Blogs https://www.mobileiron.com/en/blog/rss.xml/all?field_blog_taxo_target_id=All en Don’t Expose Your iPhone or iPad to Jailbreak Security Threats https://www.mobileiron.com/en/blog/dont-expose-your-iphone-or-ipad-to-jailbreak-security-threats <span>Don’t Expose Your iPhone or iPad to Jailbreak Security Threats</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 08/22/2019 - 16:08</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fdont-expose-your-iphone-or-ipad-to-jailbreak-security-threats" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fdont-expose-your-iphone-or-ipad-to-jailbreak-security-threats&amp;title=Don%E2%80%99t%20Expose%20Your%20iPhone%20or%20iPad%20to%20Jailbreak%20Security%20Threats" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Don%E2%80%99t%20Expose%20Your%20iPhone%20or%20iPad%20to%20Jailbreak%20Security%20Threats&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fdont-expose-your-iphone-or-ipad-to-jailbreak-security-threats" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/jailbreak/blog-inline-image.jpg" width="656" height="290" alt="Don’t Expose Your iPhone or iPad to Jailbreak Security Threats" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Ahhh, jailbreaking your iPhone or iPad is back again! Jailbreaking your iOS and iPadOS devices might seem cool for installing unsanctioned apps (which you can’t get from the iOS or iPadOS App Store) and device customizations and all, but is it worth potentially installing malicious apps that can steal your personal and work data? </p> <p>With the iOS 12.4 release, an unintended regression “fix” reintroduced a security vulnerability dubbed SockPuppet (CVE-2019-8605), which can be used to remotely jailbreak an iPhone or iPad. Popular apps like Chimera and Unc0ver allow a user to jailbreak their iPhone or iPad just by executing the app without a computer. This flaw also allows for an elevation of privilege due to improper memory handling, resulting in a malicious app being able to execute arbitrary code with system-level privileges. </p> <p><a name="_heading=h.gjdgxs" id="_heading=h.gjdgxs"></a>The good news is that <a href="https://www.mobileiron.com/en/products/uem">MobileIron’s unified endpoint management (UEM) platform</a> with <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">MobileIron Threat Defense (MTD)</a> provides a layered protection approach to counter this new threat. If the mobile device was previously jailbroken before registering to MobileIron Core or Cloud, MobileIron UEM would immediately detect that the device was jailbroken and halt registration and prevent access to the corporate network. If the device was previously registered to MobileIron UEM, MTD would detect that a sideloaded and suspicious app was installed and immediately quarantine the device by removing managed apps and content.</p> <p><a name="_heading=h.yvubprfhrp5w" id="_heading=h.yvubprfhrp5w"></a>Even if the user bypassed these threat notifications and went ahead and executed the jailbreak, MTD would continue protecting the iPhone or iPad from potential data loss by not allowing the managed apps and content to be manually restored by the user. Once the device is restored back to the original factory settings, then MobileIron UEM would restore all managed apps and content onto the device automatically so the knowledge user could continue working.</p> <p>This quick one-minute video shows the power of MobileIron UEM and MTD working in tandem to protect your iOS and iPadOS devices! Also, as an extra precaution, be wary of downloading any new apps until a security patch is released.</p> <p> </p> <div style="padding:133.33% 0 0 0;position:relative;"><iframe allow="autoplay; fullscreen" allowfullscreen="" frameborder="0" src="https://player.vimeo.com/video/355437799" style="position:absolute;top:0;left:0;width:100%;height:100%;"></iframe></div> <script src="https://player.vimeo.com/api/player.js"></script><p> </p> </div> </div> </div> </div> Thu, 22 Aug 2019 23:08:30 +0000 sraikow 2245 at https://www.mobileiron.com The State of Mobile Security 2019 https://www.mobileiron.com/en/blog/state-of-mobile-security-2019 <span>The State of Mobile Security 2019</span> <span><span lang="" about="/en/user/7392" typeof="schema:Person" property="schema:name" datatype="">fgosker</span></span> <span>Mon, 08/19/2019 - 12:23</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fstate-of-mobile-security-2019" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fstate-of-mobile-security-2019&amp;title=The%20State%20of%20Mobile%20Security%202019" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=The%20State%20of%20Mobile%20Security%202019&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fstate-of-mobile-security-2019" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/state-of-mobile-security/state-of-mobile-security-blog--inline-image.jpg" width="656" height="290" alt="The State of Mobile Security 2019" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Matthew Shaver recently published an <a href="https://mobilepros.org/2019/06/state-of-uem-2019/">excellent piece on the state of UEM in 2019</a>. He covered changes that Apple and Google have made in their approaches to <a href="/en/unified-endpoint-management/solutions/mobile-device-management" title="mobile device management">mobile device management</a>, and how the industry needs to adapt to a new reality. Citing the film, “The Right Stuff,” Matthew illustrated our collective inertia in responding to a condition that has already come to be, i.e. new frameworks for device management. Matthew’s premise is that we’re paralyzed when it comes to adjusting to frameworks we already know about.<br />                      <br /> So, how should we react to the things we <em>don’t </em>know about, the kind that introduce themselves in a very unwelcome manner? Let’s look at this through the lens of <a href="/en/mobile-security-products" title="Mobile Security">mobile security</a>. The premise of this article is the world has changed, the attack vectors are different than what they were in the past, and we ought to do something about it. </p> <h4><strong>Who moved my cheese?</strong></h4> <p>Malware, malware, malware. When the mobile security discussion was breached, if it was at all, malware was all we heard about for a very long time. Even then, malware was largely perceived as an Android issue; since Apple has always maintained a highly curated app store, it <em>seemed </em>like there was less of it (with the exception of some notable biggies like <a href="https://en.wikipedia.org/wiki/XcodeGhost">Xcode Ghost</a>). But these days, Google seems to have addressed many security and malware issues with Google Play Protect and Android Enterprise. I’m not saying we don’t need to protect ourselves against malware, we do. This was epically proven when Epic Games decided to cut out the middleman and publish Fortnite directly from their website instead of Google Play. Overnight there were tons of sites hosting the app, and sometimes that app was malware. </p> <p>What can malware do? It can serve up adware, collect data about users, harvest data from other apps, and, of course, sometimes it can execute a device exploit. Even if an app isn’t malware per-say, it’s important to look closely at what data apps are accessing or collecting and where they are sending that data. Mitigating malware and controlling data leakage through apps should be a part of your overall mobile security strategy, but it’s only a small piece of the puzzle. </p> <h4><strong>Glory Days</strong></h4> <p>The big issue I see is that we focused nearly exclusively on malware, and even then, only a very small percent of organizations invested in protecting against it. Meanwhile, the enterprise continued to pour hundreds of billions of dollars into protecting networks and services with firewalls and intrusion protection systems, even as those services moved to the cloud. When organizations finally did notice they were storing a lot of information in the cloud, we rebooted the old firewall idea and funneled our data through Cloud Access Service Brokers (CASBs). At the same time, even as mobile and cloud use was exploding in the enterprise, we doubled-down on our endpoint protection strategies, trying to secure PCs, which have been experiencing flat-line growth for the last five years or more. Yes, it’s still important to have secure networks, but often that’s not where the data is anymore. So, what are the biggest mobile threats today?