Blogs https://www.mobileiron.com/en/blog/rss.xml/all?field_blog_taxo_target_id=All en Jeff Bezos’ iPhone Hacking Explained https://www.mobileiron.com/en/blog/jeff-bezos-iphone-hacking-explained <span>Jeff Bezos’ iPhone Hacking Explained</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 01/23/2020 - 20:43</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fjeff-bezos-iphone-hacking-explained" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fjeff-bezos-iphone-hacking-explained&amp;title=Jeff%20Bezos%E2%80%99%20iPhone%20Hacking%20Explained" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Jeff%20Bezos%E2%80%99%20iPhone%20Hacking%20Explained&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fjeff-bezos-iphone-hacking-explained" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/07-jeff-bezos-iphone-hack/blog-inline-image.jpg" width="656" height="290" alt="Jeff Bezos’ iPhone Hacking Explained" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>So, have you read the latest story about how Jeff Bezos’ iPhone was hacked using a malware implant, and then all his personal data on the phone was stolen? If not, the plot makes for a television drama series or big hit movie that takes the box office by storm. I apologize, but this blog won’t satisfy that storyline, but if you are a techie guy like me, continue on.</p> <p>First off, my educated guess is that exploit likely used was this one: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11931">https://nvd.nist.gov/vuln/detail/CVE-2019-11931</a></p> <p>Most sophisticated hackers, particularly those involving groups like the Hacking Team and NSO Group, cover their tracks by deleting logs and volatile memory, and auditing trail information stored on the device. That way, post-breach forensics cannot identify the techniques used by the malware implant to trigger the buffer overflow and perform the remote code execution (RCE) by sending and potentially opening an MP4 video file.</p> <p>From everything I’ve read, it appears that a common social app, WhatsApp, was legitimately downloaded from the iOS App Store, and the malware implant, Pegasus spyware, was attached to the app surreptitiously as part of the exploit. At the time of the actual hack, the Pegasus spyware may not have been detectable as a zero-day by app reputation solutions. As soon as the exploit evolved, an elevation of privileges (EoP) threat, system tampering and file system changed threat would have been detected by <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">MobileIron Threat Defense</a> (MTD). As the exploit evolved to the device level, MTD and MobileIron UEM would have also detected the jailbreak state after the RCE was completed. A jailbreak of the device was most likely executed in order to access all personal data at the device’s root level and take over the entire device to exfiltrate the personal data.</p> <p>If a VPN was used to transfer the stolen data, the default gateway changed threat would have been detected at the network level, when the data was being exfiltrated from the device.</p> <p>If a company’s security policy is to ban leaky or suspicious apps on company-issued phones, we recommend that security teams blacklist the WhatsApp bundle, or specific versions of WhatsApp configured within the MTD management console. If the user installs WhatsApp, all UEM-provisioned settings and configurations are removed as part of a quarantine or retired from UEM, as a compliance action.</p> <p><a name="_heading=h.gjdgxs" id="_heading=h.gjdgxs"></a>From all indications, there wasn’t a unified endpoint management or mobile threat defense solution installed on Mr. Bezos’ phone to potentially stop this attack in its tracks. These tools might be a good investment for the world’s richest man so this storyline doesn’t have a sequel.</p> </div> </div> </div> </div> Fri, 24 Jan 2020 04:43:55 +0000 sraikow 2489 at https://www.mobileiron.com TikTok – “It won’t make your day!” https://www.mobileiron.com/en/blog/tiktok-security-vulnerabilities <span>TikTok – “It won’t make your day!”</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 01/21/2020 - 13:20</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ftiktok-security-vulnerabilities" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ftiktok-security-vulnerabilities&amp;title=TikTok%20%E2%80%93%20%E2%80%9CIt%20won%E2%80%99t%20make%20your%20day%21%E2%80%9D" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=TikTok%20%E2%80%93%20%E2%80%9CIt%20won%E2%80%99t%20make%20your%20day%21%E2%80%9D&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ftiktok-security-vulnerabilities" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/06-tiktok-security-vulnerabilities/blog-inline-image.jpg" width="656" height="290" alt="TikTok Security Flaws, TikTok Vulnerabilities, TikTok Security Vulnerabilities" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Strewn throughout my cybersecurity news feed the past month have been reports from security companies and researchers about vulnerabilities with the very popular video-sharing app called TikTok. It is safe to assume that it is the most downloaded app today (1.5 billion times) for the iOS and Android platforms, with hundreds of millions of users around the world.</p> <p>The graphic below highlights the reported TikTok security vulnerabilities with the app. On the heels of the developer patching these same TikTok security flaws are reports of its parent company, called ByteDance, including a deepfake feature within the app called Face Swap.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2020/06-tiktok-security-vulnerabilities/photo-1.jpg" width="100%" /></p> <p> </p> <p>What is deepfake? Deepfake is the technology that manipulates an original video and audio source by swapping a person’s face with a realistic looking synthetic face from another video or image using deep learning artificial intelligence. Mostly, deepfakes are used for fun and entertainment, but there are more nefarious uses for this technology. Deepfake AI technology has been predicted as one of the top cybersecurity threats for 2020 (and probably beyond)!</p> <p>The concerns with any social media app that harvests large amounts of personal, biometric and facial data are the abuse and misuse of that private data by threat actors and adversarial governments to further train their facial recognition machine learning algorithms with a more diverse facial characteristics sampling from around the world. It can then be used to profile, and keep track of the movements and whereabouts of anyone anywhere around the world. Locally, the facial data can be misused to create fake political ads during this year’s election.</p> <p>The other red flag is that TikTok is very popular amongst teens and pre-teens. There are privacy laws that protect children under the age of 13, where parental consent is required before companies can collect their personal information. The threat of abuse of this data should be a great concern to parents with children of any age!</p> <p>TikTok sounds like a fun app and there is a certain appeal to many, especially to the younger set to be popular and cool, but there are just too many red flags with this app to have it installed on any personal and work mobile devices. The US Navy and Army have banned this app from government-issued phones. Please stay clear of TikTok because “It won’t make your day!”</p> <p>The short video below demonstrates MobileIron Threat Defense’s many capabilities, specifically how a leaky and suspicious app like TikTok is detected and then remediated on a mobile device managed by MobileIron UEM.</p> <p>To learn more, stop by our booth #1727 in the South Hall at RSA Conference 2020, taking place Feb. 24-28 in San Francisco.</p> <p> </p> <style type="text/css"> <!--/*--><![CDATA[/* ><!