Blogs https://www.mobileiron.com/en/blog/rss.xml/all?field_blog_taxo_target_id=All en MobileIron Receives High Scores for 2019 Gartner Critical Capabilities for Unified Endpoint Management Tools https://www.mobileiron.com/en/blog/2019-critical-capabilities-uem <span>MobileIron Receives High Scores for 2019 Gartner Critical Capabilities for Unified Endpoint Management Tools </span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 10/17/2019 - 16:47</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2019-critical-capabilities-uem" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2019-critical-capabilities-uem&amp;title=MobileIron%20Receives%20High%20Scores%20for%202019%20Gartner%20Critical%20Capabilities%20for%20Unified%20Endpoint%20Management%20Tools%20" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%20Receives%20High%20Scores%20for%202019%20Gartner%20Critical%20Capabilities%20for%20Unified%20Endpoint%20Management%20Tools%20&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2019-critical-capabilities-uem" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/2019-critical-capabilities-uem/blog-inline-image.jpg" width="656" height="290" alt="MobileIron Receives High Scores for 2019 Gartner Critical Capabilities for Unified Endpoint Management Tools " typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Gartner recently released the <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-critical-capabilities-uem" title="Gartner Critical Capabilities UEM 2019 Report">2019 Gartner Critical Capabilities for Unified Endpoint Management Tools</a> report, which is a companion document to the <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-magic-quadrant-for-unified-endpoint-management">2019 Gartner Magic Quadrant for Unified Endpoint Management Tools</a> report in which MobileIron was named a Leader.</p> <p>Based on analysis of key market trends such as modern management, the increase in adoption of macOS devices, compliance and security requirements, mobile application management (MAM) on unmanaged devices and more, Gartner has identified four common <a href="https://www.mobileiron.com/en/products/uem">Unified Endpoint Management (UEM)</a> use cases from end-user organizations. </p> <p>We’re excited to share with you that MobileIron, a proven leader for UEM has scored high in all the four use cases listed below! </p> <ul><li>PC Management </li> <li>Nontraditional Device Management </li> <li>Highly Secure and Regulated Industries </li> <li>Unmanaged Devices/BYO </li> </ul><p>In the report, MobileIron has received high rating for key critical capabilities which helps customers solve additional security, macOS and Windows management use cases:</p> <ul><li>Secure Access and Identity </li> <li>Modern Management of Windows</li> <li>Management of macOS </li> </ul><p> </p> <h3>We are honored to have been recognized for our focus on security-minded buyers </h3> <p>MobileIron has redefined enterprise security with the industry’s first mobile-centric, zero trust platform to secure access and protect data across the perimeter-less enterprise. The MobileIron security platform is built with UEM as its foundation with additional zero trust-enabling technologies, including <a href="https://www.mobileiron.com/en/products/access">zero sign-on (ZSO),</a> multi-factor authentication (MFA), and <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">mobile threat defense (MTD).</a></p> <p>Our products and services have been validated against an extensive set of industry and government security standards and certifications providing customers a high degree of confidence to solve common UEM cases as well as advanced security and identity use cases.</p> <p> </p> <p><img alt="Certifications" src="https://www.mobileiron.com/sites/default/files/Blog/2019/2019-critical-capabilities-uem/certifications.png" width="100%" /></p> <p> </p> <h3>Our customers love the breadth and depth of our products and solutions</h3> <p><img alt="Gartner peer insights" src="https://www.mobileiron.com/sites/default/files/Blog/2019/2019-critical-capabilities-uem/peer-insights.png" width="20%" /></p> <p>MobileIron has been recognized by Gartner as an <a href="https://www.gartner.com/reviews/customers-choice/unified-endpoint-management-tools/Apr-2019">April 2019 Gartner Peer Insights Customers’ Choice for Unified Endpoint Management tools</a>, for the second time in a row.</p> <p> </p> <p><a href="https://www.gartner.com/reviews/review/view/1025713"><strong>Everything a company needs to be UEM ready for now and in the future!</strong></a><br /> — Application Manager in the Government Industry on Sept. 13, 2019</p> <p><strong><a href="https://www.gartner.com/reviews/review/view/922936">Strong UEM strategic vision, robust partnerships, and ease of implementation</a></strong><br /> — End Point Solutions Architect in the Healthcare Industry on June 4, 2019</p> <p><strong><a href="https://www.gartner.com/reviews/review/view/997048">One of the must-have solutions for all Cloud Based IT Operations.</a></strong><br /> — IT Service Manager in the Miscellaneous Industry on Aug. 10, 2019</p> <p><strong><a href="https://www.gartner.com/reviews/review/view/1015000">Our Mobile Devices are now secure and end users don't have to be concerned at all</a></strong><br /> — Software Analyst in the Miscellaneous Industry on Aug. 30, 2019</p> <p> </p> <h3>Customers prefer our UEM solutions over consolidating incumbent tools </h3> <p>Since our first product release more than 13 years ago, more than 19,000 customers, including the world’s largest financial institutions, intelligence agencies and other highly regulated companies, have chosen MobileIron to enable a seamless and secure user experience by ensuring only authorized users, devices, apps, and services can access business resources.