Resources

White Papers

White Papers

MobileIron and iOS

MobileIron and iOS: The Security Backbone for the Modern Enterprise

The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry.

The Enterprise Guide to iOS App Development

The Enterprise Guide to iOS App Development

iOS devices and apps are transforming businesses across every industry, in every part of the world.

Demystifying Cloud EMM

Demystifying Cloud EMM: Why a Distributed and Secure Cloud Architecture Matters

Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes.

MobileIron Cloud Security

Technical Security Controls applied to MobileIron Cloud

The MobileIron Cloud service is MobileIron’s cloud-based solution for provisioning and managing users’ bring-your-own-device (BYOD) and corporate-owned personally enabled (COPE) mobile devices.

Windows 10 with EMM: TCO Toolkit

Windows 10 with EMM: TCO Toolkit

For more than two decades, the Windows PC has dominated the enterprise computing landscape as the main productivity tool for knowledge workers in every industry.

MobileIron Security - Cryptographic Systems Used in On-Premises Solutions

MobileIron Security - Cryptographic Systems Used in On-Premises Solutions

Security is in our DNA and the use of strong cryptographic algorithms in our solutions is foundational to MobileIron.

What iOS 10 Means for the Enterprise

What iOS 10 Means for the Enterprise

The release of iOS 10 showcases Apple’s ongoing commitment to improving every aspect of the device and app experience for enterprise customers. But iOS 10 is not just about new features.

Mobile Security White Paper

Mobile Security: Threats and Countermeasures

This document summarizes the basic, supplemental, and compensating controls that can be implemented with MobileIron to mitigate the risk of data loss on corporate and personal mobile devices.

EMM and the Law

EMM and the Law

EMM recommended under California cyber-security law

EMM is the recommended approach for implementing the foundational Critical Security Controls for mobile devices as required by California law.

Windows 10, EMM, and the Future of PC Security and Management

Enterprise IT is facing an ever-increasing level of management complexity. From legacy PC clients to mobile devices running multiple operating systems, admins must juggle more security and management tasks than ever before.

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron

Office 365 is Microsoft’s cloud-based productivity suite.

Startup Guide to Success with MobileIron

Startup Guide to Success with MobileIron

A Startup Guide to Success
The Customer Success team is dedicated to your success with MobileIron.

Our mission is to work with our customers and partners to deliver the best support, services and knowledge to enable your success with enterprise mobility.

State of App Security

State of App Security

Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats:  

The Enterprise Guide to Developing Secure Mobile Apps

The Enterprise Guide to Developing Secure Mobile Apps

Mobility is here and it’s transforming businesses across every industry, in every part of the world.

Mobile malware hits ActiveSync-only Devices

Mobile malware hits ActiveSync-only devices

Four major malware threats are currently targeting iOS and Android devices.

MobileIron Analysis of Smartwatch Security Risks to Enterprise Data

MobileIron’s Security Research Team analyzed the myriad of various smartwatches to identify the risks to enterprise data by pairing them with a mobile device that is connected to enterprise resources, such as email or calendars.

Survey: Mobile Enterprise Report

Survey: Mobile Enterprise Report

BYOD is creating new challenges for IT. The top two sources of frustration were onboarding and then supporting the increasing number and variety of personal devices, far outranking even security concerns.

The Mobile Trust Gap

In June 2013, we ran the MobileIron Trust Gap Survey. It was an extensive survey of 3,000 consumers across three countries – Germany, United Kingdom, and United States.
FINRA Guidance for Mobile Deployments

FINRA Guidance for Mobile Deployments (United States)

FINRA, the United States securities regulator, has provided guidance over the last several years on the use of BYOD and social media in the financial services industry.

What Windows 10 Means for the Modern Enterprise

What Windows 10 Means for the Modern Enterprise

The release of Windows 10 is a major milestone in the evolution of the modern enterprise architecture. Now, previously separate OS versions are converging onto a unified platform managed through an EMM console.

HIPAA Whitepaper

HIPAA Compliance Checklist

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established standards for the security and privacy of health data, especially individually identifiable information.

Android for Work: Top 8 Security Considerations Every CISO Should Know

Android for Work: Top 8 Security Considerations Every CISO Should Know

With the release of Android Lollipop and AndroidTM for Work, Google has made great strides toward improving security and reducing fragmentation — two of the biggest CISO concerns about the platform.

The Changing Mobile Landscape in Financial Services

The Changing Mobile Landscape in Financial Services

Sponsored by MobileIron, The Changing Mobile Landscape in Financial Services was conducted by Ponemon Institute to learn how organizations are adopting mobile technologies and what challenges they are facing.

The Ultimate Guide to Enterprise Mobility Management

The Ultimate Guide to Enterprise Mobility Management

Ready or not, the global mobility trend is forcing enterprises to enable a mobile workforce with business productivity tools on any device, regardless of the underlying operating system.

What Android for Work means to Enterprise

What Android for Work means to the Enterprise

Bring Android for Work, to work, with MobileIron and enable a suite of PIM apps in a secure, separately managed OS-level container.

Distributing Administration in a Mobile IT Organization

Distributing Administration in a Mobile IT Organization

As companies move towards being truly mobile first, they are finding that there are necessarily more mobile devices and more apps that need to be managed. Many of these devices are personal devices being used to access workplace resources.

Blackberry Migration Whitepaper

Simplifying the move from BlackBerry to Multi-OS

Simplifying the move from BlackBerry to a multi-OS environment

Mobile First: Securing Information Sprawl

Mobile First: Securing Information Sprawl

Once you have implemented mobile device management (MDM), the next mobile problem to address is information sprawl.

Mitigating the Risk of Mobile Data Loss on iOS

Mitigating the Risk of Mobile Data Loss on iOS

For Secure Enterprise Mobility it’s critical to mitigate risk and demonstrate compliance. Using iOS and MobileIron, these best practices are essential to integrate into existing data security initiatives.

Docs@Work: DLP and Secure Access for Mobile Content

Docs@Work: DLP and Secure Access for Mobile Content

MobileIron Docs@Work addresses the entire lifecycle of mobile content security:

Financial Services CISO Guide

Financial Services CISO Guide

Data Loss Prevention Controls for BlackBerry to iOS Migration

The Ultimate Guide to BYOD eBook

The Ultimate Guide to BYOD

The rate at which enterprises are embracing mobile technology is more than an evolution — it’s a global transformation.

MobileIron and Cisco Identity Services Engine 1.2

MobileIron and Cisco Identity Services Engine 1.2

Unprecedented Visibility for Mobile Devices
Mobile computing has brought about phenomenal improvements in workforce productivity, flexibility, and job satisfaction but—whether it is device operating system, form factor, ownership, or app selection and utilization—the diversity of the mobile la
White Paper

Implementing Mobility to Conform to the UK Government’s CESG End User Device Guidance

The UK government has produced security and configuration guidance for devices such as smartphones, laptops and tablets.
Android Bootcamp

Android Bootcamp

A guide to getting started with Android mobile devices in the enterprise.

Real-World Scale for Mobile IT:  Nine Core Performance Requirements

Real-World Scale for Mobile IT: Nine Core Performance Requirements

As the leader in Mobile IT, MobileIron has worked with hundreds of Global 2000 companies to scale their mobile deployments.

PCI Compliance and Mobile Devices

PCI Compliance and Mobile Devices

The Payment Card Industry (PCI) Security Standards Council has released the Data Security Standards (DSS) version 3.0 outlining revised requirements for payment data security, effective January 1st, 2014.

Mobile First Government

Mobile First Government

August 2013
An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies