These are observations from the work we’re doing at MobileIron. Every day, we encounter lots of interesting and thought-provoking situations where just the introduction of mobile technology into an organization has created significant behavioral and technology shifts in the status quo. The world is changing. By the time my kids graduate from college and get their first jobs, they won’t use a desk phone or probably even a PC. If you believe, like us, that mobile will become the primary computing platform for the enterprise … and especially if you don’t … please comment and share your thoughts.
Thanks for reading!
The Dropbox Catch-22
Sean Convery | March 5, 2014
What is the Dropbox Catch-22? First, let me ask a different question:
If an auditor had full access to your Dropbox account right now, would they find a single bit of corporate data that shouldn’t be there?
I’ve asked this question a lot, with all sorts of very senior IT folks in the room, and I have very rarely heard...
Apple SSL Bug (iOS) - MobileIron "State of the Hack"
Michael T. Raggo | March 1, 2014
An SSL bug was patched on Friday, February 21, 2014 by Apple for devices older than 7.0.6. It stems from a faulty implementation of SSL and should not be construed as a bug or flaw in the SSL/TLS protocol. The attack can occur when an attacker performs a MITM (Man-in-the-Middle) attack allowing the attacker to present an unvalidated SSL certificate as part of the authentication process. By not...Continue Reading »
A Sunny Outlook on Shadow IT
Sean Convery | February 21, 2014
I’ve seen a lot of chatter recently around the topic of Shadow IT: the temptation for users to build their own IT to get around restrictive corporate policies or apps with bad user experiences. It’s a hugely important conversation and can be a forcing function to get IT and end-users on the same page.
Mobile content is probably the...
Enterprise APIs from mobile devices CAN be private
Josh Sirota | February 10, 2014
“Cheap” MDM gives BYOD a bad name
Josh Sirota | January 24, 2014
Securing Your Mobile POS Systems
Michael T. Raggo | January 10, 2014
In the wake of one of the largest credit card breaches in history, I thought it was timely to write a blog outlining security best practices for securing mobile Point-of-Sale (POS) systems. As information about this breach emerges, it appears that the root cause of the breach was a malware infestation of its POS systems at most of the stores leading to an exposure of roughly 40 million credit and...Continue Reading »
Shine On You Crazy Mobile Enterprise: Six Predictions for 2014
Ojas Rege | January 7, 2014
2013 is OVER! Enterprise mobility is truly HERE! My caps lock is STUCK! So let’s check the crystal ball for 2014.
Why six predictions? Well, I didn’t want filler just to get to the traditional ten, and the sixth predication was TOO good to omit to chop it down to five.
So here we go: The unquestionably reliable crystal ball of enterprise mobility recommends...
Why a Mobile IT Platform Matters
Sean Convery | January 3, 2014
As you’d expect, we're spending a lot of time talking to customers as we finish out the year. Many of them are making plans to further ramp up their Mobile IT deployment in 2014 and they are making investments now. We're always interested in the specifics of their deployments but if we’ve heard one thing consistently this year, it is the central role played by our integrations with other mobile...Continue Reading »
Mobile Device Management - Market Analysis
Vittorio Viarengo | December 14, 2013
One of the questions that I am asked very often is “what is the state of the mobile device management market in terms of adoption and market shares?”.
While I do have a lot of information about MobileIron's own revenue, our win rate in the market, and our own proprietary market research, as a privately owned company we don’t share...Continue Reading »
Do You Know What Your End-Users Are Doing?
Samantha Fautt | December 13, 2013
In today’s world of high-speed information and confining government regulatory laws, it's very important to secure sensitive data on your mobile devices while still providing a good user experience. In this fast moving space is it crucial that your MDM software of choice uses FIPS 140-2 Certified cryptography as a baseline, with an eye toward meeting the...