</p> <p> </p> <p><img alt="Customers" src="https://www.mobileiron.com/sites/default/files/Blog/2019/2019-critical-capabilities-uem/logos.png" width="100%" /></p> <p> </p> <h3>Get Started with MobileIron Today</h3> <p>Download the Gartner Critical Capabilities for Unified Endpoint Management Tools <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-critical-capabilities-uem" title="Gartner Critical Capabilities UEM 2019 Report">here</a>. If you’d like to learn more about MobileIron UEM, please visit <a href="https://www.mobileiron.com/en/products/uem">here</a>. </p> <p> </p> <hr /><p> </p> <p><em>The Gartner Peer Insights Customers’ Choice badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates. </em></p> </div> </div> </div> </div> Thu, 17 Oct 2019 23:47:12 +0000 sraikow 2316 at https://www.mobileiron.com Impressions from the Made by Google Event https://www.mobileiron.com/en/blog/google-pixel-4-announcement <span>Impressions from the Made by Google Event</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 10/15/2019 - 15:20</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fgoogle-pixel-4-announcement" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fgoogle-pixel-4-announcement&amp;title=Impressions%20from%20the%20Made%20by%20Google%20Event" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Impressions%20from%20the%20Made%20by%20Google%20Event&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fgoogle-pixel-4-announcement" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/made-by-google-event/blog-inline-image.jpg" width="656" height="290" alt="Impressions from the Made by Google Event" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Today, I tuned in to watch the “Made by Google” event, and below are some of my quick thoughts on what was unveiled.</p> <p>The new Pixel 4 and Pixel 4 XL phones look cool. They are the first phones to include a radar sensor, which is impressive. The new sensor allows people to control their phones through simple gestures and swipes through the air. It also dramatically reduces the amount of time it takes to face unlock, as the radar-based technology can tell when you’re reaching for your phone and get ready to scan your face before being brought into view.</p> <p>As a security professional, I couldn’t help but think about the privacy concerns of this new feature that detects motion, but it was reassuring to hear that Google built in privacy from the start. The Motion Sense feature can be turned off at any time. Data collected from the sensor is also processed and stored on the device’s Titan M security chip, and never saved or shared with other Google services.</p> <p>The Titan M security chip powers privacy and security features across Google’s hardware portfolio, including the new Pixel devices. For example, Verified Boot ensures that the most current, secure version of Android is running and prevents malware from gaining access to a device’s lower software-levels after an upgrade. The Titan M chip also powers strong encryption features and creates private keys for third-party apps and payments.</p> <p>It was great to see Google introduce further updates to its Titan M security chip and offer more controls to protect sensitive data today. For example, Google introduced new options for disabling mics and sensors, and deleting Google Assistant data.</p> <p>In conclusion, there were a lot of new devices and features introduced today. We’re excited to manage, secure, and provide zero sign-on capabilities to the new Pixel 4 and Pixel 4 XL devices. We expect to see a lot of these phones in our customer deployments beginning later this month.</p> <p>To learn more about Android device management, please visit <a href="https://www.mobileiron.com/unified-endpoint-management/operating-systems/android-device-management">here</a>.</p> </div> </div> </div> </div> Tue, 15 Oct 2019 22:20:31 +0000 sraikow 2312 at https://www.mobileiron.com Top trends driving modernization across the federal government https://www.mobileiron.com/en/blog/federal-government-security-trends <span>Top trends driving modernization across the federal government</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 10/10/2019 - 12:40</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffederal-government-security-trends" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffederal-government-security-trends&amp;title=Top%20trends%20driving%20modernization%20across%20the%20federal%20government" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Top%20trends%20driving%20modernization%20across%20the%20federal%20government&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffederal-government-security-trends" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/top-tech-fed-gov/blog-inline-image.jpg" width="656" height="290" alt="Top Trends Driving Modernization Across the Federal Government" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Gartner has identified and published a report on the <a href="https://www.gartner.com/en/newsroom/press-releases/2019-10-19-gartner-identifies-top-10-government-technology-trend?source=BLD-200123&amp;utm_medium=social&amp;utm_source=bambu&amp;utm_campaign=SM_GB_YOY_GTR_SOC_BU1_SM-BA-PR">top 10 government technology trends for 2019-2020</a>. These trends have the potential to drive modernization across the federal government. </p> <p>In the Gartner report, there is a focus on making more e-government services available directly to citizens. This is partially in response to OMB 19-17 and NIST 800-63-3; these OMB and <a href="/en/datasheet/MobileIron-support-for-NIST-SP-800-171" title="NIST standards">NIST standards</a> are driving agencies to provide strong identity assurance and authentication, leverage federation standards and protect citizen privacy, all at the same time. </p> <p>Gartner describes citizen digital identity as “the ability to prove an individual’s identity via any government digital channel that is available to citizens.” Gartner also stresses that citizens expect omni-channel access, and the same user experience no matter how they choose to interact with government. This doesn’t surprise me, as the same is true in the enterprise; employees expect that enterprise technology will be easy to consume and highly secure, while delivering a seamless experience.</p> <p>To be successful, government digital services will have to be intuitive, frictionless, and highly secure. The Gartner report cites a <a href="https://martechseries.com/analytics/granicus-releases-report-citizen-engagement-across-top-digital-channels/">2018 survey</a> indicating that more than half of all e-services transactions originate from mobile devices. It’s clear that enabling mobility for both citizens and employees is crucial to driving engagement, adoption, satisfaction and retention. </p> <p>As government organizations become increasingly dependent on mobile platforms, they also need to ensure that their data is protected. Mobile and cloud technologies are eroding the traditional network perimeter and introducing countless new threat vectors to government organizations. In 2018, <a href="https://www.zdnet.com/article/mobile-malware-attacks-are-booming-in-2019-these-are-the-most-common-threats/">50% of all cyberattacks targeted mobile devices</a>, and that number is rapidly increasing as nation states and organized attacks are becoming increasingly sophisticated. </p> <p>A mobile-centric zero trust approach deals with the security challenges posed by the perimeter-less government agency while also allowing agility and anytime access. It provides the visibility and IT controls needed to secure, manage and monitor every device, user, app, and network being used to access data. A mobile-centric zero trust approach also provides on-device detection and remediation of threats. </p> <p>Check out the <a href="https://www.gartner.com/en/newsroom/press-releases/2019-10-19-gartner-identifies-top-10-government-technology-trend?source=BLD-200123&amp;utm_medium=social&amp;utm_source=bambu&amp;utm_campaign=SM_GB_YOY_GTR_SOC_BU1_SM-BA-PR">Gartner report</a>, and <a href="https://info.mobileiron.com/ContactUs.html">let’s talk</a> about how to bring your agency into alignment with the NIST guidelines and the expectations of your employees and the citizens you serve. To learn more about MobileIron’s zero trust platform, built on a foundation of unified endpoint management (UEM) capabilities, please visit <a href="https://www.mobileiron.com/en/products/uem">here</a>.