</p> <h4><strong>The Four Horsemen of the mobile apocalypse</strong></h4> <p><strong>Man-In-The-Middle (MiTM) attacks.</strong> It all sounds like a fun game, until someone starts siphoning off your data, collecting your passwords, injecting code in your browser sessions, and or redirecting your web traffic. All it takes is a $99 pineapple and some basic knowledge to execute these. It’s amateur hour out there. </p> <p><strong>Phishing. </strong>We know most web traffic now originates from a mobile browser. That same link you click on from your desktop can also be hit from Mobile Safari, Chrome, or whatever your browser-du-jour is. It’s just as easy to phish credentials from a mobile device as it is from the desktop. To top it off, mobile has a risk factor we don’t always find on the desktop. Malicious links and even code can be delivered through a SMS message. </p> <p><strong>Ransomware. </strong>Ransomware on the mobile device itself is a problem, with products like SLocker simply locking up your device until you pay. The bigger threat though is ransomware holding hostage an entire network. Mobile just magnifies the attack surface – a phone or a tablet can be a very good way to get in to an otherwise secure network. </p> <p><strong>Vulnerabilities, Roots, and Jailbreaks </strong>This could be a whole article. A book even. There are many ways to Pwn a device, from self-initiated jailbreaks, to exploits that take advantage of known vulnerabilities before they are patched, to government grade exploits like Pegasus (<a href="https://www.fastcompany.com/90238737/watchdog-finds-powerful-nso-group-iphone-spyware-in-these-45-countries">available for 650K to Hack 10 devices, plus a 500K initiation fee</a>). When a device is exploited this way, it becomes the perfect spy tool. It has a camera, a microphone, and it knows all your passwords, and all of these can now be controlled by someone else. </p> <h4><strong>Get yourself an IdP</strong></h4> <p>As we morphed into the new “perimeter-less” world of cloud services, we had a bad habit of creating passwords with every new service (and let’s face it, often we had no choice). That spurred new identity federation and single-sign-on solutions and created a new framework for identity that could operate outside of the corporate network, the IdP. If you haven’t looked at Okta, Ping, Onelogin, Sailpoint, or even Microsoft ADFS to juggle the proliferation of passwords, you should. Keep in mind though, a password can still be phished or obtained in any number of ways. More on that later. </p> <h4><strong>2FA is nice, but you still have a password</strong></h4> <p>Adding on two-factor authentication can absolutely help protect your assets, but you shouldn’t declare mission-accomplished once you’ve done this. Tokens and SMS codes can still be phished and social engineering can be used to reroute phone numbers to a hacker’s device. Deploying 2FA can help desk issues and deployment challenges too, and even more importantly, lazy people don’t want to jump through hoops to access a service. </p> <h4><strong>Make it easy for your users</strong></h4> <p>Whatever security you do employ, it should be unobtrusive. We don’t want to inhibit productivity. Native single sign-on and seamless VPN’s that can be leveraged without needing to manually launch an app should be leveraged. Certificates should be used for authentication, and moving forward, we should also look at emerging security standards that can leverage the biometrics on a device, like <a href="https://fidoalliance.org/fido2/">FIDO 2</a>. </p> <h4><strong>A New approach to security</strong></h4> <p>Forrester calls it <a href="/en/solutions/zero-trust" title="Zero Trust Security">Zero Trust</a>. Google calls it BeyondCorp. Gartner calls it Continuous Adaptive Risk and Trust Assessment (CARTA). The essential takeaway is you never trust an endpoint until you can be sure it’s safe, and you continue to verify that the device is in compliance ALL THE TIME. This requires a layered approach to security. Leverage mobile device management (MDM) / unified endpoint management (UEM) to make sure a device is in compliance with your company’s policies. Overlay that with a Mobile Threat Defense solution to protect against MiTM attacks, device exploits, malware, and phishing. Make sure the threat defense solution is really looking at device behavior so you can successfully detect and remediate zero-day exploits. And, make sure the device is in compliance before you allow it to access company resources and data. Continuously monitor and check in to make sure the device is still safe. Rinse, lather, repeat.  </p> <h4><strong>Conditional Access with device integrity</strong></h4> <p>Jack Madden of brianmadden.com published <a href="https://www.brianmadden.com/opinion/IDaaS-or-UEM-where-do-you-build-conditional-access-policies">a great article </a>that posed the question, “where should we implement conditional access?” The CASB industry will say they can do this by funneling all your traffic through a service broker before it hits the target resource. There definitely are some benefits in this architecture, especially when it comes to User Entity Behavior Analytics (UEBA). For instance, did someone just download a terabyte of data, and if so, did that set off any alarms? The IdP industry will also say they are the logical point of enforcement. Both have some merit, but neither of them actually know if the device that is trying to access a resource is secure. It takes a MDM/UEM footprint on the device to know if the device is in compliance and managed by the organization. Only UEM can truly know if an app is managed (meaning the app and its data can be removed) before it tries to access company data. These products can all work together to produce a zero trust environment, but they need to talk to the MDM/UEM solution. That’s the ONLY way to know if a device should be trusted to access a company resource. </p> <h4><strong>We don’t have a budget for that</strong></h4> <p>Companies do have security budgets for commonly accepted threats, but by and large, those budgets are dedicated to protecting the networks of the past. They continue to invest in desktop security, but they don’t have a mobile security budget. That’s fine, but let’s look at the facts. Most internet traffic is mobile. That’s not news, we know the numbers keep going up every year for mobile browser traffic (more than half of all web traffic is mobile), number of minutes spent on the device, the number of times we touch the device, the absolute anxiety we feel when we leave the device behind… Just look at your own habits and the people around you. Desktop is being relegated to the tasks that are easier to do on desktop (like a spreadsheet, PowerPoint, a long email). The rest, meaning anything that is easier to do on mobile, will happen on mobile. </p> <h4><strong>Call to Action</strong></h4> <p>Start ringing the alarm bell. Begin building a zero trust strategy for mobile today. Beg for budget if you need to and examine how your current MDM/EMM fits into your new zero trust framework.