What's Device2Mail

What is D2M Device-Based Authentication?

Device2Mail (D2M) is a device-based access management and security solution designed to maximize the security of corporate email data. In addition to traditional username and password authentication, it allows access to corporate email servers (Exchange ActiveSync) only for mobile devices that have been approved by the organization and marked as trusted.

D2M minimizes the risk of data leakage by transmitting email data only to trusted devices and offers a self-service structure that empowers users to manage their own devices.

Basic Operating Principle

D2M's security architecture extends the authentication process from user identity to device identity. The system analyzes the device requesting access using a unique Device ID and verified user information. During this process, the Two-Factor Authentication (2FA) mechanism is activated to verify the legitimacy of both the device and the user through a secondary layer. The Device ID is utilized as a secondary verification key within the system.

Key Advantages and Features

The D2M solution offers the following core capabilities to meet corporate information security standards and simplify mobile device management:

  • Approved Device Access: Access to email data is not granted to just any device; it is provided solely through "Trusted Devices" approved by the administrator or the user.

  • Two-Factor Authentication (2FA): The security level is enhanced by using SMS-based verification codes during device registration and access approval.

  • Self-Service Device Management: Users can view, approve, or remove old devices from the list via the D2M portal.

  • Lost/Stolen Device Protection: In the event that a trusted device is lost or stolen, the access authorization for that specific device can be instantly blocked via the D2M portal, thereby ensuring the security of corporate data.

  • Quarantine Management: Newly added devices can be placed in quarantine mode by default and activated only upon administrator or user approval.

Last updated