</p> </div> </div> </div> </div> Thu, 10 Oct 2019 19:40:56 +0000 sraikow 2306 at https://www.mobileiron.com Zero Password Authentication: The Secure Fast-Track to Accessing Enterprise Data https://www.mobileiron.com/en/blog/zero-password-authentication <span>Zero Password Authentication: The Secure Fast-Track to Accessing Enterprise Data</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Wed, 10/09/2019 - 16:56</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fzero-password-authentication" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fzero-password-authentication&amp;title=Zero%20Password%20Authentication%3A%20The%20Secure%20Fast-Track%20to%20Accessing%20Enterprise%20Data" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Zero%20Password%20Authentication%3A%20The%20Secure%20Fast-Track%20to%20Accessing%20Enterprise%20Data&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fzero-password-authentication" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/zero-sign-on/blog-inline-image.jpg" width="656" height="290" alt="Zero Password Authentication, Passwordless Authentication, Zero Sign On vs Single Sign On" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>If you have ever stood in line waiting to get through security at an airport, you have likely seen the CLEAR security program users who are fast-tracked in front of you. With CLEAR, after a short one-time signup process where you verify your identity, provide a fingerprint or eye scan, and show a picture of your face, voilà –you are enrolled. Once enrolled, you can walk through security by placing two fingers on a sensor and facing a camera. No picture identification is required, and your name doesn’t even have to be spoken. Next, you use the same biometric technology to unlock your phone and present a QR code to a scanner, and then your security journey is complete. The advantages of this are clear (no pun intended). The process is secure and smooth; there is only one thing you need – your mobile device.</p> <p>Enterprise security, on the other hand, is often frustrating and disruptive. This is because passwords have good intentions, but bad consequences. According to a <a href="https://www.mobileiron.com/en/resources-library/surveys-and-studies/say-goodbye-to-passwords">recent IDG survey</a>, 6 in 10 employees are disrupted, irritated, frustrated and waste time on passwords. And 90% of security pros have seen unauthorized access attempts as a result of stolen credentials.</p> <p>What if it were possible to apply the same biometric technology and fast-track logic used in the CLEAR airport security program to solve the long-standing overreliance on passwords in the enterprise? When you fly, you are inherently putting your most valuable thing, your life, in the trust of biometrics. If biometric authentication is trusted and effective for airport security, could it be trusted and effective for enterprise security? Could your mobile devices be your ID to access enterprise resources, like it’s your ID to get into the airport? The answers are yes and yes!</p> <p>MobileIron is eliminating passwords, increasing security and giving employees secure fast-track access to enterprise data with its <a href="https://www.mobileiron.com/en/solutions/zero-trust" title="zero trust security platform">zero trust platform</a> and zero sign-on technology. MobileIron’s zero sign-on experience is built on the company’s leading <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management (UEM) platform</a> and powered by the MobileIron Access solution. <a href="/en/products/access" title="Zero Sign On (ZSO)">Zero sign-on</a> eliminates passwords as the method for user authentication, replacing single sign-on (SSO), which still requires at least one username and password. It provides adaptive authentication, including multi-factor authentication (MFA), based on risk.</p> <p>MobileIron’s platform goes beyond identity and access management (IAM) and gateway approaches by utilizing a more comprehensive set of attributes before granting access. It validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to a device or user.</p> <p>As October is National Cybersecurity Awareness Month, I encourage you to rethink your security strategy and say goodbye to passwords. Usher in a new era of user authentication with a mobile ID and zero sign-on experience from any device, any OS, any location, to any service. To learn more, please contact a MobileIron Sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> </div> </div> </div> </div> Wed, 09 Oct 2019 23:56:44 +0000 sraikow 2304 at https://www.mobileiron.com 2020 Presidential Election Security Threats https://www.mobileiron.com/en/blog/2020-election-security <span>2020 Presidential Election Security Threats</span> <span><span lang="" about="/en/user/11084" typeof="schema:Person" property="schema:name" datatype="">jkim</span></span> <span>Fri, 10/04/2019 - 13:49</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2020-election-security" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2020-election-security&amp;title=2020%20Presidential%20Election%20Security%20Threats" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=2020%20Presidential%20Election%20Security%20Threats&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2020-election-security" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/elections-2020-security/blog-inline-image-elections20.jpg" width="656" height="290" alt="2020 Presidential Election Security, Election Security Threats, Voting Hacks" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Microsoft revealed in a <a href="https://blogs.microsoft.com/on-the-issues/2019/10/04/recent-cyberattacks-require-us-all-to-be-vigilant/" target="_blank">blog post</a> that hackers associated with Iran have targeted a 2020 presidential candidate. The threat group, called Phosphorous, made more than 2,700 attempts to identify consumer email accounts belonging to specific Microsoft accounts and then attack 241 of those accounts. The targeted accounts were associated with a presidential campaign, current and former U.S. government officials, journalists and prominent Iranians living outside the country.