</p> </div> </div> </div> </div> Mon, 19 Aug 2019 19:23:42 +0000 fgosker 2241 at https://www.mobileiron.com MobileIron Named a Leader in the Gartner Magic Quadrant for Unified Endpoint Management for the Second Straight Year https://www.mobileiron.com/en/blog/mobileiron-named-leader-gartner-mq-for-uem-2019 <span>MobileIron Named a Leader in the Gartner Magic Quadrant for Unified Endpoint Management for the Second Straight Year</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 08/12/2019 - 08:27</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileiron-named-leader-gartner-mq-for-uem-2019" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileiron-named-leader-gartner-mq-for-uem-2019&amp;title=MobileIron%20Named%20a%20Leader%20in%20the%20Gartner%20Magic%20Quadrant%20for%20Unified%20Endpoint%20Management%20for%20the%20Second%20Straight%20Year" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%20Named%20a%20Leader%20in%20the%20Gartner%20Magic%20Quadrant%20for%20Unified%20Endpoint%20Management%20for%20the%20Second%20Straight%20Year&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileiron-named-leader-gartner-mq-for-uem-2019" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/GartnerMQ2019/blog-inline-image.jpg" width="656" height="290" alt="2019 Gartner Magic Quadrant for Unified Endpoint Management Report, Gartner UEM Report" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p><strong><em>MobileIron products cited for high degree of customer satisfaction, even in complex implementations.</em></strong></p> <p> </p> <p><a href="http://www.gartner.com/technology/home.jsp">Gartner</a> recently published the <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-magic-quadrant-for-unified-endpoint-management" target="_blank">2019 Magic Quadrant for Unified Endpoint Management Tools </a>* (UEM) and MobileIron was named a Leader for the second straight year!  In the report, Gartner placed MobileIron in the Leaders quadrant and recognized MobileIron as an established player for management of mobile devices, with a complement of modern management features across multiple platforms.</p> <p> </p> <p><img alt="Gartner Magic Quadrant 2019: UEM, UEM Magic Quadrant Table, 2019 Gartner UEM Leaders image, MobileIron" src="/sites/default/files/Blog/2019/GartnerMQ2019/Gartner-MQ-UEM-2019.png" width="600" /></p> <p> </p> <p>We are honored by this recognition, which we believe reflects our <a href="https://www.mobileiron.com/en/case-studies" target="_blank">customers</a>’ successes and our continued investments in innovative solutions that solve UEM use cases identified in the Magic Quadrant. Many customers have adopted <a href="/en/products/uem" title="Unified Endpoint Management (UEM) Solution by MobileIron">MobileIron’s UEM solution</a> to:</p> <ul><li>Secure and manage mobile devices (iOS, Android) and non-mobile devices (MacBooks, Windows laptops, desktops).</li> <li>Solve security-centric use cases for both managed and unmanaged devices (<a href="/en/solutions/securing-byod" title="BYOD Software">BYOD</a>).<br />  </li> </ul><h4>Mobile-Centric Zero Trust Platform<br />  </h4> <p>MobileIron’s mobile-centric <a href="/en/solutions/zero-trust" title="Zero Trust Security">zero trust security</a> approach goes beyond identity management and gateway approaches by utilizing a more comprehensive set of attributes to determine compliance before granting access. Our platform validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to a device or user.</p> <p>MobileIron’s zero trust platform is built on an unified endpoint management (UEM) foundation to secure the perimeter-less enterprise. <br />  </p> <h4>More than 19,000 businesses have chosen MobileIron<br />  </h4> <p>Learn how <a href="https://www.mobileiron.com/en/case-studies/O2-careservices">O2 care services</a> transforms its mobile operations with MobileIron Cloud and Android Enterprise.  Discover how <a href="https://www.youtube.com/watch?v=iJ7EECLj76s">Queensland Ambulance Service</a> is connecting their teams in the field with Telstra's Managed Mobility services using MobileIron and iOS devices.<br />  </p> <h4>Get Started with MobileIron Today</h4> <p> </p> <h4><img alt="Mobile-centric zero trust security" src="/sites/default/files/Blog/2019/GartnerMQ2019/figure-1.jpg" /></h4> <p> </p> <p>Download the<strong> </strong>Gartner Magic Quadrant for Unified Endpoint Management Tools <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-magic-quadrant-for-unified-endpoint-management">here</a>. If you’d like to learn more about MobileIron UEM, please visit <a href="https://www.mobileiron.com/en/products/uem">here</a>.</p> <p> </p> <hr /><p style="font-size:.7em;"><em>This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-magic-quadrant-for-unified-endpoint-management">here</a>.</em></p> <p style="font-size:.7em;"><em>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</em></p> </div> </div> </div> </div> <div class="field field--name-field-link field--type-link field--label-above"> <div class="field--label">Read More Link</div> <div class="field--item"><a href="/en/blog/2019-gartner-peer-insights-customers-choice">/en/blog/2019-gartner-peer-insights-customers-choice</a></div> </div> Mon, 12 Aug 2019 15:27:42 +0000 sraikow 2229 at https://www.mobileiron.com Struggling to onboard Android devices? Here are four ways MobileIron and Samsung make it easier. https://www.mobileiron.com/en/blog/struggling-to-onboard-android-devices <span>Struggling to onboard Android devices? Here are four ways MobileIron and Samsung make it easier.</span> <span><span lang="" about="/en/user/7392" typeof="schema:Person" property="schema:name" datatype="">fgosker</span></span> <span>Tue, 08/06/2019 - 13:38</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fstruggling-to-onboard-android-devices" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fstruggling-to-onboard-android-devices&amp;title=Struggling%20to%20onboard%20Android%20devices%3F%20Here%20are%20four%20ways%20MobileIron%20and%20Samsung%20make%20it%20easier." class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Struggling%20to%20onboard%20Android%20devices%3F%20Here%20are%20four%20ways%20MobileIron%20and%20Samsung%20make%20it%20easier.&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fstruggling-to-onboard-android-devices" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/struggling-to-onboard-android-devices/Onboard_Android-blog-2-inline-image.jpg" width="656" height="290" alt="Struggling to onboard Android devices?" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Although mobile device onboarding has been greatly simplified over the years, every mobile admin still faces some stubborn challenges: keeping OS versions consistently updated, securely unlocking new device and app features, and, in larger organizations, configuring hundreds or even thousands of mobile devices and getting them into the hands of employees ASAP.</p> <p>Now MobileIron and Samsung are combining their mobile innovation leadership to help customers alleviate those Android onboarding pains so admins can stay focused on more strategic IT tasks.</p> <p>As we <a href="https://www.mobileiron.com/en/blog/MobileIron-support-for-OEMConfig-speeds-enterprise-access-to-new-Samsung-platform-features">announced</a> earlier this year, MobileIron support for OEMConfig speeds enterprise access to new Samsung platform features. This means customers can unpack even more capabilities from MobileIron and Samsung and use them to solve these ongoing <a href="/en/unified-endpoint-management/solutions/mobile-device-management" title="mobile device management - MDM">device management</a> challenges:<br />  </p> <h4><strong>1. Streamline management of the mobile fleet</strong></h4> <p>Samsung keeps taking the mobile device experience — and enterprise productivity — to the next level. Consider how the <a href="https://www.samsung.com/global/galaxy/apps/samsung-dex/">Samsung DeX </a>platform has ramped up mobile-powered desktop computing by allowing users to connect their mobile devices to a monitor and use it like a PC. </p> <p>Customers can now use the MobileIron console to control and customize the end-user experience when the Samsung Galaxy Note 10 is used like a PC in the DeX mode. Capabilities like this are truly transforming enterprise workspaces, but are only possible when these devices are securely managed as part of a unified endpoint management (UEM) platform like MobileIron. This is just one example of how our partnership empowers customers to take advantage of next-gen mobility while enabling comprehensive device, application, and security management across the entire device lifecycle, from onboarding to retirement. <br />  </p> <h4><strong>2. Accelerate device onboarding</strong></h4> <p>Let’s be honest: Setting up mobile devices and getting them to enterprise users wherever they work is a daunting task for any IT organization. Now, with Knox Mobile Enrollment (KME), IT can ship a device directly to the user and automatically enroll it in UEM. No complicated or time-consuming user interaction is required; they simply power on the device and walk through a few simple steps to get the configurations and applications they need right out of the box.