--*/ .embed-container { position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; max-width: 100%; } .embed-container iframe, .embed-container object, .embed-container embed { position: absolute; top: 0; left: 0; width: 100%; height: 100%; } /*--><!]]>*/ </style><div class="embed-container"><iframe allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/XxPIqSDnPeQ"></iframe></div> <p> </p> </div> </div> </div> </div> Tue, 21 Jan 2020 21:20:14 +0000 sraikow 2488 at https://www.mobileiron.com Don't Let A Consumer App Weaponize A Device And Bring Down Your Entire Enterprise https://www.mobileiron.com/en/blog/defending-against-consumer-apps-with-zero-trust <span>Don&#039;t Let A Consumer App Weaponize A Device And Bring Down Your Entire Enterprise</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Fri, 01/17/2020 - 10:38</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fdefending-against-consumer-apps-with-zero-trust" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fdefending-against-consumer-apps-with-zero-trust&amp;title=Don%27t%20Let%20A%20Consumer%20App%20Weaponize%20A%20Device%20And%20Bring%20Down%20Your%20Entire%20Enterprise" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Don%27t%20Let%20A%20Consumer%20App%20Weaponize%20A%20Device%20And%20Bring%20Down%20Your%20Entire%20Enterprise&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fdefending-against-consumer-apps-with-zero-trust" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/05-consumer-apps-weaponize/blog-inline-image.jpg" width="656" height="290" alt="Zero trust consumer apps" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Mobile devices are critical to both our personal and professional lives and hold more information than ever before. Modern work increasingly takes place in the cloud and on personal mobile devices, eroding the typical network perimeter and revealing countless new threat vectors.</p> <p>At the same time, mobile threats are evolving. Verizon’s "Mobile Security Index 2019" (via <a href="https://www.forbes.com/sites/louiscolumbus/2019/05/08/how-to-secure-mobile-devices-in-a-zero-trust-world/#c8555f4ebe84" target="_self">Forbes</a>) found that "86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types."</p> <p>Today, employees don’t just bring their own devices to work; they also bring different sets of applications installed on those devices. According to App Annie’s State of Mobile in 2019 report (via <a href="https://ppc.land/mobile-10-minutes-of-every-hour-spent-consuming-media-will-be-streaming-video-on-mobile/" target="_blank">PPC Land</a>), "Consumers downloaded 194 billion apps in 2018, spent $101 billion in app stores, and averaged three hours per day in mobile."</p> <p>As consumer applications continue to infiltrate the enterprise, the future of data breaches and cybercrime lies in mobile applications and operating systems. For example, <a href="https://thenextweb.com/security/2019/07/19/nso-groups-whatsapp-spyware-can-now-snoop-on-your-facebook-google-and-icloud-data-too/" target="_blank">a popular messaging application recently made headlines</a> when hackers exploited it through a vulnerability and injected Pegasus spyware into the app by simply calling the target. Once the infiltration took place, the camera and mic of a user's phone could be turned on, emails and messaging (both personal and corporate) exposed and user location data collected.</p> <p>This demonstrates how vulnerable mobile applications and devices are to attacks and how a consumer app could potentially weaponize a device against an enterprise. It shows how unmanaged devices with access to corporate data increase the risk that sensitive corporate data will leak. That’s why enterprises need to ensure mobile devices that have access to business resources are secure.</p> <p>As the CEO of a company that offers mobile enterprise security solutions, I've seen firsthand how today's companies need to rethink their security strategies to focus on the technology at the center of the enterprise: mobile devices. A mobile-centric zero trust approach can deal with the security issues that a modern enterprise faces and also provide the agility that a modern enterprise requires. It provides the visibility and IT controls needed to secure, manage and monitor every device, user, app and network being used to access business data.</p> <p>A mobile-centric zero trust approach also provides on-device detection and remediation of threats. An additional security layer of threat intelligence detects suspicious or out-of-compliance applications, like the popular messaging application example above. If an application is suspicious or out of compliance, the IT department can notify, monitor, block, quarantine or completely retire the device, keeping enterprise data secure. This is critical because hackers are <a href="https://www.zdnet.com/article/mobile-malware-attacks-are-booming-in-2019-these-are-the-most-common-threats/" target="_blank">increasingly targeting</a> mobile devices and applications with sophisticated attacks.</p> <p>It is quite straightforward to implement and successfully realize the benefits of a mobile-centric zero trust approach:</p> <ul><li>Equip users with a secure digital workplace space with all the apps they need, on the devices of their choice.</li> <li>Ensure that you grant user access to authorized corporate data based on full context.</li> <li>Include protection for data at rest and in motion with encryption and threat monitoring.</li> <li>Enforce security policies with ongoing monitoring to quarantine devices, alleviate threats and maintain compliance.</li> </ul><p>By being easy to implement and imperceptible to the end user, a mobile-centric zero trust approach bridges the gap between high security and low friction, which is essential to success. This is critical given the expectation by consumers — and therefore employees — that technology will be easy to deploy and deliver a seamless experience.</p> <p>The bring-your-own-device (BYOD) enterprise trend has gone beyond devices and now reaches into applications. But if not properly secured, a consumer app can weaponize a device and bring down your entire enterprise. To avoid this threat, start rethinking your security strategy now so your employees can tap into mobile and cloud innovations without sacrificing business integrity.</p> <p> </p> <hr /><p><em>This post <a href="https://www.forbes.com/sites/forbestechcouncil/2019/10/08/dont-let-a-consumer-app-weaponize-a-device-and-bring-down-your-entire-enterprise/#2be10c3e81ea">originally appeared on Forbes.com</a>.</em></p> </div> </div> </div> </div> Fri, 17 Jan 2020 18:38:52 +0000 sraikow 2487 at https://www.mobileiron.com Lower TCO, Flexible Deployment Options and Market Leadership are Key Reasons to Select MobileIron over Microsoft https://www.mobileiron.com/en/blog/why-microsoft-customers-choose-mobileiron-part-3 <span>Lower TCO, Flexible Deployment Options and Market Leadership are Key Reasons to Select MobileIron over Microsoft</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Wed, 01/15/2020 - 12:56</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-3" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-3&amp;title=Lower%20TCO%2C%20Flexible%20Deployment%20Options%20and%20Market%20Leadership%20are%20Key%20Reasons%20to%20Select%20MobileIron%20over%20Microsoft" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Lower%20TCO%2C%20Flexible%20Deployment%20Options%20and%20Market%20Leadership%20are%20Key%20Reasons%20to%20Select%20MobileIron%20over%20Microsoft&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-3" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/04-msft-key-reasons-tco/blog-inline-image.jpg" width="656" height="290" alt="Key Reasons Why MobileIron over Microsoft" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>In today’s digital workplace, CIOs and IT leaders are continually looking at innovative ways to transform their business and achieve operating efficiencies at scale while improving user and customer experience. Many customers choose MobileIron for business transformation and consolidation of mobile and desktop management, using our <a href="https://www.mobileiron.com/en/products/uem">Unified Endpoint Management (UEM) solution</a>.