Blogs https://www.mobileiron.com/en/blog/rss.xml/all?field_blog_taxo_target_id=All en Flexibility, Heterogeneity and End-User Choice: Key Reasons Why MobileIron over Microsoft https://www.mobileiron.com/en/blog/why-microsoft-customers-choose-mobileiron-part-1 <span>Flexibility, Heterogeneity and End-User Choice: Key Reasons Why MobileIron over Microsoft </span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 12/10/2019 - 12:48</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-1" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-1&amp;title=Flexibility%2C%20Heterogeneity%20and%20End-User%20Choice%3A%20Key%20Reasons%20Why%20MobileIron%20over%20Microsoft%20" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Flexibility%2C%20Heterogeneity%20and%20End-User%20Choice%3A%20Key%20Reasons%20Why%20MobileIron%20over%20Microsoft%20&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwhy-microsoft-customers-choose-mobileiron-part-1" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/blog-inline-image.jpg" width="656" height="290" alt="Key Reasons Why MobileIron over Microsoft " typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Last week, MobileIron’s CMO Rhonda Shantz shared the <a href="https://www.mobileiron.com/en/blog/9-reasons-microsoft-customers-choose-mobileiron">nine reasons why Microsoft customers choose MobileIron</a> to solve unified endpoint management (UEM) use cases. Over the coming weeks, I will discuss these reasons in more detail.<strong> </strong></p> <p> </p> <h3><b>1. Flexibility for Cloud, On-Premises and Hybrid Environment</b></h3> <p>First of all, MobileIron gives you and your partners the ability to secure on-premises apps, cloud apps, data, devices and identity – all in one solution.</p> <h4>Unified security platform</h4> <p>Modern enterprises continue to adopt a variety of software-as-a-service (SaaS) apps across every function, including HR, marketing, engineering, sales and more. As organizations shift from on-premises to SaaS and hybrid environments, a unified zero-trust security platform that supports diverse needs is mandatory. Most enterprises have a hybrid environment today, which requires secure and seamless end-user access to all apps – legacy and modern.</p> <p>Don’t rely on restrictive technologies – for example, Microsoft Azure AD conditional access – to support modern authentication for all apps. If an application does not support modern authentication, your only available option is location and requiring multi-factor authentication (MFA). Now, your organization will be at high risk of a security breach by allowing non-verified users continued use of critical apps and data from a non-compliant device.</p> <h4>Operational efficiency and superior administrator experience</h4> <p>MobileIron solutions make it easy for administrators to configure apps that are relevant to their employees and distribute them throughout the entire organization. For example, delegating administration control is a critical capability that provides operational efficiencies when you have offices worldwide, allowing more granular access and control to address the issues and devices relevant to the local environment.</p> <h4>Confidently Embrace Cloud Services</h4> <p>MobileIron gives customers and partners the ability to choose the deployment model they want, such as on-premises, in a data center provided by a partner, or via the cloud. For enterprises migrating their workloads and infrastructure to the cloud, MobileIron allows customers to move devices without any service interruption. This ensures full conformance with industry compliance mandates that you are responsible for.</p> <p> </p> <h3><b>2. The Modern Enterprise Stack is Heterogeneous: It’s not a Microsoft only world</b></h3> <p>At first blush, Microsoft’s integration may appear to be tighter; even if true, it is only with their own solutions. For today’s widely deployed best-of-breed SaaS and on-premises apps and services, the end-user experience with Microsoft Intune is underwhelming. Companies often want to keep their best-of-breed solutions – including email, office collaboration (Slack), identity (Ping, Okta), security, mobility and device infrastructure – because they have already worked through the implementation cycle.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-1.jpg" width="100%" /></p> <p> </p> <p>Microsoft’s approach, however, effectively locks out best-of-breed tools. On the flip side, organizations that rely on Microsoft for everything may be forced into the perpetual upgrades in Microsoft’s technology roadmap. Are you ready for Microsoft to lock your company’s operational and security direction now and in the future?</p> <p>If you lock yourself into Microsoft for everything from OS and CRM to collaboration, sharing, anti-malware and identity for your mobility and device infrastructure, you will not have many options with each renewal. You will soon realize that a Microsoft-only world also becomes very small and your ability to service your stakeholders rapidly shrinks.