<br />  </p> <h4><strong>3. Enable zero-day security and Knox Platform capabilities</strong></h4> <p>MobileIron and Samsung now make it even easier to support the latest and greatest Knox Platform for Enterprise (KPE) capabilities as soon as they are commercially available on Samsung devices. Customers can use the Knox Service Plugin (KSP) to access the new Android standard called OEMConfig. OEMConfig is a framework that leverages <a href="/en/unified-endpoint-management/operating-systems/android-device-management" title="Android Device Management">Android-managed</a> configurations and allows a vendor like Samsung to customize platform-specific features on the device and deliver it through UEM as a managed app. This capability enables UEM vendors to provide zero-day support for a broad range of security and hardware controls without having to generate customized implementations.</p> <p>MobileIron fully supports OEMConfig and the KSP on the Samsung Note 10 smartphone, which allows customers to instantly access the latest security and productivity features when the device in enrolled in <a href="/en/products/uem" title="MobileIron UEM Solutions">MobileIron UEM</a>. This is especially good news for our joint customers who require classified data on the device to be protected with two separate layers of encryption using different encryption algorithms. They can now start using their new Samsung Galaxy Note 10 devices for classified and unclassified use by enrolling the device in  MobileIron and leveraging the KSP from the MobileIron console. This allows them to unlock the Dual-Dar capability in the KPE to ensure the security of classified data on the device meets regulatory requirements.<br />  </p> <h4><strong>4. Keep OS versions up to date</strong></h4> <p>One of the biggest IT headaches is ensuring devices across the entire mobile fleet are all running the latest OS versions and security patches. This critical task is now easier thanks to Samsung Knox Enterprise Firmware-Over-The-Air (E-FOTA), which allows admins to remotely control and enforce OS upgrades on every device across the mobile fleet. Knox E-FOTA is managed through a policy that can be configured and distributed through the MobileIron UEM platform.</p> <p>To learn more about how MobileIron and Samsung are helping IT unleash exciting new mobile capabilities, see the OEMConfig announcement <a href="https://www.mobileiron.com/en/blog/MobileIron-support-for-OEMConfig-speeds-enterprise-access-to-new-Samsung-platform-features">here</a>.  </p> <p> </p> </div> </div> </div> </div> Tue, 06 Aug 2019 20:38:28 +0000 fgosker 2228 at https://www.mobileiron.com It’s Time to Prepare for California’s Consumer Privacy Act, So You Can Sleep Better At Night https://www.mobileiron.com/en/blog/california-consumer-privacy-act-preparation <span>It’s Time to Prepare for California’s Consumer Privacy Act, So You Can Sleep Better At Night</span> <span><span lang="" about="/en/user/7392" typeof="schema:Person" property="schema:name" datatype="">fgosker</span></span> <span>Fri, 08/02/2019 - 14:42</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fcalifornia-consumer-privacy-act-preparation" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fcalifornia-consumer-privacy-act-preparation&amp;title=It%E2%80%99s%20Time%20to%20Prepare%20for%20California%E2%80%99s%20Consumer%20Privacy%20Act%2C%20So%20You%20Can%20Sleep%20Better%20At%20Night" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=It%E2%80%99s%20Time%20to%20Prepare%20for%20California%E2%80%99s%20Consumer%20Privacy%20Act%2C%20So%20You%20Can%20Sleep%20Better%20At%20Night&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fcalifornia-consumer-privacy-act-preparation" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/california-consumer-privacy-act-preparation/CCPA-blog-inline-image.jpg" width="656" height="290" alt="It’s Time to Prepare for California’s Consumer Privacy Act" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>I love listening to all kinds of music when I’m working. Growing up, I bought vinyl records, listened to compact discs, and downloaded MP3s from Napster. Today I stream my music on my smartphone. The other day, I got on this nostalgic kick to create a mixtape compilation (playlists to you Millennials and younger) of my favorite tunes about California. I’m not sure why. Maybe it’s because we’re in the middle of summer? Or maybe I read this New York Times <a href="https://www.nytimes.com/2019/06/06/us/california-music-playlist-spotify.html">article</a> about favorite California-influenced songs. <em>“Raise your hands up in the air, and wave them like you just don’t care!”</em> I know, I’m so old school.</p> <p>I realized though that to complete my playlist, I had to purchase a lot of the songs I liked from an online music store because I didn’t have them. I used my stored credit card information on my smartphone to make the song purchases and I was happy as a lark! Everything from The Mamas and the Papas to the Beach Boys, LL Cool J, the Eagles, Tony Bennett, the Red Hot Chili Peppers, and finally Tupac. Aww yeah! Now I had all my favorite songs to listen to on my commute to and from work every day. And I also use the same smartphone for work.</p> <p>This instantly reminded me that I use my smartphone for everything! It’s my Swiss Army knife –  from my flashlight and wallet to SMS and email messages, and oh yeah, telephone calls! I freak out if I walk out of my house without my smartphone. I have so much personal and work information stored not only on my smartphone, but also on several internet retail sites, my preferred airline site, and at my workplace. This brought out my paranoid side! What would happen if my personal or work information were stolen from my mobile device or from the Internet site I was surfing, or my workplace suffered a data breach and employee records were stolen? What recourse would I have? I would certainly lose sleep and probably a lot of time cancelling credit cards, but then what long term effects could happen? Would I need to have my credit monitored for the rest of my life? Would I have to go back to listening to CDs?</p> <p>With <a href="http://worldpopulationreview.com/states/">12% of the US population</a> and the 5th  largest economy in the world, California is a land of opportunity for many businesses. But <a href="https://www.comparitech.com/blog/vpn-privacy/data-breaches-by-state/">California is also the home of the most data breaches </a>and personal information exposed, more than any other state in the Union for the past decade. Threat actors seem focused on preying on customer and employee data from my home state. Most of these same businesses consume, process, analyze, store, and sometimes sell substantial amounts of personal information from and for customers, employees, and partners. This data can be either on the device or in the on-prem and cloud services the business’ employees access from the device. Not just on the device. At the same time, the explosive growth of mobile devices within these businesses allows employees to access enterprise data and resources anytime, and anywhere.</p> <p>All of this makes securing enterprise data stored on or accessed from mobile devices a critical business need. As noted in the <a href="https://research.nsslabs.com/library/research/intelligent-brief/enterprise-intelligence-brief/">2019 NSS Labs Enterprise Intelligence Brief for Mobile Security</a>, more than half of all respondents in the study reported that mobile threats were a higher risk to organizational assets than other cyber threats. And 37.4% of respondents reported user bypass of security policies as a frequent or very frequent occurrence. On average, respondents with mobile security rated their protection as 76.1 (out of 100) against mobile threat vectors. Not bad, but that leaves a lot of opportunity for exploitation!  