Resources

Smart@Work Blog

POSTED BY:
Michael T. Raggo | November 24, 2014
Categories: Mobile Security
Masque Attack, iOS

On November 13, 2014, U.S. CERT issued an alert based on research from FireEye about an attack on Apple iOS called the “Masque Attack.” This attack can occur...

Read More →
POSTED BY:
Ryan Faas | November 21, 2014
Categories: iOS, Mobile Strategy

Planning for Apple Watch and wearables in the enterprise

Apple recently released the developer tools and guidelines for Apple Watch, giving users and developers a preview of how the device and apps designed for it will function. Apple Watch won’t be the first wearable or smartwatch on the market, but it is the first such device that has generated significant positive interest among consumers and the mainstream press, and it is considered by many to be the first...

Read More →
POSTED BY:
Vittorio Viarengo | November 13, 2014

Deloitte ranked MobileIron the #1 fastest growing technology company in North America over the past five years. With a cumulative growth rate of 123,678%,...

Read More →
POSTED BY:
Abby Guha | October 21, 2014

BYOD Security

The use of mobile devices in the enterprise continues to accelerate. According to IDC, tablets are expected to outsell PCs by 2015. In parallel, there is also an explosion of content & data with a rapidly growing adoption of mobile apps and content for enhanced productivity within enterprises. In keeping with these market needs, the Fall...

Read More →
POSTED BY:
Vijay Pawar | October 3, 2014
BYOD Security

BYOD Security Requires a Multi-layered Approach with Per-app VPN

Enabling employees to use their personal devices for work is no longer a question of if, but how and when. IT decisions are now heavily driven by consumer technology trends, and mobile employees increasingly want to use their preferred devices for both work and...

Read More →
POSTED BY:
Alexander Romero | October 2, 2014

With the release of iOS 8, enterprises are all asking the same question: “What does it mean for our business?” The exhaustive list...

Read More →
POSTED BY:
Vittorio Viarengo | October 1, 2014
Salesforce, Dreamforce 2014

We've heard it loud and clear: Enterprises want to extend Salesforce access to smartphones and tablets, but they're concerned about unauthorized devices accessing or, worse still, sensitive data being lost to misplaced or compromised devices. Join MobileIron at...

Read More →
POSTED BY:
Sandeep Jain | September 29, 2014
Categories: iOS
iOS 8 App Extensibilty

About 70 years after the Acts of Union  joined the Scottish and English parliaments, a Scotsman published a magnum opus and became the ‘father of modern economics’.  Adam Smith described 2 ways to create the Wealth of Nations:...

Read More →
POSTED BY:
Michael T. Raggo | September 25, 2014
Categories: Mobile Security

Recently a significant vulnerability in the Bash shell has been reported on various versions of Linux. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 for details.

This vulnerability is not exploitable in MobileIron customer deployments. The exploit of this vulnerability requires untrusted user input to be used for the setting of environment variables in the Bash shell. In MobileIron...

Read More →
POSTED BY:
Sandeep Chopra | September 25, 2014
Categories: Mobile Learning
Security vs. Privacy

MobileIron Privacy Blog
This is the first in a series of blog posts about evolving privacy requirements for enterprise mobility. I will be sharing best practices from the industry and MobileIron customers, but this post should not be used as a substitute for competent legal advice from a licensed professional attorney...

Read More →

Pages

Subscribe to Smart@work Blog