</p> <p>This attack reinforces that the main threat to the U.S. presidential election is not really on Election Day. Intelligence experts have repeatedly warned us that nation-states, criminals, and political partisans will attack our American election system and American electoral process in 2020. Our country is preparing for these election security issues and elevating 2020 election security by modernizing voting systems and introducing security into many layers of the process, including the recording and tallying of votes.</p> <p>But voting security on the day of the election shouldn’t be our only worry. The attacks by Phosphorous show that nation-states are now involved in cyber attacks at a grand scale. Phishing attacks, spoofing, man-in-the-middle attacks, unmanaged BYOD, and more pose huge risks in the lead up to Election Day. With the proliferation of mobile and cloud technologies, there are more potential access points to be exploited than ever before.</p> <p>Presidential campaign leaders need to ensure that their data is protected, wherever it travels. Zero trust assumes that bad actors are already in the network and grants secure access to resources based on a “never trust, always verify” approach. This approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to a device or user.</p> <p>MobileIron’s mobile-centric zero trust platform addresses the security challenges of the perimeter-less organization while allowing the agility and anytime access that presidential campaign leaders need. MobileIron’s platform is built on the foundation of award-winning and industry-leading <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management</a> (UEM) capabilities with additional zero trust-enabling technologies, including contextual conditional access, zero sign-on (ZSO), multi-factor authentication (MFA), and <a href="/en/products/mobile-threat-defense" title="Mobile Threat Defense">mobile threat defense</a> (MTD).</p> <p>Every campaign leader should immediately implement a <a href="/en/solutions/zero-trust" title="Zero Trust Security">zero trust security framework</a> to ensure only authorized users, devices, apps, and services can access business resources moving forward.</p> </div> </div> </div> </div> Fri, 04 Oct 2019 20:49:27 +0000 jkim 2302 at https://www.mobileiron.com Magisk: Dangers of Rooting your Android Device https://www.mobileiron.com/en/blog/magisk-android-rooting <span>Magisk: Dangers of Rooting your Android Device</span> <span><span lang="" about="/en/user/11084" typeof="schema:Person" property="schema:name" datatype="">jkim</span></span> <span>Thu, 10/03/2019 - 13:44</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmagisk-android-rooting" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmagisk-android-rooting&amp;title=Magisk%3A%20Dangers%20of%20Rooting%20your%20Android%20Device" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Magisk%3A%20Dangers%20of%20Rooting%20your%20Android%20Device&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmagisk-android-rooting" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/magisk-android-rooting/blog-inline-image-magisk.jpg" width="656" height="290" alt="Magisk Android Device Rooting, Dangers of Rooting Android w/ Magisk, Android vulnerabilities" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><h3>What is rooting?</h3> <p>Before we describe Magisk, let’s first define what rooting your Android device is. Rooting is a process that allows the user to gain root access privileges to their Android operating system (OS). It’s comparable to the process of jailbreaking your Apple iOS or iPadOS device. Rooting and jailbreaking grants the user privileges to modify the OEM software and system apps; it allows them to customize their mobile device by installing apps that the manufacturer would normally block. These are apps that are not downloaded from sanctioned app stores like the iOS App Store or Google Play Store.</p> <p> </p> <h3>What is Magisk?</h3> <p>Magisk is a systemless root technique that does not modify any system files within the /system partition. It basically leaves the OEM bootloader files within its logical partition, while it writes rooting libraries and any modifications in a separate partition. So, what does this achieve? The immediate benefit of using a systemless root is it successfully evades Google’s SafetyNet Attestation that checks for device tampering, and block certain popular apps like Android Pay, Netflix, and Pokemon Go from being installed or working properly on the mobile device. Also, normal over-the-air (OTA) updates to the Android system are still permitted since the original system files are still intact.</p> <p>Magisk is a more advantageous alternative to other traditional rooting methods like Chainfire’s SuperSU, which does modify the system files during its installation and is unable to evade the Google SafetyNet checks. This rooting method is persistent over reboots, although it can be removed just by performing a factory reset of the Android device. Other methods require reinstalling the OEM bootloader files.</p> <p>Magisk is also updated very frequently. While Android updates and patches their OS, the developer of Magisk comes out with a root shortly thereafter. For example, there was a Magisk root before Android Q was even released to the public because the beta was used to create the rooting update.</p> <p> </p> <h3>What cool things can I do with Magisk?</h3> <p>Enabling the Magisk Hide feature within Magisk Manager allows the user to select the threat detection apps and evade detection.</p> <ul><li>You can use financial or banking apps</li> <li>You can use Snapchat without any issues</li> <li>You can also play Pokemon Go on your rooted Android device</li> <li>You can install OTA updates on your device</li> <li>You can also install Systemless Xposed framework on your Lollipop and Marshmallow devices.</li> <li>You can use Android Pay</li> <li>You can also bypass Google SafetyNet Attestation checks</li> </ul><p>Source from <a href="https://magiskmanager.com/" rel="nofollow" target="_blank">https://magiskmanager.com/</a>.