These are observations from the work we’re doing at MobileIron. Every day, we encounter lots of interesting and thought-provoking situations where just the introduction of mobile technology into an organization has created significant behavioral and technology shifts in the status quo. The world is changing. By the time my kids graduate from college and get their first jobs, they won’t use a desk phone or probably even a PC. If you believe, like us, that mobile will become the primary computing platform for the enterprise … and especially if you don’t … please comment and share your thoughts.
Thanks for reading!
Approaches to Security Compliance for Real-Time Mobile Data Access
Michael T. Raggo | August 20, 2014
Security Compliance often varies from organization to organization due to varied industry regulation as well as internal security policies and procedures. Mobile is fundamentally different than other enterprise technology and therefore requires a revised approach to security policies and countermeasures. We often see organizations attempt to repurpose security frameworks from the PC...Continue Reading »
Securing the Internet of Things: Seven Questions to Get Started
Rahul Sharma | August 12, 2014
This is the first in a series of blog posts on security and management approaches for the Internet of Things (IoT).
Growth of IoT
IoT has been generating significant buzz recently. Gartner, Inc recently published: “Forecast: The Internet of Things, Worldwide, 2013” by Peter Middleton, Peter Kjeldsen, Jim Tully, November 18, 2013,...Continue Reading »
BlackHat Report: App Wrapping
Michael T. Raggo | August 7, 2014
I was happy to see that BlackHat 2014 had a strong focus on mobile enterprise security. At MobileIron, we have always been very supportive of the security research community and its efforts to improve the security of the mobile ecosystem, and so I want to highlight one of the presentations at the conference.
"Unwrapping the...Continue Reading »
News Reports on Potential iOS Backdoors
Ojas Rege | July 24, 2014
MobileIron Spaces Give IT the Flexibility to Scale
Jay Bhansali | July 22, 2014
June has been an exciting month for the Mobile industry - Apple WWDC, Google I/O and MobileIron's Summer 2014 release, amongst other events. Both Apple and Google announced new versions of their respective mobile operating systems - iOS 8 and Android L, which include features that will accelerate mobile adoption in the enterprise. To learn more about the announced enterprise...Continue Reading »
AppConnect Ecosystem Drives Customer Choice and Flexibility
Vikas Butaney | July 14, 2014
Google I/O Recap, Part 2: Building a Seamless User Experience
Raj Mallempati | July 10, 2014
Simplified Enterprise Mobility Management Delivers the Future of IT
Abby Guha | June 30, 2014
Smartphones and tablets have transformed the way end-users interact with applications and content in their personal lives and now they are demanding a similar mobile experience at the workplace. To meet this demand, IT needs to become more agile and provide end-users access to critical business apps and content on mobile devices of their choice while maintaining privacy and a familiar native end-user experience.
With MobileIron's ...Continue Reading »
Google I/O Recap, Part 1: Google is Serious About Enterprise Mobility
Raj Mallempati | June 27, 2014
The Google I/O 2014 developer conference didn’t need flashy skydiving stunts to get the attention of enterprise customers. The latest Android announcements were enough to show that Google is taking enterprise mobility seriously, starting with the Android Work initiative. Because Android...Continue Reading »
Setting the Record Straight
Adrian Klingenberg | June 27, 2014
Guest post from: Adrian Klingenberg, Technical Director – Esselar
We have recently seen two inaccurate press articles suggesting that an Esselar customer using MobileIron Software was hit by the Heartbleed vulnerability and that the MobileIron Infrastructure is vulnerable to attack, but this is categorically untrue and we would like to correct these inaccuracies. MobileIron’s software is not vulnerable to the Heartbleed attack, and no customer data was accessed, compromised...Continue Reading »