</p> <p>This blog discusses <strong><em>lower TCO</em></strong>, <strong><em>cloud and on-premises deployment options </em></strong>and proven <strong><em>market leadership</em></strong> as three additional reasons why you should choose MobileIron</p> <p> </p> <h4>1. High Costs of Microsoft Intune: Switching and Maintenance</h4> <p> </p> <p>First of all, you need to unbundle the complex Microsoft bundle. Are you signing on for use cases that absolutely add no value to your business in the foreseeable future?</p> <p>You need to investigate the complexity of Microsoft licensing and bundling to see if it aligns with your company’s needs. Many customers have found that they are paying for functionality they neither want nor need. The complexity of an Intune integration is significant since there’s no easy tool to migrate—meaning everything you’ve set up will have to be done all over again with Intune and you get locked-in to a Microsoft stack.</p> <p>We’ve analyzed the tasks and time involved to complete a migration from MobileIron to Intune and the price tag comes to about <strong><em>$100-$150</em></strong> per person, per device!</p> <p> </p> <p><img alt="The Cost Factors in an Intune Migration" src="https://www.mobileiron.com/sites/default/files/Blog/2020/04-msft-key-reasons-tco/table-1.png" width="100%" /></p> <p> </p> <div style="background: #F0EFEF; border-radius: 6px; padding:25px; width:100%"> <p><strong>The Cost of Switching </strong></p> <p>A Fortune 500 company with more than 17,000 devices saved almost $2 million when staying with MobileIron, while a large services provider with almost 90,000 devices saved close to $9 million.</p> <p>Moving to Intune is a costly and is a heavy lift. The table below breaks down the impact to IT and end users.</p> <table border="0" cellpadding="0" cellspacing="20"><tbody><tr><td valign="top" width="300"> <p><strong>IT needs to re-architecture</strong></p> </td> <td valign="top" width="324"> <p><strong>Disruptive with poor user experience</strong></p> </td> </tr><tr><td valign="top" width="300"> <ul><li>Build new policies</li> <li>Manually add all settings</li> <li>Redo Security: Review IT, tunneling, VPN and much more</li> <li>Global education and end-user re-training</li> <li>Helpdesk support costs</li> </ul></td> <td valign="top" width="324"> <ul><li>Complete device retirement and re-registration</li> <li>Manual process with high failure rate</li> <li>Devices using native capabilities (example: Apple Business Manager) must be reset to factory setting</li> <li>Productivity impacting re-training</li> </ul></td> </tr></tbody></table></div> <p> </p> <h4>2. Cloud and On-Premises Deployment Option</h4> <p> </p> <p>Gartner has forecasted that cloud revenue will hit <a href="https://www.gartner.com/en/documents/3906899/forecast-public-cloud-services-worldwide-2017-2023-1q19-" target="_blank">$370 billion</a> by 2023. Cloud services has become a core element today’s IT. However, it is still a small percentage of IT spend based on Gartner’s forecast for worldwide IT spending of $3.79 trillion in 2019.</p> <p>Most Fortune 2000 companies were not born in the cloud and will need to have the flexibility to continue to deploy UEM on-premises and/or in the cloud. Many organizations aren’t allowed or choose not to send their business-critical and proprietary apps to the cloud. Microsoft doesn’t give them that option today.</p> <p> </p> <p><img alt="UEM" src="https://www.mobileiron.com/sites/default/files/Blog/2020/04-msft-key-reasons-tco/photo-1.png" width="100%" /></p> <p> </p> <p>Not only does MobileIron give you the flexibility to deploy in the cloud or on-premises, with MobileIron you have the option to adhere to strict corporate security policies by storing all data on site. It can also run on virtual environments, which allows for seamless deployments on several different setups.</p> <p> </p> <h4>3. Nine years of Proven Innovation and Market Leadership</h4> <p> </p> <p>MobileIron, named a Leader in Gartner Magic Quadrants for <a href="https://www.mobileiron.com/en/blog/mobileiron-named-leader-gartner-mq-for-uem-2019">9 consecutive years</a> has enjoyed a strong standing among customers and industry analysts for years.</p> <p>Most recently in Gartner’s 2019 Magic Quadrant Critical Capabilities, MobileIron <a href="https://www.mobileiron.com/en/blog/2019-critical-capabilities-uem">ranks higher than Microsoft in three out of four</a> Gartner use cases and five out of eight critical capabilities.</p> <p>MobileIron was the <a href="https://www.mobileiron.com/en/blog/strong-performer-forrester-zero-trust-report">only UEM vendor</a> in the Forrester Research study in addition to being named a strong performer in the most recent “2019 Forrester Zero Trust  eXtended Ecosystem Platform Providers” Wave.</p> <p> </p> <h4>Get Started Now</h4> <p> </p> <p>As you start executing your 2020 initiatives, I encourage you to make informed decisions that include TCO, deployment options and innovations from a proven market leader.</p> <p>No one vendor or solution can completely and securely address all the complex needs of today’s modern digital workplace. You need to choose the right tools and best-of-breed solutions to properly secure the way your employees want and need to work.</p> <p>To learn more and avoid getting trapped by the limitations of Microsoft Intune, read our e-book <a href="https://www.mobileiron.com/en/resources-library/whitepapers/9-reasons-why-microsoft-customers-choose-mobileiron">here</a>. To find out more about how MobileIron can provide a comprehensive UEM solution that fits your needs, contact a MobileIron Sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> </div> </div> </div> </div> Wed, 15 Jan 2020 20:56:02 +0000 sraikow 2486 at https://www.mobileiron.com Why Your Frontline Worker is Your MOST IMPORTANT Employee https://www.mobileiron.com/en/blog/why-frontline-worker-is-most-important-employee <span>Why Your Frontline Worker is Your MOST IMPORTANT Employee</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 01/13/2020 - 12:19</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-frontline-worker-is-most-important-employee" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-frontline-worker-is-most-important-employee&amp;title=Why%20Your%20Frontline%20Worker%20is%20Your%20MOST%20IMPORTANT%20Employee" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Why%20Your%20Frontline%20Worker%20is%20Your%20MOST%20IMPORTANT%20Employee&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-frontline-worker-is-most-important-employee" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/03-frontline-workers/blog-inline-image.jpg" width="656" height="290" alt="Frontline Workers" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>We see frontline workers every day, but we don’t always recognize their importance. They are the face of every business, and the first and last person many customers interact with during their journey. Frontline workers are how your customers engage with you outside your walls. </p> <p>Let’s examine three frontline workers that change the world daily.