And in the <a href="https://enterprise.verizon.com/resources/reports/mobile-security-index/">2019 Verizon Mobile Security Index</a>, they reported that 1 in 3 businesses suffered a data breach from mobile devices.</p> <p>The <a href="https://krebsonsecurity.com/tag/equifax-breach/">Equifax breach</a>, which exposed the personal information of 147 million people around the world back in September 2017, is only one example of today’s cyber threat landscape. In another high-profile security breach announced at the end of July 2019, a former systems engineer of a cloud hosting provider allegedly exploited a web app firewall configuration vulnerability to <a href="https://krebsonsecurity.com/2019/07/capital-one-data-theft-impacts-106m-people/">exfiltrate 106 million records</a> containing unencrypted government ID numbers and consumer bank account numbers. And seventy percent of businesses are more frequently seeing <a href="https://www.helpnetsecurity.com/2019/07/26/damaging-insider-threats/">insider threats</a> as a growing source of both inadvertent and malicious data breaches. So, it begs the question, “What’s in your wallet?” <em>“</em><em>Stopped into a church</em><em> I passed along the way. Well, I got down on my knees and I pretend to pray…”</em></p> <p>It’s not surprising that legislation followed in the wake of well-publicized attacks and security breaches. The advent of the European Union’s GDPR focused attention on the state of data protection in the United States. A month after GDPR became enforceable in May 2018, California’s governor signed the California Consumer Privacy Act (CCPA) into law.</p> <p>In a new <a href="https://www.mobileiron.com/en/resources-library/whitepapers/california-consumer-privacy-act">white paper</a>, MobileIron’s Data Protection Officer explains how the CCPA removes a key barrier to data breach litigation and shares her perspective on what businesses can do to protect and defend themselves and the personal information within their control.</p> <p>Now is the time to prepare for CCPA. This issue will take on new urgency when the California Consumer Privacy Act takes effect on January 1, 2020. At the end of the day, I can sleep soundly at night knowing that the company I work for has implemented reasonable security in safeguarding my work and personal information on my smartphone! And now I wake up to that California tunes mixtape that I’m using as my alarm in the morning. <em>“You can check out any time you want, but you can never leave.”</em> Aww yeah! They don’t make songs like they used to!</p> </div> </div> </div> </div> Fri, 02 Aug 2019 21:42:42 +0000 fgosker 2226 at https://www.mobileiron.com ­MobileIron Recognized as a Top Rat­­­ed 2019 Unified Endpoint Management Software by TrustRadius https://www.mobileiron.com/en/blog/top-rated-uem-software-review <span>­MobileIron Recognized as a Top Rat­­­ed 2019 Unified Endpoint Management Software by TrustRadius</span> <span><span lang="" about="/en/user/7392" typeof="schema:Person" property="schema:name" datatype="">fgosker</span></span> <span>Fri, 08/02/2019 - 04:32</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ftop-rated-uem-software-review" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ftop-rated-uem-software-review&amp;title=%C2%ADMobileIron%20Recognized%20as%20a%20Top%20Rat%C2%AD%C2%AD%C2%ADed%202019%20Unified%20Endpoint%20Management%20Software%20by%20TrustRadius" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=%C2%ADMobileIron%20Recognized%20as%20a%20Top%20Rat%C2%AD%C2%AD%C2%ADed%202019%20Unified%20Endpoint%20Management%20Software%20by%20TrustRadius&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ftop-rated-uem-software-review" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/top-rated-uem-software-review/tr19-blog-inline-image.jpg" width="656" height="290" alt="Top Rated UEM Software Reviews, Best UEM Software, UEM Reviews, Best UEM Solutions, MobileIron" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>MobileIron has been recognized as a 2019 Top Rated Unified Endpoint Management (UEM) Software by TrustRadius. We take great pride in this distinction because it’s based on the direct feedback from our customers.</p> <p>Established in 2013, TrustRadius is a highly trusted site for B2B software reviews. Each month, about 400,000 B2B technology buyers use over 168,000 verified reviews and ratings on TrustRadius.com to make informed purchasing decisions.</p> <p>The TrustRadius Top Rated Awards are an unbiased recognition of the best B2B technology products. Based entirely on customer feedback, they have never been influenced by analyst opinion or status as a TrustRadius customer.</p> <p>With an average score of 8.2 out of 10, MobileIron stood out as a leader in the TrustRadius 2019 ratings for UEM software. MobileIron UEM provides the foundation for the industry’s first mobile-centric, zero trust enterprise security framework. MobileIron UEM puts mobile security at the center of your enterprise and allows you to build upon it with enabling technologies such as <a href="/en/products/access" title="Zero Sign On (ZSO)">zero sign-on (ZSO)</a> user and device authentication, multi-factor authentication (MFA), and <a href="/en/products/mobile-threat-defense" title="Mobile Threat Defense &amp; Detection (MTD)">mobile threat detection (MTD)</a>.</p> <p>Many customers praised MobileIron UEM for its great user experience and ability to secure access and protect data across the perimeter-less enterprise. I’d like to extend a big thank you to those customers who submitted reviews, and those who continue to shape the future of our products and services.</p> <p>At MobileIron, we are focused on delivering innovative technology and seamless, secure user experiences. As we continue to redefine enterprise security, we are extremely grateful for this recognition and the continued trust of our valued customers.</p> <p><strong>Here are some excerpts of what MobileIron Customers are saying that led to this distinction:</strong></p> <ul><li>“The services provided by MobileIron have definitely made our company more successful and professional in the eyes of our clients by providing real-time information display with inventory.” – <a href="https://www.trustradius.com/reviews/mobileiron-2019-04-30-12-28-28?utm_medium=tq-library-link&amp;utm_campaign=tr-tq-library&amp;utm_source=mobileiron&amp;rk=mi20190">Sr. Systems Engineer</a> at an Apparel &amp; Fashion company</li> <li>“The support we received from MobileIron is one of the driving factors as to why we chose them.” – <a href="https://www.trustradius.com/reviews/mobileiron-2019-04-05-11-56-54?utm_medium=tq-library-link&amp;utm_campaign=tr-tq-library&amp;utm_source=mobileiron&amp;rk=mi20190">IT Program Manager</a>, at a Government organization.</li> <li>“MobileIron has given us the ability to manage and maintain our mobile devices. It has allowed our users to set up devices without support intervention, allowing for a quick turnaround for readiness of the end users. – <a href="https://www.trustradius.com/reviews/mobileiron-2019-05-20-14-58-43">Engineer in Information Technology</a> at a Financial Services Company</li> <li>“It handles all of the mobile platforms...Android, iOS and Windows...very well. You can make changes on the fly and their tech support is very helpful and knowledgeable.” – <a href="https://www.trustradius.com/reviews/mobileiron-2019-05-10-13-40-45">Engineer in Information Technology</a> at a Government Administration Company</li> </ul><p>To learn more about how TrustRadius Top Rated works, check out the <a href="https://www.trustradius.com/static/about-trustradius-scoring" target="_blank">TrustRadius scoring criteria breakdown</a>. And if you have a MobileIron story to share, we encourage you to join the TrustRadius crowd and weigh in.</p> <p>Again, a huge thank you to our customers for this recognition. And if you’d like to learn more about MobileIron UEM, please visit <a href="https://www.mobileiron.com/en/products/uem">here</a>.