</p> <p> </p> <h3>Conclusion</h3> <p>The appeal to use the Magisk method to root your Android device may be strong, but the immediate consequences of doing this and installing unsanctioned apps that are not rigorously vetted by the OEM for malicious content hidden in the app is just bad mojo. This is a commonly used threat vector for bad actors to take over your device without you knowing. Enterprises would not allow rooted Android devices to connect to the corporate network or cloud resources if the potential for threats living on the device is known. Allowing this means the malicious exploit could jump from the device to the corporate network to harvest more credentials or sensitive data.</p> <p>The video below shows the power of MobileIron’s <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management</a> (UEM) and <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">mobile threat defense</a> working in tandem to detect the Magisk systemless root, and highlights the importance of <a href="/en/unified-endpoint-management/operating-systems/android-device-management" title="Android Device Management (MDM)">Android device management</a>. UEM will detect the device health during its enrollment and then halt the onboarding process by blocking the installation of VPN, WiFi, email, identity certificates, managed apps, and content. If the device is already enrolled in UEM during the rooting process, MobileIron Threat Defense (MTD) can enforce a quarantine or selective wipe compliance action to protect the user’s personal and work data.</p> <p> </p> <div style="padding:100% 0 0 0;position:relative;"><iframe allow="autoplay; fullscreen" allowfullscreen="" frameborder="0" src="https://player.vimeo.com/video/364162055?byline=0&amp;portrait=0" style="position:absolute;top:0;left:0;width:100%;height:100%;"></iframe></div> <p><script src="https://player.vimeo.com/api/player.js"></script></p> <p><a href="https://vimeo.com/364162055">Magisk Systemless Root Detection and Remediation</a> from <a href="https://vimeo.com/mobileiron">MobileIron</a> on <a href="https://vimeo.com">Vimeo</a>.</p> <p> </p> <p>If you would like to learn more about MobileIron’s <a href="https://www.mobileiron.com/en/unified-endpoint-management/solutions/mobile-device-management">mobile device management</a> (MDM) solutions, please contact a MobileIron Sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> </div> </div> </div> </div> Thu, 03 Oct 2019 20:44:42 +0000 jkim 2300 at https://www.mobileiron.com Checkm8 Apple iOS Forever Day Exploit Explained https://www.mobileiron.com/en/blog/apple-checkm8-forever-day-exploit <span>Checkm8 Apple iOS Forever Day Exploit Explained</span> <span><span lang="" about="/en/user/11084" typeof="schema:Person" property="schema:name" datatype="">jkim</span></span> <span>Tue, 10/01/2019 - 10:04</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fapple-checkm8-forever-day-exploit" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fapple-checkm8-forever-day-exploit&amp;title=Checkm8%20Apple%20iOS%20Forever%20Day%20Exploit%20Explained" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Checkm8%20Apple%20iOS%20Forever%20Day%20Exploit%20Explained&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fapple-checkm8-forever-day-exploit" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/checkm8/blog-inline-image-checkm8.jpg" width="656" height="290" alt="checkm8 exploit on iPhones" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><h3>Introduction</h3> <p>On Sept 27, 2019, a security researcher who goes by the handle Axi0mX published an exploit, called checkm8, that he claims uses flaws in Apple’s Boot ROM software to bypass boot security.</p> <p><a href="https://twitter.com/axi0mX/status/1177544174163263489" target="_blank">https://twitter.com/axi0mX/status/1177544174163263489</a></p> <p>The researcher states that checkm8 doesn't bypass the protections offered by the <a href="https://www.quora.com/What-is-Apple%E2%80%99s-new-Secure-Enclave-and-why-is-it-important" target="_blank">Secure Enclave</a> and <a href="https://en.wikipedia.org/wiki/Touch_ID" target="_blank">Touch ID</a>.</p> <p><a href="https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains- why-idevice-jailbreak-exploit-is-a-game-changer/" target="_blank">https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains- why-idevice-jailbreak-exploit-is-a-game-changer/</a></p> <p>This exploit does not affect or impair MobileIron's products.</p> <p> </p> <h3>Vulnerability Information</h3> <p>The researcher claims that checkm8 exploits a race condition to defeat the Secure Boot chain, and that it is not entirely reliable. In its current development, it is not a remote exploit, as it can only be executed by connecting the iOS device to a computer over USB.</p> <p>The researcher has published code meant for researchers and developers who can use it to dump SecureROM, decrypt keybags with AES engine, and demote the device to enable JTAG. You still need additional hardware and software to use JTAG.</p> <p>To reiterate, this is not a Jailbreak. As the Boot ROM can’t be updated after the device is manufactured, the author calls checkm8 a “permanent unpatchable Boot ROM” exploit or “forever-day” exploit.</p> <p> </p> <h3>Affected Components</h3> <p>The researcher claims in his announcement on Twitter that the system-on-a-chip (SoC) in iPhones from 4S (A5 chip) to iPhone X (A11 chip), released between 2011 and 2017 are vulnerable. He also writes that <a href="/en/unified-endpoint-management/operating-systems/ios-device-management" title="apple ios device management">Apple devices</a> with these chips like the iPad and iPod Touch are also affected.</p> <p> </p> <h3>Our Take</h3> <p>With all the caveats that exist with the checkm8 exploit, having a <a href="/en/products/uem" title="unified endpoint management (UEM) solutions">unified endpoint management (UEM) solution</a> with mobile threat defense (MTD) installed on an iDevice is critical for a few reasons. First, UEM can enforce a complex alphanumeric passcode to access the device. Second, the iOS restriction to allow USB restricted mode prevents USB accessories that plug into the Lightning port from making data connections with an iDevice (iPhone, iPad, or iPod) if your iOS device has been locked for over an hour. This blocks tools used by hackers and law enforcement to crack passcodes and circumvent Apple’s encryption and built-in measures designed to protect the user’s private data. This can be applied to Supervised devices.