</p> <p>Nurses: Everyone has encountered nurses at some point in their lives, starting with birth and progressing through routine check-ups and the occasional medical emergency. Nurses are on the front line of the medical industry, yet they are often overworked and underappreciated. In a <a href="https://www.myamericannurse.com/2019-nursing-trends-and-salary-survey-results/">recent survey by the American Nurses Association</a>, 58% of nurses say their workload has increased in the last 12 months. This means that they are forced to get more done and need tools to improve productivity. One way that nurses can accomplish this is with mobile fleet management solutions that allow immediate bedside access to patient files. This can save countless hours and improve patient outcomes. MobileIron can ensure access to these files is immediate, and secure.</p> <p>Retail workers: Some of us love shopping, while others detest it. Whichever category you fall into, it helps if your shopping experience is efficient, hassle free, and possibly even fun. Retail salespeople drive this experience and can make shopping a positive customer engagement, or a negative one that causes a shopper never to return. These retail employees need tools to help customers find what they are looking for, search current inventory, and even complete transactions without waiting in a checkout line. These are all experiences that a MobileIron-enabled retail worker can provide.</p> <p>Transportation employees: Travel for vacation can be something we look forward to all year while business travel is often dreaded. In <a href="https://www.ustravel.org/press/survey-flying-worse-five-years-ago-christmas-most-frustrating-travel-season-most-americans-say">a recent survey from the American Travel Association</a>, Americans skipped 32 million trips last year because they hate flying. The days of wearing suits and cocktail attire to fly the friendly skies has long since passed. However, that doesn’t mean that transportation employees still can’t provide a great customer experience. Mobile-enabled coach and train workers can check in passengers and their bags curbside, and an automated kiosk can do the same for air passengers. These tools, empowered by MobileIron, provide a level of efficiency that improves the customer experience and drives repeat business.</p> <p>These are just three examples of frontline workers who assist customers, provide care, and drive efficiency every day. Because of their direct and frequent contact with the end customer, the frontline worker is the most important employee.</p> <p>Learn more about frontline workers and frontline security in our new ebook, “<a href="https://www.mobileiron.com/en/resources-library/whitepapers/ultimate-guide-to-frontline-worker-success">The Ultimate Guide to Frontline Worker Success.</a>”</p> <p> </p> </div> </div> </div> </div> Mon, 13 Jan 2020 20:19:43 +0000 sraikow 2484 at https://www.mobileiron.com The emerging risks of 5G https://www.mobileiron.com/en/blog/emerging-risks-of-5g <span>The emerging risks of 5G</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 01/09/2020 - 09:03</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femerging-risks-of-5g" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femerging-risks-of-5g&amp;title=The%20emerging%20risks%20of%205G" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=The%20emerging%20risks%20of%205G&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femerging-risks-of-5g" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/02-5g-risks/blog-inline-image.jpg" width="656" height="290" alt="The emerging risks of 5G" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><h4>The stage is being set for a 5G planet</h4> <p>Blazing fast wireless 5G networks are already beginning to pop up in a few major metropolitan areas in the U.S. and across Asia and Europe. Although the promise of 10 Gbps and 20 Gbps speeds is enticing, we shouldn’t get too excited just yet. It could take many years for 5G to become ubiquitous, since the technology requires a very high density of antennas or “small cells.” Another huge benefit of 5G is low latency -- not only is it faster, but there is much less lag or delay, which can be really important when it comes to guiding self-driving cars for example.</p> <p> </p> <h4>The enterprise will likely be the biggest early benefactor of 5G</h4> <p>Although there is a lot of pent-up demand for higher speeds among consumers, it’s the enterprise that may reap the initial benefits of 5G. Companies like Verizon, AT&amp;T, and T-Mobile are banking that “network slicing” is going to be a hot new product in their portfolio, and there are some good reasons why. Just like fiber in the ground can be divided into wavelengths and sold as virtual networks, 5G frequency can also be “sliced” into different segments to be sold to different industries. These network slices can have different characteristics. For instance, a low latency slice might be sold to a hospital performing robotic surgeries. Or, a less-expensive, slower pipe could be sold for an IoT application like a smart vending machine that only needs to report inventory once a day.</p> <p>What has really captured carriers’ interests is 5G’s potential to replace traditional last-mile technologies. Capital intensive infrastructure investments like Fiber-to-the-Curb can now be superseded by 5G. The technology does require a significant investment from the carriers, since a higher frequency is deployed, which doesn’t travel as far. Instead of traditional cell towers, mobile operators will need to deploy many “small cells,” and they will need to deploy a lot of them. Small cell density translates to greater speed for the enterprise. It’s faster than Wi-Fi, and many employees may opt to connect to the company 5G network over Wi-Fi because of that.</p> <p> </p> <h4>But is it safe?</h4> <p>In fact, 5G has been heralded as the most secure cellular technology to date, but some recent well-publicized exploits shouldn’t be ignored. The <a href="https://www.3gpp.org/">3GPP</a> governing body that maintains the 5G specification is already <a href="https://www.darkreading.com/mobile/5g-standard-to-get-new-security-specifications/d/d-id/1335735">amending the security stack for 5G</a> based on some <a href="https://www.itprotoday.com/mobile-management-and-security/black-hat-2019-promise-5g-also-brings-security-concerns">recent findings published at Blackhat.</a> Researchers discovered that both 4G LTE and 5G networks called for unencrypted transmittal of device capabilities that could leave devices susceptible to Man-in-the-Middle (MiTM) attacks. More recently, a tool developed by university researchers called <a href="https://www.mobileiron.com/en/blog/5greasoner-5g-vulnerabilities">5G Reasoner</a> brought to light many more potential security issues with the 5G protocol.  Hardening the security protocols around 5G is a smart thing to do before deployments are widespread, but it is alarming that exploits are appearing long before 5G networks have reached mainstream deployment.</p> <p> </p> <h4>Homeland Security and 5G<strong><u> </u></strong></h4> <p>“<em>Compromised devices may provide malicious actors with persistent access to 5G networks and the capability to intercept data that routes through the devices” </em>- U.S. Dept. Of Homeland Security</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2020/02-5g-risks/photo-1.png" width="100%" /></p> <p> </p> <p>In a leaked memo, some members of the Department of Homeland Security argued for a nationalized 5G network to mitigate potential security risks. Their concerns about 5G vulnerabilities are <a href="https://www.dhs.gov/publication/overview-risks-introduced-5g-adoption-united-states">highlighted in this recent public report</a>, and outlined below:</p> <ul><li><strong>Supply Chain</strong> Some of the biggest manufacturers of the equipment that runs 5G networks are from “untrusted” nations.