in from multiple devices, we will be able to use your profile information to identify your activity across devices. We may also associate you with information collected from devices other than those you use to log-in to the Platform.

Taking steps to secure and encrypt your corporate/government data from nefarious applications that can be downloaded onto personal or corporate devices is a simple, yet necessary way to ensure the security and integrity of your organizational data. SyncDog provides true mobile security by incorporating a containerization-based solution that isolates and encrypts the data being accessed or stored on the device without the need for an MDM device profile, which eliminates the privacy pushback on BYOD devices – and it doesn’t rely on the keystore to store its crypto keys. SyncDog’s Trusted Mobile Workspace takes containerization to the next level by offering industry-leading security in conjunction with a full suite of productivity applications, providing a desktop-like experience on mobile devices. Implementing SyncDog empowers organizations to transition from providing and managing corporate devices to experiencing the flexibility of BYOD without the threat of losing or exposing organizational data.

To learn more about SyncDog’s Mobile Security platform and our containerized solution that creates a vault for multiple applications and provides centralized management functionality for administrators, visit us at www.syncdog.com.