</p> <p>When a full jailbreak is created, MobileIron UEM will be able to detect the device health is out of compliance and halt the enrollment process preventing the provisioning of VPN, WiFi, email, identity certificates, managed apps, and content onto the device. <a href="/en/products/mobile-threat-defense" title="MobileIron Threat Defense - MTD">MobileIron Threat Defense (MTD)</a> will also be able to detect the Jailbreak state and quickly remediate any UEM-provisioned settings on the device via quarantine or selective wipe compliance actions after the device has enrolled to UEM. Access to enterprise and cloud resources will also be blocked.</p> <p>If the Cydia or Sileo apps are installed on the device as a third-party app store for rooted apps, the UEM admin can blacklist them and prevent them from running on the device. MTD will flag these apps as a sideloaded app threat (not downloaded from the iOS App Store) and classify them as a Suspicious iOS app threat. If Cydia or Silio installs a configuration profile, MTD will detect that a suspicious profile was installed on the device. All these threats can trigger a quarantine or selective wipe compliance action.</p> <p>We’ll continue to monitor new developments in the checkm8 exploit. If you’d like to learn more about MobileIron UEM, please visit <a href="https://www.mobileiron.com/en/products/uem" title="MobileIron Unified Endpoint Management - UEM">here</a>.</p> </div> </div> </div> </div> Tue, 01 Oct 2019 17:04:19 +0000 jkim 2299 at https://www.mobileiron.com Apple iOS 13 vs Android 10 Privacy Wars https://www.mobileiron.com/en/blog/apple-vs-android-privacy-wars <span>Apple iOS 13 vs Android 10 Privacy Wars</span> <span><span lang="" about="/en/user/11084" typeof="schema:Person" property="schema:name" datatype="">jkim</span></span> <span>Thu, 09/26/2019 - 15:14</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fapple-vs-android-privacy-wars" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fapple-vs-android-privacy-wars&amp;title=Apple%20iOS%2013%20vs%20Android%2010%20Privacy%20Wars" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Apple%20iOS%2013%20vs%20Android%2010%20Privacy%20Wars&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fapple-vs-android-privacy-wars" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/ios-vs-android/blog-inline-image-ios-vs-android.jpg" width="656" height="290" alt="Android 10 vs iOS 13" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>This year we’ve seen the rivalries between tech giants like Apple, Google, and even Facebook and Amazon, expand beyond the traditional meat and potatoes realm of hardware and software. Google and Apple in particular are investing heavily in securing their mobile OS’s, while at the same time safeguarding the privacy of user data. Let’s take a look at the changes in Android 10 and iOS 13 to see if we can crown a privacy champion.</p> <p> </p> <h3><strong>They Drew First Blood</strong></h3> <p>Google was the first out of the door with its major mobile OS update, Android 10. Apple followed with iOS 13 only a couple of weeks later. Overall this a win for consumers because Google and Apple are now competing to not only provide a great user experience, but also the best privacy experience.</p> <p>The changes in iOS 13 don’t really come as a surprise because they are a natural evolution. Apple has spent the last few years really touting how well they uphold user privacy that the “other guys”, Google, didn’t seem to care about. Apple harps on this because Google makes a large part of its revenue through its advertising business. That's why when Google put privacy in their crosshairs, it was a big deal.</p> <p>According to Google’s CEO Sundar Pichai, “<a href="https://www.nytimes.com/2019/05/07/opinion/google-sundar-pichai-privacy.html" target="_blank">Privacy should not be a luxury good.</a>” We can see their efforts shaping up in Android 10, where privacy takes center stage. Still, Apple has been providing great privacy controls and continues to make sure that users stay in the driver's seat. Let's call this one a tie since it's great to see that you don’t have to choose one or the other to in control of your personal information.</p> <p>And the winner is: <strong>It’s a Draw!</strong></p> <p> </p> <h3><strong>Location, Location, Location</strong></h3> <p>The biggest and most obvious (also potentially annoying) change you will notice when you update to iOS 13 or Android 10 are the granular notifications when apps access your location data.</p> <p> </p> <img alt="iOS with Google Maps app alert" data-entity-type="file" data-entity-uuid="bc3e354c-2889-4615-8948-61775da06170" src="/sites/default/files/inline-images/ios-with-googlemaps-alert_0.jpg" width="300" class="align-center" /><p> </p> <p>On Android 10, Google has changed the way that users grant location permission to an app. It is no longer always on or never. Now you have three options: <strong>allow all the time</strong>, <strong>allow only while using the app</strong>, and <strong>deny</strong>. By only allowing location sharing while using the app, that data can’t be collected in the background and potentially sold to advertisers. The changes don't stop there. Let's say you grant an application access to your location at all times. Android will now notify you periodically that an application is constantly pinging your location in the background. This change makes sure you’re always aware and can take action.</p> <p>On iOS, for some time we’ve had the ability to toggle location services between <strong>always</strong>, <strong>while using the app</strong>, and <strong>never</strong>. With iOS 13, Apple took it a step further and introduced an option to only allow the app to use your location once. The next time you launch the app, it will prompt you to allow it to access your location again. This is great for apps that only need location access briefly to set something up, but never need to access location again. Apple will now notify you with a map along with the number of times an app has collected your location in the background.</p> <p>While both mobile operating systems are moving in the right direction by giving users more control over location services, I think Apple has done it better here. The fact that they not only let you know when an app is collecting location in the background and will even show you a map is a nice touch. Also, the one time permission is nice to have for those apps that shouldn’t need location permission after initial setup.</p> <p>And the winner is: <strong>Apple</strong></p> <p> </p> <h3><strong>Nosy applications</strong></h3> <p>Starting with Android 10, Google is restricting apps from reading IMEI/serial numbers, from launching to the foreground, from viewing your clipboard, and from accessing files stored on your device. All of these things are welcome changes because they prevent bad apps from identifying you or stealing information from your device. For example, by preventing an app from launching to the foreground without any user interaction, the bad app can’t overlay your banking app to capture your credentials.