</li> <li><strong>Network Risks </strong>At its inception, 5G networks will be closely tied into 4G networks, and will inherit some of the risks involved with 4G in addition to those found in 5G. As noted earlier, <a href="https://www.itprotoday.com/mobile-management-and-security/black-hat-2019-promise-5g-also-brings-security-concerns">researchers at BlackHat already announced </a>some early 5G vulnerabilities in the form of a mobile network mapping exploit, where a hacker could potentially gain details about a device such as the type and OS of a device, and more importantly, the location.</li> <li><strong>Network Deployment </strong>We already mentioned there are going to be many more small cells than traditional 4G towers, and that means there are more opportunities for a cell to be misconfigured in a way that leaves it open to an exploit. With so many cells out there, it may also be easier to run a rogue small cell without being discovered.</li> <li><strong>Loss of Competition and Trusted Options </strong>This risk affects carriers that may be locked into contracts with untrusted suppliers because of proprietary technology components. Since 5G will initially be intermingled with 4G, mobile operators may be locked into making choices that can compromise the security of their networks. <strong> </strong></li> </ul><p> </p> <h4>How to mitigate 5G risks</h4> <p>As technology evolves beyond the traditional boundaries of corporate perimeters, they can no longer be certain of the integrity of the network. Organizations need to shift their focus to embrace an approach of never trusting, always verifying the endpoints that access these networks. That means taking a layered approach to security. Is the device on the 5G network compromised? Is it being targeted in a MiTM attack? If the device is untrusted, should it be able to access company content, whether it resides on the device, in the company network, or in the cloud?</p> <p>While we don’t know a lot about the risks that will emerge with 5G, a mobile-centric <a href="https://go.forrester.com/blogs/category/zero-trust/">Zero Trust</a> approach to security can mitigate many of the risks. Zero trust assumes that bad actors are already in the network and secure access is determined by a “never trust, always verify” approach. A mobile-centric, zero trust approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to any device or user. It ensures only authorized users, devices, apps, and services can access business resources.</p> <p> </p> <h4>Make sure your company is ready for 5G</h4> <p><a href="https://www.mobileiron.com/en/products/uem">MobileIron UEM</a>, and complementary products such as <a href="https://www.mobileiron.com/en/products/access">MobileIron Access</a> and <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">MobileIron Threat Defense</a>, can help protect your company as you begin your journey into the 5G era. For more information, please click <a href="https://info.mobileiron.com/ContactUs.html">here </a>to have a MobileIron representative reach out to you, or click <a href="https://info.mobileiron.com/30_Day_Trial.html">here</a> to begin a free 30-day trial of MobileIron Cloud UEM.</p> </div> </div> </div> </div> Thu, 09 Jan 2020 17:03:23 +0000 sraikow 2481 at https://www.mobileiron.com Security, Passwordless Authentication and Open Ecosystem are Key Reasons To Select MobileIron over Microsoft https://www.mobileiron.com/en/blog/why-microsoft-customers-choose-mobileiron-part-2 <span>Security, Passwordless Authentication and Open Ecosystem are Key Reasons To Select MobileIron over Microsoft</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 01/06/2020 - 10:30</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-2" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-2&amp;title=Security%2C%20Passwordless%20Authentication%20and%20Open%20Ecosystem%20are%20Key%20Reasons%20To%20Select%20MobileIron%20over%20Microsoft" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Security%2C%20Passwordless%20Authentication%20and%20Open%20Ecosystem%20are%20Key%20Reasons%20To%20Select%20MobileIron%20over%20Microsoft&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-2" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/01-msft-key-reasons/blog-inline-image.jpg" width="656" height="290" alt="Key Reasons To Select MobileIron over Microsoft" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Continuing on the topic of <a href="https://www.mobileiron.com/en/blog/why-microsoft-customers-choose-mobileiron-part-1">why customers choose MobileIron to solve Unified Endpoint Management (UEM) use cases</a>, this blog discusses <strong><em>Zero Trust Security</em></strong>, <strong><em>Passwordless Authentication</em></strong> and an <strong><em>Open Partner Ecosystem</em></strong> as three additional reasons.</p> <p> </p> <h4><strong>1. Demand all-in-one zero trust security</strong></h4> <p>Today’s modern digital workplace is more dynamic than ever before. Business data is available on a variety of devices, apps, networks and clouds, including those your organization doesn’t manage.  You need a security platform that will protect your data the ways it’s being accessed and used—no matter where it is, or who owns the devices and services involved.</p> <p> </p> <p><strong>Enter mobile-centric, zero trust security</strong></p> <p>When secure access is determined by a “never trust, always verify” approach, that’s mobile-centric, zero trust security. It requires verifying the device, user, apps, networks and presence of threats before granting access—with constant enforcement.</p> <p> </p> <p align="center"><img alt="Photo" src="https://www.mobileiron.com/sites/default/files/Blog/2020/01-msft-key-reasons/photo-1.png" width="987" /></p> <p> </p> <p>MobileIron helps transform your device into your secure ID, enabling secure access to the enterprise. These critical capabilities lay the groundwork for the expanded business use cases that Intune can’t support.</p> <p> </p> <p><strong>Microsoft falls short today</strong></p> <p><strong>A. Unable to address key security and compliance requirements</strong></p> <p>Government organizations and many regulated industries have stricter security and compliance requirements that they must meet. MobileIron supports the following certifications that Microsoft currently does not support:</p> <ul><li>FIPS 140-2 validated container CONTAINER</li> <li>Common Criteria for MDMP V3.0</li> <li>DISA STIG</li> <li>CCN-ENS, Level High</li> </ul><p><strong>B. Full protection with privacy</strong></p> <p>Our per-app VPN provides a clear distinction between personal and work by surrounding only corporate apps, not employees’ personal ones. You get to secure access to corporate apps and services—on-premises and/or in the cloud—on iOS, macOS, Android and Windows 10 devices. With Microsoft you need a separate VPN, requiring additional dollars and third-party vendors to provide this capability.</p> <p><strong>C. Activation and protection against Mobile Threats</strong></p> <p>MobileIron’s on-device, MobileIron Threat Defense is automatically activated when it’s enrolled for 100% adoption. Microsoft Defender is available, but the end-user/admin must activate it, resulting in elevated risk.</p> <p><strong>D. More device, threat and network signals</strong></p> <p>MobileIron provides a more robust conditional access for a zero sign-on experience with minimal friction to the end-user experience. It looks at many additional signals such as user, device compliance posture, app posture, network, threats and more before granting access.</p> <p> </p> <h4><strong>2. Eliminate passwords today with Zero Sign-On</strong></h4> <p>The number of systems and apps businesses use is on the rise—each requiring its own secure authentication. Relying on passwords is not only frustrating for users, but a burden on IT. Passwords are also notoriously insecure. MobileIron combines zero sign-on capabilities with a mobile-centric, zero trust approach that automatically validates every user, device, app, network, and threats before greenlighting access —without requiring a password.