</p> </div> </div> </div> </div> Fri, 02 Aug 2019 11:32:04 +0000 fgosker 2224 at https://www.mobileiron.com Bugs, Gators and Mobile Security https://www.mobileiron.com/en/blog/bugs-gators-mobile-security <span>Bugs, Gators and Mobile Security</span> <span><span lang="" about="/en/user/7392" typeof="schema:Person" property="schema:name" datatype="">fgosker</span></span> <span>Tue, 07/30/2019 - 05:21</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fbugs-gators-mobile-security" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fbugs-gators-mobile-security&amp;title=Bugs%2C%20Gators%20and%20Mobile%20Security" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Bugs%2C%20Gators%20and%20Mobile%20Security&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fbugs-gators-mobile-security" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/Bugs-Gators-and-Mobile-Security/tallahassee-blog-inline-image.jpg" width="656" height="290" alt="Bugs, Gators and Mobile Security" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>I spent my early childhood through pre-teen years in Tallahassee, Florida, which is located in the northwest region of the state, in an area commonly referred to as the Florida Panhandle. While there, I was fortunate to have collected a treasure trove of adventure-filled memories that have withstood the test of time. </p> <p>Though now several decades in my rearview, many of those memories are still quite clear to me today. Fishing ankle-deep in muddy ponds to avoid the fire ants on shore (while keeping constant watch for gators that might have stealthily snuck into chomping distance), snake hunting in tree tops and on steep and vegetation-covered creek beds, playing in the deep woods that surrounded our neighborhood, gathering with friends beneath the streetlight across from my house to make plans for the next day’s adventures, and more. Good times all around! However, to say that my childhood adventures were “enveloped in sticky mugginess and pesty bugginess,” would be an understatement. Whether you’re a Florida resident or make the occasional trek to the Sunshine State to vacation, you know what I mean.</p> <p>So, what is it about the new “<a href="https://www.mobileiron.com/en/resources-library/security-reports/NSS-Labs-2019-Mobile-Security-Intelligence-Brief">NSS Labs Enterprise Intelligence Brief Mobility</a>,” that reminds me of my Florida Panhandle days? Let me explain.</p> <p>First off, just to provide a bit of background, the research for this NSS Labs report was conducted earlier this year, derived from responses provided by more than 380 full-time U.S. enterprise IT security professionals. The purpose of the research was to gain insight into how network security products are being leveraged to support mobile devices. Having called the mobile security space my home for the past several years, I was curious to give the report a thorough read. In doing so, it reaffirmed the importance of <a href="https://www.mobileiron.com/en/solutions/zero-trust">mobile-centric, zero trust security</a>. And oddly enough, at the same time, it caused me to draw this sort of wacky correlation to some of my childhood memories. Weird, I know. Bear with me for a minute.</p> <h4 class="oxygen"><br /> Mobile threats vs. other cyber threats</h4> <p><br /> One key finding from the NSS Labs report was that more than half of all respondents reported that mobile threats were a higher risk to organizational assets than other cyber threats. </p> <p>Mobile devices have become our constant companions, an endless source of knowledge, entertainment and socialization (even for the timid), as well as our trusted advisors. How many times per day do you say or hear, “Okay, Google…” or  “Siri…”? We do nearly everything with our mobile devices in tow. In today’s perimeter-less enterprise, a mobile-centric, zero trust security model is your best defense against bad actors determined to infiltrate your enterprise resources and cause harm. </p> <p>So, what’s the tie-in to my childhood? Well, those who are set on circumventing your organization’s security infrastructure are like the hordes of mosquitoes and “no-see-uhms” that would always manage to find even the tiniest areas of my Deet-less, exposed skin and attack it mercilessly. Just like these pesky insects, bad actors never give up. They are continuously looking for new areas to launch their attacks. They are smart, creative and persistent. And if your organization has left any “skin” unprotected, you can count on it being located and attacked</p> <h4 class="oxygen"><br /> Poor user awareness</h4> <p><br /> Another finding of interest to me was that 49.4% of respondents reported poor user awareness as the greatest challenge to mobile security.<br />  </p> <p><img height="348" src="https://lh3.googleusercontent.com/55BODbr71o-UXXRNOYmBQeU1eWb5i8VW6cp8jSfJS1khZakdLaF5IQ4TbRHhSN_tvZ26m0a9kJvXqKz9j4oH6C9rNXpOPp3Jl9xn4muo6D5iUQihJ0q_4QhWunZ-GUQu2YWHFlmt" width="624" /></p> <p> </p> <p>This doesn’t really surprise me, for a couple of reasons. First, as mentioned earlier, mobile devices and apps have become a big part of our daily lives. They bring a ton of goodness and in turn, we have come to trust them. After all, they are so smart! However, it’s this unwavering level of trust that can easily lead to bad things. Take for instance the recent <a href="https://www.mobileiron.com/en/blog/Mitigating-the-WhatsApp-Pegasus-Attack">Pegasus attack on WhatsApp</a>. Do you recall hearing about that a few weeks ago? Talk about creativity! The attackers were able to gain access to users’ cameras and microphones, as well as location data, simply by calling their iOS or Android phones using the popular social platform, WhatsApp. What’s scary is that it wasn’t even necessary to answer the call. And because of this attack, WhatsApp had to scramble to implement a fix, and then notify and encourage nearly 1.5B users to upgrade to a new version of their app. And that’s just one recent example of an attack in which users were completely unaware. </p> <p>Mobile threats launched via device, network, application and phishing attacks are not only sneaky, but ongoing. Unfortunately, it’s lack of awareness on the part of users that allow these attacks to succeed. And, because more and more users today leverage their personal devices for work, the chances of inadvertently unleashing bad things into the corporate infrastructure have increased. MobleIron’s mobile-centric, zero trust architecture provides organizations with the most effective weapons to battle against these mobile threats.</p> <h4 class="oxygen"><br /> Not a pressing need? Really?</h4> <p class="oxygen"><br /> Another finding that I was surprised to read was that application control and regulation compliance are the top drivers for deploying a mobile security technology, whereas “mobile security is not a pressing need” and privacy are the top drivers for not deploying.</p> <p>Now, I do understand the requirement to maintain application control and regulation compliance.  However, to identify mobile security as “not a pressing need” does make me wonder. To me, any organization that chooses to enable the use of mobile devices, apps and cloud services to improve employee productivity should demand that a very comprehensive security architecture be in place to support that effort. This is even more critical when users are leveraging their own devices in a BYOD scenario, or when corporate-owned, personally enabled (COPE) devices are issued to knowledge workers and additional levels of freedom are provided (fewer restrictions in terms of apps, connectivity, access to cloud services, etc.). </p> <p>There are simply too many ways in which enterprise resources can (and likely will) become compromised if mobile security is either an afterthought or simply taken less seriously than other areas of security, such as applications and network, as called out in the NSS Labs report. This is certainly cause for concern. </p> <p>So, how does this tie into one of my childhood memories? Well, I think about how my friends and I fished in those ponds as often as we could, standing in that muddy water. We were very puny, yet determined anglers. We all worked as a team to constantly monitor our surroundings, making sure that gators never managed to sneak up and attack one of us from the weeds along the shoreline, nor managed to get so close to us in the water as to dine and dash. </p> <h4 class="oxygen"><br /> Your take on mobile security?