Data security for HCL Connections for AirWatch

For an AirWatch managed device, managed apps like HCL Connections for AirWatch are notified by the AirWatch management layer when application data must be restricted or erased. This can occur for any for the following reasons:

  • The device is lost or stolen and either the user or administrator issues an enterprise application data wipe.
  • The administrator issues an enterprise application lock.
  • The application passcode is entered incorrectly too many times.
  • The device is compromised (rooting or jailbreak).

In these cases, HCL Connections for AirWatch, like any other AirWatch managed application, blocks the application UI and presents the user with a message that describes why the app is no longer available. Additionally, if required by the policy, all data local to the HCL Connections for AirWatch app is erased.

Note: HCL Connections has a number of security policies that can be enforced by the HCL Connections mobile app, even when it is not managed by AirWatch. When a security policy is set at the HCL Connections server for mobile devices, but the same policy can be managed by AirWatch, the HCL Connections for AirWatch app ignores the policy setting from the HCL Connections server and only honors the AirWatch setting.