</p> <p>The most exciting privacy feature Apple announced isn’t quite available everywhere yet. They are calling it <strong>Sign in with Apple</strong>.The biggest difference with Apple’s approach compared to others, such as signing in with Google, is that Apple will generate a random email address and forward any messages to you. This way the service (or app) provider won’t get access to your real email address, but you can receive any messages sent to you by the service provider. Having this functionality adopted by Google or any other sign in providers would be a huge win for privacy.</p> <p>In other iOS 13 news, Apple now prevents apps from running in the background when they invoke VoIP services. This will keep a bad app from using the VoIP service to constantly run in the background collecting information about you. A more visible change for users will be the new bluetooth permission. This isn’t a permission to allow an app to use headphones or speakers, but actually to scan for bluetooth devices. With this new restriction, apps can’t figure out your location by scanning for bluetooth beacons without your permission.</p> <p>All of these privacy changes with Android and iOS are great, but they also have to be easy to access from your device. Google created a specific section within Settings that is all about privacy. It not only covers the types of permissions and which apps have access to those permissions, but also allows users to control the privacy settings of their Google accounts. On iOS, users still need to dig into each application to control which permissions an app can access. I have to give Apple a lot of credit for the Sign in with Apple feature and I really hope this becomes the norm with Google as well. Still, both vendors have made some pretty significant strides, so we will have to call this one a tie.</p> <p>And the winner is: <strong>No one, it’s a Tie</strong></p> <p> </p> <h3><strong>Android Enterprise vs Apple’s new “User Enrollment”</strong></h3> <p>When it comes to keeping your personal data and work data separated, Google has done a great job with Android Enterprise. It gives users two completely separate profiles that do not interact with each other. It seems like <a href="/en/unified-endpoint-management/operating-systems/ios-device-management" title="Apple iOS device management">Apple device management</a> is taking a small step in that direction with the introduction of a new way to register devices called “User Enrollment.” Let's break down how each of them work.</p> <p>On Android Enterprise, when a user enrolls their device, a new secure partition is created on the device for the work profile. The work profile is completely managed by your unified endpoint management (UEM) administration team and allows them to place restrictions on what apps you can have and how you can move data around. What is great about this <a href="/en/unified-endpoint-management/operating-systems/android-device-management" title="Android Device Management">Android device management</a> approach is that you don’t have to worry if you use apps on personal side that your company uses as well. You can have TWO instances of the same application, one that remains untouched on your personal profile and one that is completely managed by your company in the work profile. Google adds a little briefcase icon to your work variant of the application. Also if you leave the company or lose your device, your administrators can only remove the work profile from your device. They will never be able to perform a full factory reset. I think this is the experience that everyone wants when adding their company’s management to their devices.</p> <p>Apple’s new <em>User Enrollment</em> has some similarities to Google’s approach. First of all, Apple creates a new secured APFS volume on your device to keep work data seperated and secured from your personal data. Apple also restricts your admin from having the ability to <em>fully</em> wipe your device or see your personal apps. Admins will also no longer be able to unlock your device (passcode), enforce <em>really</em> complex passcodes, and most restrictions beyond managed open-in will no longer apply. This enrollment method does require that your administration team create a managed Apple ID in the Apple Business Manager.</p> <p>User privacy is always front of mind when it comes to enrolling a personal device onto any sort of UEM. People don’t want to share personal data with their employer. While setting the right policies can ease privacy concerns, users will definitely find more peace of mind with these new controls. I will have to give this one to Google for already providing an experience that is decidedly more BYOD friendly.</p> <p>And the winner is: <strong>Google</strong></p> <p> </p> <h3><strong>We all win in the end</strong></h3> <p>Both operating systems do an admirable job protecting personal data. Clearly both Google and Apple are viewing privacy as table stakes, not only in their operating systems, but across all of their products. <a href="/en/products/uem" title="Unified Endpoint Management (UEM)">MobileIron UEM</a> can help safeguard personal data and improve BYOD security. When MobileIron Threat Defense is added, it also protects users from untrusted Wi-Fi, Man-in-the-Middle attacks, device exploits, and phishing. If you would like to learn more about MobileIron’s <a href="/en/unified-endpoint-management/solutions/mobile-device-management" title="Mobile Device Management (MDM)">mobile device management (MDM) solutions</a>, please contact a MobileIron Sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>. And oh yah… the winner? Let’s just call it a draw for now.