</h4> <p class="oxygen"><br /> The  “NSS Labs Enterprise Intelligence Brief Mobility” report includes a number of additional insights. <a href="https://www.mobileiron.com/en/resources-library/security-reports/NSS-Labs-2019-Mobile-Security-Intelligence-Brief">Download it and give it a good read</a>. See how your organization’s beliefs and practices regarding mobile security compare with those of the more than 380 IT administrators who have already weighed in. Are you better prepared? Less prepared? Should be interesting to see!</p> <p>And if you’re interested in learning more about MobileIron’s mobile-centric, zero trust security platform, <a href="https://www.mobileiron.com/en/solutions/zero-trust">visit here</a>. The MobileIron security platform is built on the foundation of unified endpoint management (UEM) capabilities with additional zero trust-enabling technologies, including zero sign-on (ZSO), multi-factor authentication (MFA), and <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">mobile threat defense</a> (MTD).</p> <p> </p> </div> </div> </div> </div> Tue, 30 Jul 2019 12:21:26 +0000 fgosker 2220 at https://www.mobileiron.com Improving Your Organization’s Mobile Security Posture with the NCCoE’s Guide https://www.mobileiron.com/en/blog/improve-mobile-security-with-nccoe-guide <span>Improving Your Organization’s Mobile Security Posture with the NCCoE’s Guide</span> <span><span lang="" about="/en/user/7392" typeof="schema:Person" property="schema:name" datatype="">fgosker</span></span> <span>Mon, 07/22/2019 - 12:05</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fimprove-mobile-security-with-nccoe-guide" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fimprove-mobile-security-with-nccoe-guide&amp;title=Improving%20Your%20Organization%E2%80%99s%20Mobile%20Security%20Posture%20with%20the%20NCCoE%E2%80%99s%20Guide" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Improving%20Your%20Organization%E2%80%99s%20Mobile%20Security%20Posture%20with%20the%20NCCoE%E2%80%99s%20Guide&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fimprove-mobile-security-with-nccoe-guide" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/Improving-your-organizations-mobile-security/NCCoE-blog-inline-image.jpg" width="656" height="290" alt="Improving Your Organization’s Mobile Security Posture" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Over the last several months, MobileIron has been working closely with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) on the mitigation of mobile threats within the enterprise.</p> <p> <img alt="Improving Your Organization’s Mobile Security Posture with the NCCoE’s Guide" data-entity-type="file" data-entity-uuid="ba153f1a-b823-4ac3-9cdf-5e011f007a96" src="/sites/default/files/inline-images/NIST-NCCoE_logo.jpg" /></p> <p>The National Cybersecurity Center of Excellence (NCCoE) is a collaborative hub where industry organizations, government agencies, and academic institutions work together to address businesses’ most pressing cybersecurity challenges. The NCCoE has just released a <a href="https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/enterprise">draft practice guide</a>, titled "<em>Mobile Device Security: Corporate-Owned Personally-Enabled (COPE</em>)", leveraging industry, government, and academic expertise.</p> <p>This practice guide is for organizations that want to more securely deploy and manage mobile devices, such as smartphones and tablets. The NCCoE collaborated with technology vendors, including MobileIron, to successfully develop an example solution that organizations can reference to adapt and adopt increased security for their mobility programs. The guide contains three volumes, including the Executive Summary (part A); a description of Approach, Architecture and Security Characteristics (part B); and the How-to Guide (part C) with its detailed instructions for setup.</p> <p>This practice guide can help enterprises reduce their risk by showing how commercially available technologies like MobileIron* can be used to improve the security of their mobile infrastructure. MobileIron is redefining enterprise security with the industry’s first mobile-centric, <a href="/en/solutions/zero-trust" title="Zero Trust Security">zero trust platform</a> built on the foundation of unified endpoint management (UEM) to secure access and protect data across the perimeter-less enterprise.</p> <p>I encourage IT, professionals, to take advantage of the valuable information in the guide, as well as to reach out to us for the absolute latest perspectives on this rapidly-evolving security front. You may download the guide and provide your thoughts on the NCCoE website. Comments on the draft will be accepted through Sunday, September 22.</p> <p>*While the example implementation uses certain products, including MobileIron’s <a href="/en/products/uem" title="UEM Solutions">UEM</a>, NIST and the NCCoE do not endorse these products. The guide presents the characteristics and capabilities of those products, which an organization’s security experts can use to identify similar standards-based products that will fit within their organization’s existing tools and infrastructure.</p> </div> </div> </div> </div> Mon, 22 Jul 2019 19:05:43 +0000 fgosker 2217 at https://www.mobileiron.com FaceApp: It Won't Age Well https://www.mobileiron.com/en/blog/faceapp-privacy-concerns <span>FaceApp: It Won&#039;t Age Well</span> <span><span lang="" about="/en/user/1" typeof="schema:Person" property="schema:name" datatype="">jleavitt</span></span> <span>Thu, 08/01/2019 - 10:48</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffaceapp-privacy-concerns" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffaceapp-privacy-concerns&amp;title=FaceApp%3A%20It%20Won%27t%20Age%20Well" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=FaceApp%3A%20It%20Won%27t%20Age%20Well&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffaceapp-privacy-concerns" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/2019-08/faceapp-blog-inline-image.jpg" width="656" height="290" alt="FaceApp: It Won&#039;t Age Well" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>I’m not sure what’s with all the excitement around this FaceApp challenge, but it must be something to do with my middle age. My favorite basketball players and movie actors are posting old-age pictures of themselves onto Twitter and Instagram, and it just makes me feel that much older!</p> <p>In checking how many people have downloaded FaceApp from the iOS App Store, it certainly doesn’t look like just a passing fancy. The app has been around since 2017, and because of this latest viral fad, several curious users have raised a red flag because FaceApp’s developer is from Russia and the privacy agreement is a little sketchy.</p> <p>How it works: you take a selfie of yourself or someone you love (or hate) and apply an age filter that uses artificial intelligence magic and voilà, you have a picture of yourself or significant other that you can never unsee! The app asks for permission to access your camera for obvious reasons, but doing so means you potentially are sharing your existing camera roll and videos on your phone or tablet, as well as the endless selfies you will take as you get older. These personal artifacts can then be uploaded to cloud storage, not knowing how they will be safeguarded from abuse or bad actors on the web.</p> <p>Recently, the app has been updated and the author has responded to the privacy concerns, acknowledging that the morphing engine that makes you look virtually more beautiful or age advancing/defying using your facial data is done in the cloud. The app uploads the entire camera roll to the cloud, and this data is potentially stored for a short unspecified period. Pretty sneaky. </p> <p>Senator Chuck Schumer, Democrat from New York, has asked the FBI and FTC to investigate the app and the DNC has warned 2020 candidates not to use FaceApp.