</p> <p> </p> <p align="center"><img alt="Photo" src="https://www.mobileiron.com/sites/default/files/Blog/2020/01-msft-key-reasons/photo-2.jpg" width="987" /></p> <p> </p> <p>Microsoft’s attempt at passwordless approach falls short.</p> <ul><li>Focused on the desktop, around limited versions of Windows 10.</li> <li>Even though Windows Hello has been available since 2015, its adoption has been low as it requires companies to buy into a Microsoft lock-in strategy.</li> <li>For macOS and Windows, Microsoft Intune requires a separate app to install, pair and register, which leads to a poor end-user experience.</li> <li>Reliant on passwords for iOS and Android apps.</li> </ul><p> </p> <h4><strong>3. More technology integrations than any other UEM solution</strong></h4> <p>No one vendor or solution can completely and securely address all the complex needs of today’s modern digital workplace. You need to choose the right tools and best-of-breed solutions to properly secure the way your employees want and need to work.</p> <p> </p> <p align="center"><img alt="Photo" src="https://www.mobileiron.com/sites/default/files/Blog/2020/01-msft-key-reasons/photo-3.jpg" width="987" /></p> <p> </p> <p>It’s critical that your security platform uses a standards-based approach and natively integrates with a wide set of IT systems that allows you to leverage your existing stack as well customize. Organizations that choose MobileIron UEM realize tighter integration that MobileIron has created with our over 385+ ecosystem partners, including ServiceNow, Splunk and many more.</p> <p> </p> <p align="center"><img alt="Photo" src="https://www.mobileiron.com/sites/default/files/Blog/2020/01-msft-key-reasons/photo-4.jpg" width="987" /></p> <p> </p> <p> </p> <h4><strong>Get Started Now</strong></h4> <p>To learn more and avoid getting trapped by the limitations of Microsoft Intune, read our e-book <a href="https://www.mobileiron.com/en/resources-library/whitepapers/9-reasons-why-microsoft-customers-choose-mobileiron">here</a>. To find out more about how MobileIron can provide a comprehensive UEM solution that fits your needs, contact a MobileIron Sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> </div> </div> </div> </div> Mon, 06 Jan 2020 18:30:05 +0000 sraikow 2473 at https://www.mobileiron.com Make an informed choice for macOS management and security https://www.mobileiron.com/en/blog/macos-management-comparison-guide <span>Make an informed choice for macOS management and security </span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Fri, 12/20/2019 - 09:13</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmacos-management-comparison-guide" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmacos-management-comparison-guide&amp;title=Make%20an%20informed%20choice%20for%20macOS%20management%20and%20security%20" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Make%20an%20informed%20choice%20for%20macOS%20management%20and%20security%20&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmacos-management-comparison-guide" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/macos-management-and-security/blog-inline-image.jpg" width="656" height="290" alt="Make an informed choice for macOS management and security " typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>As the adoption of Macs in today’s enterprise increases and use cases expand, IT teams must reconsider their approach to endpoint security and management. We are seeing a growing trend within our large customer base where niche Mac management products are being replaced by comprehensive <a href="https://www.mobileiron.com/en/unified-endpoint-management/operating-systems/mac-os">unified endpoint management (UEM)</a> solutions.</p> <p>Evaluating solutions to solve today’s modern digital workplace use cases, including macOS, needs a thorough approach with risk and security at its core. Leveraging a unified security and management platform that spans all devices and apps that drive productivity in today’s digital workplace and provides a better admin and user experience while reducing cost and complexity is a reality now.</p> <p>Gartner published a report, “<a href="https://www.gartner.com/document/3904269">Solution Comparison for Four macOS Management Systems,” Michael Disabato, 11 March 2019, ID: G007373520</a>. We believe this report provides a framework to guide you in your journey and make an informed choice.</p> <p>For this report, Gartner compared solutions using the assessment criterion listed below:</p> <p><strong>Endpoint and application management:</strong><br /> Data-at-rest encryption<br /> Endpoint protection<br /> Endpoint firewall<br /> Apple Business Manager Device Enrollment Program (DEP)<br /> Apple Business Manager Volume Purchase Program (VPP)<br /> Local distribution point<br /> App distribution</p> <p><strong>Unmanaged device support:</strong><br /> Device management<br /> Content separation<br /> Privacy settings<br /> Limit administrator actions<br /> Actions taken on personally owned devices</p> <p><strong>System integration:</strong><br /> Incident management<br /> Security information and event management (SIEM) integration<br /> Log report</p> <p><strong>Adaptive access and access management:</strong><br /> Depth of integration<br /> Breadth of integration<br /> Active Directory (AD) integration<br /> Built-in adaptive and conditional access capabilities<br /> Authentication methods<br /> Single sign-on (SSO)<br /> Group-based policies</p> <p><strong>Certificate management:</strong><br /> Certificate authority (CA) integration<br /> Certificate revocation<br /> Certificate provisioning</p> <p>In the report Gartner has provided comparison data for the assessed solutions, “the criteria are scored on a Gartner-defined scale with values of “None,” “Low,” “Medium,” or “High,” where “High” is best.”</p> <p>As always, we suggest that you prioritize your macOS evaluation criteria based on your specific requirements and use the comparisons from the report to identify the solution that best meets your current digital workplace needs and roadmap.</p> <p>If you are a Gartner client, you can access the report <a href="https://www.gartner.com/en/documents/3904269/solution-comparison-for-four-macos-management-systems">here.</a></p> <p>MobileIron also hosted an informative webinar, “<a href="https://www.mobileiron.com/en/resources-library/webinars/top-5-reasons-to-choose-mobileIron-for-mac-security-and-management"><strong><em>Top 5 reasons to choose MobileIron for Mac security and management</em></strong></a>”, on December 12.</p> <p> </p> <p><a href="https://www.mobileiron.com/en/resources-library/webinars/top-5-reasons-to-choose-mobileIron-for-mac-security-and-management"><img alt="webinar" border="0" src="https://www.mobileiron.com/sites/default/files/Blog/2019/macos-management-and-security/email-banner.jpg" style="max-width:600px;" /></a></p> <p> </p> <p>During this webinar, a panel of security and UEM practitioners shared best practices for Mac security and management.</p> <p> </p> <h4>Get Started with MobileIron today</h4> <p>MobileIron offers a layered security and access model for macOS, which improves operational efficiency and simplifies compliance by making it easy to manage all enterprise endpoints regardless of device model or OS.