</p> </div> </div> </div> </div> Thu, 26 Sep 2019 22:14:55 +0000 jkim 2294 at https://www.mobileiron.com Mobileiron UEM Security for Oculus VR Devices https://www.mobileiron.com/en/blog/uem-for-oculus-vr-devices <span>Mobileiron UEM Security for Oculus VR Devices</span> <span><span lang="" about="/en/user/11084" typeof="schema:Person" property="schema:name" datatype="">jkim</span></span> <span>Wed, 09/25/2019 - 10:10</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fuem-for-oculus-vr-devices" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fuem-for-oculus-vr-devices&amp;title=Mobileiron%20UEM%20Security%20for%20Oculus%20VR%20Devices" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Mobileiron%20UEM%20Security%20for%20Oculus%20VR%20Devices&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fuem-for-oculus-vr-devices" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/facebook-vr/blog-inline-image-vr.jpg" width="656" height="290" alt="Oculus VR headset" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>With the recent release of <a href="http://oculus.com/business" target="_blank">Oculus for Business</a>, companies of all sizes will have yet another way to streamline and expand virtual reality (VR) in the workplace. With all of these new VR, AR, and MR technologies flooding the market, it’s clear that they will soon become a staple device for enterprise users everywhere. Consider the massive productivity advantages for tasks like employee training in simulated environments, immersive meetings that realistically connect people around the world, and virtual design experiences that enable clients to visualize projects in 3-D.</p> <p>Does that scenario sound familiar?</p> <p>If you’re old enough to remember when smartphones first made their way into the enterprise, you might remember how much it was like the Wild West. There wasn’t much order or discipline to onboarding those devices. Users frequently shared all kinds of confidential business files through unsecured devices, apps, and networks in a way that would make any security professional cringe in horror today. Back then, IT really had no way of knowing what users were doing with their personal devices, much less controlling or managing their activities.</p> <p>Thankfully, the world of secure enterprise mobility has evolved due in large part to <a href="/en/products/uem" title="UEM Security">unified endpoint management (UEM)</a> leaders like MobileIron. Now IT can easily and securely onboard any kind of device, whether it’s <a href="/en/unified-endpoint-management/operating-systems/android-device-management" title="Android MDM">Android</a>, iOS, <a href="/en/unified-endpoint-management/operating-systems/mac-os" title="MacOS Security">macOS</a>, <a href="/en/unified-endpoint-management/operating-systems/windows-10" title="Windows 10 MDM">Windows 10</a>, and now VR devices like Oculus Quest and Oculus Go, through <a href="/en/unified-endpoint-management/solutions/mobile-device-management" title="mobile device management (MDM)">mobile device management (MDM)</a> and <a href="/en/solutions/securing-byod" title="BYOD Security">BYOD security</a>.</p> <p>The devices might be new, but we’ve all been here before. And we’re ready for the coming VR wave.</p> <p>MobileIron recently announced our support for <a href="http://www.oculus.com/business" target="_blank">Oculus for Business</a>, which means you’ll be able to onboard and configure your VR devices just like all of your other mobile devices today. You can securely manage them as part of your broader UEM infrastructure and simplify the entire device lifecycle — from enrollment to retirement.</p> <p>We’re excited to help our customers embark on a successful VR journey by working closely with Oculus ahead of their program launch in November. In the meantime, learn more about MobileIron UEM <a href="https://www.mobileiron.com/en/products/uem">here</a>.</p> </div> </div> </div> </div> Wed, 25 Sep 2019 17:10:51 +0000 jkim 2289 at https://www.mobileiron.com Marketplace Premier Program: Built to drive customer innovation https://www.mobileiron.com/en/blog/marketplace-premier-program <span>Marketplace Premier Program: Built to drive customer innovation</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 09/23/2019 - 12:13</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmarketplace-premier-program" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmarketplace-premier-program&amp;title=Marketplace%20Premier%20Program%3A%20Built%20to%20drive%20customer%20innovation" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Marketplace%20Premier%20Program%3A%20Built%20to%20drive%20customer%20innovation&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmarketplace-premier-program" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/marketplace-premier-program/blog-inline-image.jpg" width="656" height="290" alt="marketplace-premier-program" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>As you may have heard, MobileIron recently <a href="/company/press-room/press-releases/mobileiron-launches-marketplace-premier-program">announced</a> our Marketplace Premier Program, which is designed to give customers access to a vast new range of partner solutions through our global sales channel.</p> <p>We know that our customers’ business needs change almost daily. The ability to solve complex problems and rise to new challenges requires the right tools and services for the job. Staying competitive in a global marketplace requires access to best-of-breed solutions that start working for you right away — because no one has the time or budget for shelfware and complicated technology that’s too hard to manage.</p> <p>That’s all great, but how does it work?</p> <p>The Marketplace Premier Program vastly expands the range of solutions available to MobileIron customers and creates a direct line between customers and the solutions they need now — all without worrying about complex procurement or billing issues. We’ve streamlined it all through a one-stop shop and a single bill so customers can focus on innovation, not integration.</p> <p>Why are partners like AGAT Software, EBF, Hypergate (Papers GmbH), Incapptic, ISEC7, Samsung, and Wandera among the first partners to join the program? Because they know that together, we can build a stronger foundation for our customers to push the limits of secure mobile productivity and <a href="/en/unified-endpoint-management/solutions/mobile-device-management" title="mobile device management (MDM)">mobile device management (MDM)</a> anywhere in the world. It’s not just about offering great technologies that readily integrate into our mobile-centric, <a href="/en/solutions/zero-trust" title="Zero Trust Security">zero trust</a> platform that’s built on a foundation of <a href="/en/products/uem" title="Unified Endpoint Management (UEM)">unified endpoint management (UEM)</a>. It’s also about providing comprehensive support that drives your business initiatives forward with the help of technology partners who are leading the next generation of mobile.</p> <p>Want to see what the Marketplace Premier Program can do for you? Visit us <a href="/en/resources/partners/marketplace-premier-partner">here</a> to start the conversation.</p> </div> </div> </div> </div> Mon, 23 Sep 2019 19:13:19 +0000 sraikow 2287 at https://www.mobileiron.com