Data security for HCL Connections™ for AirWatch
For an AirWatch managed device, managed apps like HCL Connections™ for AirWatch are notified by the AirWatch management layer when application data must be restricted or erased. This can occur for any for the following reasons:
- The device is lost or stolen and either the user or administrator issues an enterprise application data wipe.
- The administrator issues an enterprise application lock.
- The application passcode is entered incorrectly too many times.
- The device is compromised (rooting or jailbreak).
In these cases, HCL Connections™ for AirWatch, like any other AirWatch managed application, blocks the application UI and presents the user with a message that describes why the app is no longer available. Additionally, if required by the policy, all data local to the HCL Connections™ for AirWatch app is erased.
Note: HCL Connections™ has a number of
security policies that can be enforced by the HCL Connections mobile app, even when it is not
managed by AirWatch. When a security policy is set at the HCL Connections™ server for mobile devices, but the same policy can be managed
by AirWatch, the HCL Connections™ for
AirWatch app ignores the policy setting from the HCL
Connections™ server and only honors the AirWatch setting.