</p> <p>To find out more about how you can leverage MobileIron for macOS management and more, contact a MobileIron Sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> </div> </div> </div> </div> Fri, 20 Dec 2019 17:13:23 +0000 sraikow 2472 at https://www.mobileiron.com Putting the user experience at the center of mobile security https://www.mobileiron.com/en/blog/putting-user-experience-at-the-center-of-mobile-security <span>Putting the user experience at the center of mobile security</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 12/16/2019 - 17:03</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fputting-user-experience-at-the-center-of-mobile-security" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fputting-user-experience-at-the-center-of-mobile-security&amp;title=Putting%20the%20user%20experience%20at%20the%20center%20of%20mobile%20security" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Putting%20the%20user%20experience%20at%20the%20center%20of%20mobile%20security&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fputting-user-experience-at-the-center-of-mobile-security" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/putting-user-experience/blog-inline-image.jpg" width="656" height="290" alt="Putting the user experience at the center of mobile security" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>These days, the <a href="https://www.mobileiron.com/en/mobile-security-products" title="mobile security">mobile security</a> industry talks a lot about the need to “focus on the user experience.” As security professionals, we know that if your users can’t quickly and easily access the applications and data they need to do their jobs, then nothing else matters from a business perspective. At the same time, if users have to go around corporate security obstacles to get the content they need, that behavior could be putting your organization at risk.</p> <p>Why should we care about the user experience so much? Because without user buy-in, the mobile enterprise security net falls apart — and it only takes one security lapse to result in a serious data breach.</p> <p>Consider this: Every endpoint and user across your organization represents a potential vulnerability because the enterprise perimeter no longer exists and the edge is everywhere. So if a user is working on an untrusted device, app, or network — anywhere in the world — you need a way to bring those things into compliance to ensure that only trusted users can access enterprise data through secured devices, apps, networks, and clouds.</p> <p>At MobileIron, we understand that protecting company resources is ultimately IT’s job — not the end user’s. Mobile employees shouldn’t have to wonder if a corporate email attachment is infected with malware or if the link sent from the CEO might drive to a malicious site. It’s our job as security experts to take that worry away from users so they can focus on staying productive wherever and however they work. Our goal is to make it as easy as possible for mobile workers to get the apps and content they need while keeping security robust yet virtually invisible. That’s why we put the user experience at the center of our design process.</p> <p>So how do we enable that seamless and secure user experience in practice?</p> <p>First we have to understand who exactly we mean by “the user.” At MobileIron, we design for two user audiences:</p> <ol start="1" type="1"><li><strong>Mobile employees</strong>: This may include users such as a sales rep or field worker using on a personally owned device, or a healthcare, retail, or frontline warehouse worker using a corporate-owned device. To get them on board with mobile security, we enable a highly intuitive user experience that goes beyond identity management. To encourage users to enroll their personal devices, we know that it’s also essential to educate users about what IT can and can’t see and manage on their devices. We make it clear that their privacy is our top priority.</li> </ol><ol start="2" type="1"><li><strong>IT admins: </strong>These are the folks on the front line of mobile security. Not only are they responsible for keeping corporate resources safe, they also play a large role in deploying mobile security in a way that minimizes any impact on end-user productivity. Making their jobs easier leads to a successful end-user experience.</li> </ol><p> </p> <h4>The MobileIron design strategy</h4> <p>Our design strategy focuses on helping IT support the mobile user experience without compromising security. That’s why we put the needs of both IT admins and end users at the heart of our design process. We understand that what IT cares about most may not matter at all to other enterprise users. For instance, IT wants to protect users from malicious apps, network threats, and more. Most other users simply want to access mobile resources without any hassles or delays. That’s why we provide innovative capabilities like <a href="https://www.mobileiron.com/en/products/access">zero sign-on (ZSO)</a>, which enables frictionless authentication and better security.</p> <p>Delivering these capabilities requires a customer-centric mindset across the organization, which is why our UX team is focused on understanding what our customers need and want at a granular level. To ensure our products meet a fast-growing and varied customer base, we  conduct thorough UX research to inform every step of our design process, summarized in these five steps:</p> <ol start="1" type="1"><li><strong>Understand the problem.</strong> Our job at this stage is to understand the problem and how it affects both IT admins and end users to ensure the solution is both secure and easy to use. Sometimes there is a conflict between admin requirements and end-user needs, which is often one of the biggest design challenges.</li> </ol><ol start="2" type="1"><li><strong>Research and brainstorm solutions. </strong>After identifying the problem, the UX designer and UX researcher start conducting research for the dashboard to better understand users’ needs and pain points. The UX team then begins brainstorming solutions with product management and engineering teams by leveraging research and similar designs from other products.</li> </ol><ol start="3" type="1"><li><strong>Build and test wireframes.</strong> The UX designer documents the user flow through a series of wireframes. These wireframes are presented to the broader team to select for further testing.</li> </ol><ol start="4" type="1"><li><strong>Test the prototypes. </strong>Test prototypes are selected to identify what works well so the team can narrow down the designs and move forward with one solution. We conduct usability tests with customers and end users to identify potential issues and make design recommendations to improve the prototype. In general, we follow an iterative design process to make sure the prototype is easy to use.</li> </ol><ol start="5" type="1"><li><strong>Refine and finalize the solution. </strong>We tweak the solution with findings from the user study and produce a semi-high-fidelity prototype. Then the designers sync with the broader team again to validate and move the design forward. At this point engineering begins implementing the design. After the feature is launched, we continually gather more user data through tools such as Mixpanel or through research methods such as surveys and interviews.</li> </ol><p>In the world of mobile security, our work is never done. Our UX team continuously reviews how our solutions are performing — not just to meet the needs of end users and IT admins, but to also address the constantly shifting threat landscape.