Story image

MobileIron locks down mobile app to cloud security with new offering

25 Aug 16

MobileIron has debuted its newest security offering, MobileIron Access, locally, with the vendor saying the offering provides ‘the first unified solution for mobile and cloud security’.

The offering, which is designed to secure enterprise cloud data on mobile devices,

The offering, available via Distribution Central, enables only trusted apps on trusted devices with trusted users to be able to access corporate data in the cloud.

Administrators can define granular cloud access control policies based on application, IP address, identity and device posture.

Barry Mainz, MobileIron chief executive, says while mobile and cloud are becoming increasingly strategic to enterprises, people falsely believe cloud services are automatically secure because they require a username and password.

“That’s simply not true,” Mainz says.

He says MobileIron Access provides IT administrators with ‘the first unified solution for mobile and cloud security’.

Nick Verykios, Distribution Central chief executive, says rapid change in mobile and cloud technologies means rapid change for IT security requirements too.

“Any company that has employees using mobile devices and cloud services – and I’d say that is almost every company in Australia – should consider a solution that enhances their IT security at a mobile app level,” Verykios says.

Access builds on MobileIron’s existing portfolio which includes Sentry for protecting data-in-motion and blocking access from non-compliant devices and Tunnel, which does this for applications.

Identity Access management integration enables IT administrators to use Mobile Iron to make access decisions based on the device and user identity. The new Access offering extends that to cloud services.

Mainz says two key trends of the emergence of ‘mobile operating system’ Windows 10 and cloud, are driving MobileIron’s business – the company sold its 10 millionth seat last quarter and has billings of US$169 million.

“If you look at the way [Windows 10’s] management architecture works, EMM is going to be the model going forward.”

On the cloud front, he says as the perimeter disappears, enterprises are seeking new ways to manage security.

“We provide assets and solutions around mobile security, network security for connectivity and cloud security.”

A recent report from MobileIron highlighted a lack of mobile security measures in Australia.

The report shows only 7% of Australian companies are enforcing OS updates, and less than 5% are using app reputation or mobile threat detection software.

The report also shows 64% of Austrlaian companies had at least one device out of compliance.

Mainz says while the velocity of mobile attacks is increasing, the data shows enterprises are still not doing the things they could be to protect themselves.

“This lack of security hygiene demonstrates that enterprises are alarmingly complacent, even when many solutions are readily available.”

MobileIron says most new mobile attacks threatening enterprises are simply re-using tactics that have worked before, however when the attacks are successful, they can result in the loss of both personal and business data.

“A mobile device that is secured using EMM software triggers a security incident when the device is compromised or out-of-compliance with the company’s security policies,” MobileIron says.

“Network administrators can respond to notice of the security incident and take appropriate remedial action.

“This is an important feature of EMM because security incidents are often the precursor to a breach. When a device or app is out of compliance, then the device or app is vulnerable to attacks that can put enterprise data at risk.”

Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
How blockchain will impact NZ’s economy
Distributed ledgers and blockchain are anticipated to provide a positive uplift to New Zealand’s economy.
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Review: Blue Mic’s Satellite headphones are good but...
Blue Mic’s newest wireless headphones deliver on sound, aesthetic, and comfort - but there is a more insidious issue at hand.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
Forcepoint and Chillisoft - “a powerful combination”
Following Chillisoft’s portfolio expansion by signing on Forcepoint, the companies’ execs explain how this is a match made in cybersecurity heaven.
David Hickling in memoriam: “Celebrate the life and the music it made”
Dave was a well-respected presence in the IT channel and his recent death was felt by all the many people who knew him as a colleague and a friend.