Resources

Smart@Work Blog

Welcome

These are observations from the work we’re doing at MobileIron. Every day, we encounter lots of interesting and thought-provoking situations where just the introduction of mobile technology into an organization has created significant behavioral and technology shifts in the status quo. The world is changing. By the time my kids graduate from college and get their first jobs, they won’t use a desk phone or probably even a PC. If you believe, like us, that mobile will become the primary computing platform for the enterprise … and especially if you don’t … please comment and share your thoughts.

Thanks for reading!

Ojas Rege


A Scottish Worldview and iOS 8 App Extensions

POSTED BY:
Sandeep Jain | September 29, 2014
Categories: iOS
iOS 8 App Extensibilty

About 70 years after the Acts of Union  joined the Scottish and English parliaments, a Scotsman published a magnum opus and became the ‘father of modern economics’.  Adam Smith described 2 ways to create the Wealth of Nations:

  1. Deepen...
Continue Reading »

MobileIron Customer Deployments are Not Vulnerable to Bash Exploit

POSTED BY:
Michael T. Raggo | September 25, 2014
Categories: Mobile Security

Recently a significant vulnerability in the Bash shell has been reported on various versions of Linux. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 for details.

This vulnerability is not exploitable in MobileIron customer deployments. The exploit of this vulnerability requires untrusted user input to be used for the setting of environment variables in the Bash shell. In MobileIron...

Continue Reading »

MobileIron Privacy Blog: The Security and Privacy Paradox

POSTED BY:
Sandeep Chopra | September 25, 2014
Categories: Mobile Learning
Security vs. Privacy

MobileIron Privacy Blog
This is the first in a series of blog posts about evolving privacy requirements for enterprise mobility. I will be sharing best practices from the industry and MobileIron customers, but this post should not be used as a substitute for competent legal advice from a licensed professional attorney...

Continue Reading »

Three Questions Enterprises Should Ask About iOS 8

POSTED BY:
Ojas Rege | September 17, 2014
Categories: iOS, Mobile Strategy
iOS 8 healthkit

“There’s less enterprise stuff in iOS 8 than iOS 7, so I think we’re gonna be fine.”

I got this response from the head of mobile at one of our customers several weeks ago. It is representative of what I see across the board in the IT community...

Continue Reading »

PCI Security Standards Council North America 2014 Meetings Debrief

POSTED BY:
Michael T. Raggo | September 13, 2014
Categories: Mobile Security
PCI Council Security 2014

Just last week, I participated in the PCI Security Standards Council North America 2014 meetings. As a participating organization, MobileIron contributes to the Mobile Point-of-Sale (POS) requirements and guidelines for Payment Card Industry Data Security Standard (PCI DSS) and...

Continue Reading »

BYOD Grows Up: California Ruling on Reimbursement

POSTED BY:
Ojas Rege | September 2, 2014
Categories: BYOD, Mobile Strategy
BYOD Reimbursement

In August 2014, the California Court of Appeals ruled that if employees must use their personal cell phones for business, their employers should reimburse them for a reasonable amount of the resulting mobile expense.  

Here are the details of the...

Continue Reading »

Approaches to Security Compliance for Real-Time Mobile Data Access

POSTED BY:
Michael T. Raggo | August 20, 2014
Real-Time Mobile Data Access

Security Compliance often varies from organization to organization due to varied industry regulation as well as internal security policies and procedures. Mobile is fundamentally different than other enterprise technology and therefore requires a...

Continue Reading »

Securing the Internet of Things: Seven Questions to Get Started

POSTED BY:
Rahul Sharma | August 12, 2014
Secure the Internet of things

This is the first in a series of blog posts on security and management approaches for the Internet of Things (IoT).

Growth of IoT

IoT has been generating significant buzz recently. Gartner, Inc recently published: “...

Continue Reading »

BlackHat Report: App Wrapping

POSTED BY:
Michael T. Raggo | August 7, 2014
Categories: Mobile Security
BlackHat 2014

I was happy to see that BlackHat 2014 had a strong focus on mobile enterprise security. At MobileIron, we have always been very supportive of the security research community and its efforts to improve the security of the mobile ecosystem, and so I want to highlight one of the presentations at the conference.

"Unwrapping the...

Continue Reading »

News Reports on Potential iOS Backdoors

POSTED BY:
Ojas Rege | July 24, 2014
Categories:
Potential iOS Backdoors

There was research published this week about potential backdoors in iOS that could give third-parties access to data through undocumented iOS APIs.

We don’t use any of these APIs in MobileIron....

Continue Reading »

Pages

Subscribe to Smart@work Blog