Story image

MobileIron locks down mobile app to cloud security with new offering

25 Aug 2016

MobileIron has debuted its newest security offering, MobileIron Access, locally, with the vendor saying the offering provides ‘the first unified solution for mobile and cloud security’.

The offering, which is designed to secure enterprise cloud data on mobile devices,

The offering, available via Distribution Central, enables only trusted apps on trusted devices with trusted users to be able to access corporate data in the cloud.

Administrators can define granular cloud access control policies based on application, IP address, identity and device posture.

Barry Mainz, MobileIron chief executive, says while mobile and cloud are becoming increasingly strategic to enterprises, people falsely believe cloud services are automatically secure because they require a username and password.

“That’s simply not true,” Mainz says.

He says MobileIron Access provides IT administrators with ‘the first unified solution for mobile and cloud security’.

Nick Verykios, Distribution Central chief executive, says rapid change in mobile and cloud technologies means rapid change for IT security requirements too.

“Any company that has employees using mobile devices and cloud services – and I’d say that is almost every company in Australia – should consider a solution that enhances their IT security at a mobile app level,” Verykios says.

Access builds on MobileIron’s existing portfolio which includes Sentry for protecting data-in-motion and blocking access from non-compliant devices and Tunnel, which does this for applications.

Identity Access management integration enables IT administrators to use Mobile Iron to make access decisions based on the device and user identity. The new Access offering extends that to cloud services.

Mainz says two key trends of the emergence of ‘mobile operating system’ Windows 10 and cloud, are driving MobileIron’s business – the company sold its 10 millionth seat last quarter and has billings of US$169 million.

“If you look at the way [Windows 10’s] management architecture works, EMM is going to be the model going forward.”

On the cloud front, he says as the perimeter disappears, enterprises are seeking new ways to manage security.

“We provide assets and solutions around mobile security, network security for connectivity and cloud security.”

A recent report from MobileIron highlighted a lack of mobile security measures in Australia.

The report shows only 7% of Australian companies are enforcing OS updates, and less than 5% are using app reputation or mobile threat detection software.

The report also shows 64% of Austrlaian companies had at least one device out of compliance.

Mainz says while the velocity of mobile attacks is increasing, the data shows enterprises are still not doing the things they could be to protect themselves.

“This lack of security hygiene demonstrates that enterprises are alarmingly complacent, even when many solutions are readily available.”

MobileIron says most new mobile attacks threatening enterprises are simply re-using tactics that have worked before, however when the attacks are successful, they can result in the loss of both personal and business data.

“A mobile device that is secured using EMM software triggers a security incident when the device is compromised or out-of-compliance with the company’s security policies,” MobileIron says.

“Network administrators can respond to notice of the security incident and take appropriate remedial action.

“This is an important feature of EMM because security incidents are often the precursor to a breach. When a device or app is out of compliance, then the device or app is vulnerable to attacks that can put enterprise data at risk.”

BMC adds IBM Cloud, Watson to Helix solution
BMC Helix with IBM Watson delivers cognitive insights across structured and unstructured federated knowledgebases.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
NZ Cricket ups data analytics game with Qrious
The Black Caps and White Ferns have implemented a data and analytics solution from Qrious to monitor and improve game strategy and player performance.
Gartner: Smartphone biometrics coming to the workplace
Gartner predicts increased adoption of mobile-centric biometric authentication and SaaS-delivered IAM.
IDC: A/NZ second highest APAC IoT spenders per capita
New IDC forecast expects the Internet of Things spending in Asia/Pacific excluding Japan to reach US$381.8 Billion by 2022.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
Six barriers to efficient print and scan environments
Despite the promises of ‘paper-free’, printing remains an important aspect of many organisations, and one of the likeliest areas to lose control.