</p> <p>To find out more about how MobileIron can provide a comprehensive <a href="https://www.mobileiron.com/en/products/uem" title="UEM solution">UEM solution</a> that fits your needs, contact a MobileIron sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> </div> </div> </div> </div> Tue, 17 Dec 2019 01:03:18 +0000 sraikow 2471 at https://www.mobileiron.com Flexibility, Heterogeneity and End-User Choice: Key Reasons Why MobileIron over Microsoft https://www.mobileiron.com/en/blog/why-microsoft-customers-choose-mobileiron-part-1 <span>Flexibility, Heterogeneity and End-User Choice: Key Reasons Why MobileIron over Microsoft </span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 12/10/2019 - 12:48</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-1" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-1&amp;title=Flexibility%2C%20Heterogeneity%20and%20End-User%20Choice%3A%20Key%20Reasons%20Why%20MobileIron%20over%20Microsoft%20" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Flexibility%2C%20Heterogeneity%20and%20End-User%20Choice%3A%20Key%20Reasons%20Why%20MobileIron%20over%20Microsoft%20&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-1" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/blog-inline-image.jpg" width="656" height="290" alt="Key Reasons Why MobileIron over Microsoft " typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Last week, MobileIron’s CMO Rhonda Shantz shared the <a href="https://www.mobileiron.com/en/blog/9-reasons-microsoft-customers-choose-mobileiron">nine reasons why Microsoft customers choose MobileIron</a> to solve unified endpoint management (UEM) use cases. Over the coming weeks, I will discuss these reasons in more detail.<strong> </strong></p> <p> </p> <h3><b>1. Flexibility for Cloud, On-Premises and Hybrid Environment</b></h3> <p>First of all, MobileIron gives you and your partners the ability to secure on-premises apps, cloud apps, data, devices and identity – all in one solution.</p> <h4>Unified security platform</h4> <p>Modern enterprises continue to adopt a variety of software-as-a-service (SaaS) apps across every function, including HR, marketing, engineering, sales and more. As organizations shift from on-premises to SaaS and hybrid environments, a unified zero-trust security platform that supports diverse needs is mandatory. Most enterprises have a hybrid environment today, which requires secure and seamless end-user access to all apps – legacy and modern.</p> <p>Don’t rely on restrictive technologies – for example, Microsoft Azure AD conditional access – to support modern authentication for all apps. If an application does not support modern authentication, your only available option is location and requiring multi-factor authentication (MFA). Now, your organization will be at high risk of a security breach by allowing non-verified users continued use of critical apps and data from a non-compliant device.</p> <h4>Operational efficiency and superior administrator experience</h4> <p>MobileIron solutions make it easy for administrators to configure apps that are relevant to their employees and distribute them throughout the entire organization. For example, delegating administration control is a critical capability that provides operational efficiencies when you have offices worldwide, allowing more granular access and control to address the issues and devices relevant to the local environment.</p> <h4>Confidently Embrace Cloud Services</h4> <p>MobileIron gives customers and partners the ability to choose the deployment model they want, such as on-premises, in a data center provided by a partner, or via the cloud. For enterprises migrating their workloads and infrastructure to the cloud, MobileIron allows customers to move devices without any service interruption. This ensures full conformance with industry compliance mandates that you are responsible for.</p> <p> </p> <h3><b>2. The Modern Enterprise Stack is Heterogeneous: It’s not a Microsoft only world</b></h3> <p>At first blush, Microsoft’s integration may appear to be tighter; even if true, it is only with their own solutions. For today’s widely deployed best-of-breed SaaS and on-premises apps and services, the end-user experience with Microsoft Intune is underwhelming. Companies often want to keep their best-of-breed solutions – including email, office collaboration (Slack), identity (Ping, Okta), security, mobility and device infrastructure – because they have already worked through the implementation cycle.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-1.jpg" width="100%" /></p> <p> </p> <p>Microsoft’s approach, however, effectively locks out best-of-breed tools. On the flip side, organizations that rely on Microsoft for everything may be forced into the perpetual upgrades in Microsoft’s technology roadmap. Are you ready for Microsoft to lock your company’s operational and security direction now and in the future?</p> <p>If you lock yourself into Microsoft for everything from OS and CRM to collaboration, sharing, anti-malware and identity for your mobility and device infrastructure, you will not have many options with each renewal. You will soon realize that a Microsoft-only world also becomes very small and your ability to service your stakeholders rapidly shrinks.</p> <p> </p> <h3><b>3. End-user experience and choice matter</b></h3> <p>When user choice and end user experience matters, customers chose MobileIron for simpler onboarding, best on device experience, and best admin UI.</p> <p>MobileIron makes it possible for IT to enable employees to use any device with any app from any vendor, unlike Microsoft Intune, which limits IT and user choice. For example, Microsoft currently doesn’t support Android devices with a managed personal profile, frontline workers, or Samsung and Zebra devices with firmware over-the-air capabilities that are adopted by line of business (LOB) leaders from transportation, utility, communications, manufacturing, oil and gas industries.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-2.jpg" width="100%" /></p> <p class="foot_note">Courtesy: Honeywell</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-3.jpg" width="100%" /></p> <p class="foot_note">Courtesy: Zebra</p> <p> </p> <p>Choice of using and supporting Apple devices with macOS/iOS/tvOS requires full native support and control. MobileIron is the best solution for organizations that need to manage devices beyond Windows and iOS by supporting all possible end-user device use cases.</p> <p> </p> <p><img alt="photo" height="253" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-4.jpg" width="100%" /></p> <p class="foot_note">Courtesy: Oculus for Business</p> <p> </p> <p>If providing employees device and app choice matters to your organization as much as the seamless experience to access them, you need to look at your options differently. That’s where MobileIron excels and provides the best approach. From simple and scalable onboarding to the best on-device experience, our solutions offer flexibility for productivity that affects the bottom line.</p> <p> </p> <h3><b>Address the needs of your Modern Digital Workplace</b></h3> <p>Allowing users to work from any device, using any app, from any location, over any network is key to the success of the Modern Digital Workplace. Security that empowers IT and security leaders to secure business data across any device and app that employees choose – without affecting the user experience – is now a must. If security gets in the way of productivity, your users will find a way around it, and it won’t be a secure one.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-5.jpg" width="100%" /></p> <p> </p> <p>This diagram above shows the continuum of two critical forces at play in a modern enterprise: productivity and security. The more advanced controls you have, the stronger your security as you head toward Zero Trust. The more flexibility you have with apps and services that improve productivity, the closer you are to becoming a Modern Digital Workplace.</p> <p> </p> <h3><b>Get Started Now</b></h3> <p>To learn more about the challenges of switching to a Microsoft-only bundle, read our e-book <a href="https://www.mobileiron.com/en/resources-library/whitepapers/9-reasons-why-microsoft-customers-choose-mobileiron">here</a>. To find out more about how MobileIron can provide a comprehensive UEM solution that fits your needs, contact a MobileIron sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> <p> </p> </div> </div> </div> </div> Tue, 10 Dec 2019 20:48:58 +0000 sraikow 2468 at https://www.mobileiron.com