<br />  <br /> To each their own, but there is enough information to make a well-informed decision. Don’t allow this “leaky app” onto a managed mobile device with the potential for personal and work data to be lost. Now I sound like my parents! Enable MobileIron<a href="https://www.mobileiron.com/en/products/uem"> UEM</a>,<a href="https://www.mobileiron.com/en/products/mobile-threat-defense"> MTD</a>, and <a href="https://www.mobileiron.com/en/products/access">Access</a> just in case, though.</p> <p>MTD provides on-device detection and remediation, and adds an additional security layer with cloud-based threat intelligence for suspicious or out-of-compliance apps that exhibit certain characteristics and behavior like “record screenshots of user's interactions within the app”, “video record”, “camera roll read”, or “camera roll write.” You can also apply specific compliance actions like notify, monitor, block, quarantine, or completely retire the device from UEM.</p> <p>Besides, do you really want a picture of your old self floating around the ether? I can tell you, it won’t age well. See below for a demo of how MobileIron Threat Defense detected and remediated the “leaky” FaceApp in this short video:</p> <p> </p> <p><iframe allow="autoplay; fullscreen" allowfullscreen="" frameborder="0" height="480" src="https://player.vimeo.com/video/349086156" width="640"></iframe></p> </div> </div> </div> </div> Thu, 01 Aug 2019 17:48:15 +0000 jleavitt 2223 at https://www.mobileiron.com Embrace passwordless authentication to improve cyber defense and user convenience https://www.mobileiron.com/en/blog/embrace-passwordless-authentication-to-improve-cyber-defense-and-user-convenience <span>Embrace passwordless authentication to improve cyber defense and user convenience</span> <span><span lang="" about="/en/user/7392" typeof="schema:Person" property="schema:name" datatype="">fgosker</span></span> <span>Tue, 07/16/2019 - 12:26</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fembrace-passwordless-authentication-to-improve-cyber-defense-and-user-convenience" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fembrace-passwordless-authentication-to-improve-cyber-defense-and-user-convenience&amp;title=Embrace%20passwordless%20authentication%20to%20improve%20cyber%20defense%20and%20user%20convenience" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Embrace%20passwordless%20authentication%20to%20improve%20cyber%20defense%20and%20user%20convenience&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fembrace-passwordless-authentication-to-improve-cyber-defense-and-user-convenience" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/Embrace-passwordless-authentication/authentication-blog-inline-image.jpg" width="656" height="290" alt="Embrace passwordless authentication" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Despite its near-ubiquitous use for authentication, passwords have been the weakest link in enterprise security for many years now, playing the ignominious role in all major data breaches. The sheer volume of attacks, combined with the tactics, techniques, and procedures (TTPs) used in the attacks, the wide range of devices and credentials used to attack, and the rapid growth in cloud apps, have made it impossible for security teams to keep up.</p> <p><img alt="Embrace passwordless authentication to improve cyber defense and user convenience " data-entity-type="file" data-entity-uuid="ac72a46a-646c-4ebd-a524-52a3534e3227" src="/sites/default/files/inline-images/authentication-blog-copy-image.jpg" /></p> <p>The failure of legacy authentication methods that use passwords to handle the needs posed by the explosion in adoption of cloud- and mobile-centric services has led to an increase in attack surfaces and attack takeover (ATO) techniques. As a result, a majority of security-conscious enterprises are now actively looking to replace passwords to improve their exposure to risk.</p> <h4 class="oxygen"> </h4> <h4 class="oxygen">Passwordless Authentication Is Gaining Market Traction</h4> <p><a href="https://www.gartner.com/en/newsroom/press-releases/2019-03-05-gartner-identifies-the-top-seven-security-and-risk-ma">Gartner recently identified passwordless authentication</a> as a top emerging security and risk management trend for 2019, noting, “passwordless authentication…is starting to achieve real market traction.” (Gartner Press Release, “Gartner Identifies the Top Seven Security and Risk Management Trends for 2019”, March 5, 2019.)</p> <p>The report highlighted that passwordless authentication adoption is growing, driven by customer demand and the availability of biometric and strong authentication methods.</p> <p>Security, risk and identity leaders are actively seeking passwordless, mobile-centric strong authentication solutions to ensure authorized users, devices and apps can access business resources from any location.</p> <h4 class="oxygen"> </h4> <h4 class="oxygen">Frictionless Strong Authentication</h4> <p>By using mobile-centric and commercially available biometric authentication methods, enterprises can quickly achieve passwordless authentication today.</p> <p>Passwordless methods that tie users to their mobile devices with a biometric offer stronger authentication. This not only increases security, but also improves usability, leading to higher productivity and lower total cost of operation (TCO).</p> <p>Passwordless authentication methods, such as using a mobile-centric solution coupled with biometric authentication, provide the much-desired frictionless user-experience.</p> <h4 class="oxygen"> </h4> <h4 class="oxygen">Enter Zero Sign-On: Mobile-Centric Passwordless Authentication</h4> <p>As we know, passwords are easily compromised, not easy to manage and detested by users, so MobileIron decided to get rid of them with zero sign-on.</p> <p>Zero sign-on aims squarely at helping solve common security challenges, while improving user and administration experience, by providing the ability to securely access enterprise resources from all devices without requiring passwords. MobileIron enables passwordless authentication by replacing passwords with mobile devices as the user’s ID.</p> <p>Zero sign-on is inspired by the remarkably simple, yet effective “Zero Trust” concept, which was originally developed by Forrester Research to move security leaders away from a failed legacy approach to more modern approach to keep up with the demands of today’s digital business.<br /><br />  </p> <p><img alt="Embrace password less authentication" data-entity-type="file" data-entity-uuid="2dcd855b-2d56-4dad-8960-01a3286d2a37" src="/sites/default/files/inline-images/authentication-blog-copy3-image.jpg" /><br />  </p> <p><br /> To effectively address threats posed by this growth in cloud and mobile-centric use cases, MobileIron recently introduced its zero trust enterprise security platform, which makes mobile devices the ID for secure access to the enterprise.</p> <p>With MobileIron, your device becomes your ID for secure access to the enterprise, allowing your users (employees, partners, temporary workers) to access any app or service from any location or device.</p> <p>Now, you can finally eliminate passwords and enable a secure and frictionless user authentication experience from all devices without the hassle of remembering and typing in passwords. Just as important, by eliminating passwords, zero sign-on also eliminates one of the top causes for enterprise data breaches.</p> <h4 class="oxygen"><br /> Are you ready to go passwordless?</h4> <p>Getting rid of passwords to realize mobile-centric, zero trust enterprise security with <a href="https://www.mobileiron.com/en/solutions/zero-trust">zero sign-on</a> is a reality now. Contact a MobileIron <a href="https://info.mobileiron.com/ContactUs.html">expert</a> to get started today.</p> </div> </div> </div> </div> Tue, 16 Jul 2019 19:26:16 +0000 fgosker 2190 at https://www.mobileiron.com