Solutions

MDM Mobile Security Solutions

MDM Mobile Security Solutions

The security challenges of modern mobile operating systems are very different from those of the legacy PC era. Mobile operating systems have shifted to a new, sandboxed architecture that results in higher stability, improved user productivity and easier updates. This new architecture eliminates traditional malware threats, and incorporates built-in security and management APIs. When paired with an enterprise mobile security platform like MobileIron, they become a powerful set of capabilities that improve data security.

Additionally, Enterprise data now lives in both corporate and consumer apps and cloud storage repositories. The goal with mobile security is to secure that corporate data wherever it is. In the mobile world, the right security model means that employees can do more. Making this possible requires a new model for security: identity and trust determine employee access.

The flip side of security is privacy. Mobile devices are highly personal and almost every device will contain a mix of personal and corporate information. IT needs to be able to secure and manage the enterprise information on the device without seeing the personal information. This is critical in a world where privacy is becoming increasingly important to both the user and to all of regulatory communities around the world.

The MobileIron mobile security platform was built to secure and manage modern operating systems in a world of mixed-use devices. It incorporates identity, context, and privacy enforcement to set the appropriate level of access to enterprise data and services. With MobileIron, IT can secure corporate information wherever it lives while preserving the sanctity of employee privacy. With MobileIron, security means enabling business not restricting it.

Threat Vectors

Threat vectors on Mobile are different from a PC. Application sandboxing on mobile protects against Data Loss, but always-on connectivity, device tampering, and malware introduce new types of threats.

More

Data Security

Mobile security solutions must encompass mobile devices, apps, content, and networks. Controlling data loss through proactive, reactive, and live monitoring controls through automation is key to mitigating threats. This also involves enabling users to avoid Shadow IT.

More

Compliance

Compliance drives many mobile security deployments. MobileIron participates in security councils including PCI, and brings together solutions for PCI, HIPAA, CJIS, and more. Additional foundations of our customer solutions include: SOC 2 Type II, FIPS validation, and more.

More
Security Alert

Masque Attack impacts iOS. Learn More...

Threat Vectors on Mobile are Different From PC

Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors.

Data Loss

Data Loss

Data loss to cloud services and productivity apps via open-in, copy, paste and forwarding functions

Device Tampering

Device Tampering

Exploit OS vulnerabilities to jailbreak or root devices, bypass security, and install malicious apps from unauthorized app stores

Always-on Connectivity

Always-on Connectivity

Mobile devices are hyper-connected and often access sensitive data over untrusted networks, increasing the risk of data loss through Wi-Fi sniffing , rogue access points and Man-in-the-Middle (MitM) attacks

Form Factor

Form Factor

Portable form-factors make mobile devices susceptible to loss or theft

Malicious or Risky Apps

Malicious or Risky Apps

Collect and share data such as personally identifiable information (PII) and device location with third party advertising and analytics systems

MobileIron's Countermeasures to
Enforce Data Loss Prevention (DLP) on Mobile

Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments, as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobile security platforms, designed to enable end-user productivity while securing apps, content and devices.

Transparent Authentication

Transparent Authentication

Certificates and Single Sign On for seamless authentication

Curated App Catalog

Curated App Catalog

Easy access to approved secure apps – in-house and 3rd party

Secure App Ecosystem

Secure App Ecosystem

Enable user productivity on apps of their choice

Apply Consistent Device Policies Across Multiple Mobile OS

Apply Consistent Device Policies Across Multiple Mobile OS

Ensure privacy, data protection, integrity and data loss prevention

Strong Authentication Using Certificates

Strong Authentication Using Certificates

Secure data-in-motion, mitigate Wi-Fi sniffing and MitM

Secure Mobile Gateway

Secure Mobile Gateway

Block unauthorized or non-compliant devices

Per App VPN

Per App VPN

Encrypt data-in-transit and provide granular app-level access control

Containerize and Encrypt Enterprise Data

Containerize and Encrypt Enterprise Data

Separate personal and corporate data

App-level DLP Control

App-level DLP Control

Provide DLP (open-in, copy, paste) control and restrict file sharing

App Reputation Services

App Reputation Services

Proactively identify and restrict use of malicious and risky apps

Ongoing Compliance Monitoring

Ongoing Compliance Monitoring

Detect OS tampering and other policy violations

Device Quarantine/
Selective Wipe

Device Quarantine/
Selective Wipe

Prevent compromised devices from accessing corporate data

Compliance

From a cashier accepting payments at a retail store to doctors accessing patient records in hospitals, mobile has become an important enterprise productivity tool. Often times there are industry specific security requirements, and enabling mobile productivity means IT must meet these standards.

Check

FIPS 140-2

Certified Encryption

Check

HIPAA

Health Insurance Portability and Accountability Act

Check

CJIS

Criminal Justice Information Services