</p> <p> </p> <h3><b>3. End-user experience and choice matter</b></h3> <p>When user choice and end user experience matters, customers chose MobileIron for simpler onboarding, best on device experience, and best admin UI.</p> <p>MobileIron makes it possible for IT to enable employees to use any device with any app from any vendor, unlike Microsoft Intune, which limits IT and user choice. For example, Microsoft currently doesn’t support Android devices with a managed personal profile, frontline workers, or Samsung and Zebra devices with firmware over-the-air capabilities that are adopted by line of business (LOB) leaders from transportation, utility, communications, manufacturing, oil and gas industries.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-2.jpg" width="100%" /></p> <p class="foot_note">Courtesy: Honeywell</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-3.jpg" width="100%" /></p> <p class="foot_note">Courtesy: Zebra</p> <p> </p> <p>Choice of using and supporting Apple devices with macOS/iOS/tvOS requires full native support and control. MobileIron is the best solution for organizations that need to manage devices beyond Windows and iOS by supporting all possible end-user device use cases.</p> <p> </p> <p><img alt="photo" height="253" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-4.jpg" width="100%" /></p> <p class="foot_note">Courtesy: Oculus for Business</p> <p> </p> <p>If providing employees device and app choice matters to your organization as much as the seamless experience to access them, you need to look at your options differently. That’s where MobileIron excels and provides the best approach. From simple and scalable onboarding to the best on-device experience, our solutions offer flexibility for productivity that affects the bottom line.</p> <p> </p> <h3><b>Address the needs of your Modern Digital Workplace</b></h3> <p>Allowing users to work from any device, using any app, from any location, over any network is key to the success of the Modern Digital Workplace. Security that empowers IT and security leaders to secure business data across any device and app that employees choose – without affecting the user experience – is now a must. If security gets in the way of productivity, your users will find a way around it, and it won’t be a secure one.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/flexibility-heterogeneity-choice/photo-5.jpg" width="100%" /></p> <p> </p> <p>This diagram above shows the continuum of two critical forces at play in a modern enterprise: productivity and security. The more advanced controls you have, the stronger your security as you head toward Zero Trust. The more flexibility you have with apps and services that improve productivity, the closer you are to becoming a Modern Digital Workplace.</p> <p> </p> <h3><b>Get Started Now</b></h3> <p>To learn more about the challenges of switching to a Microsoft-only bundle, read our e-book <a href="https://www.mobileiron.com/en/resources-library/whitepapers/9-reasons-why-microsoft-customers-choose-mobileiron">here</a>. To find out more about how MobileIron can provide a comprehensive UEM solution that fits your needs, contact a MobileIron sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> <p> </p> </div> </div> </div> </div> Tue, 10 Dec 2019 20:48:58 +0000 sraikow 2468 at https://www.mobileiron.com Employee Spotlight: Michael Klieman https://www.mobileiron.com/en/blog/employee-spotlight-michael-klieman <span>Employee Spotlight: Michael Klieman</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 12/05/2019 - 14:54</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femployee-spotlight-michael-klieman" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femployee-spotlight-michael-klieman&amp;title=Employee%20Spotlight%3A%20Michael%20Klieman" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Employee%20Spotlight%3A%20Michael%20Klieman&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femployee-spotlight-michael-klieman" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/employee-spotlight-michael-klieman/blog-inline-image.jpg" width="656" height="290" alt="Michael Klieman" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>For this month’s Employee Spotlight, I sat down with Michael Klieman. He leads product management (PM) for MobileIron’s <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management (UEM) platform</a> out of our Mountain View, CA office. He also recently started a MobileIron cycling group. Let’s learn more about him!</p> <p> </p> <h4><b>What do you like most about working at MobileIron?</b></h4> <p>The thing I like most is that the team here is incredibly positive and collaborative. We operate in a highly competitive environment and every day we tackle complex problems for customers and the business -- having a great team is critical.</p> <p> </p> <h4><b>Tell me more about the MobileIron cycling group that you recently started. Do you get together for group rides?</b></h4> <p>The description of the group is, “For anyone interested in cycling to lend inspiration, share routes, schedule events, coordinate group rides, geek out on gear, and share your wisdom from the road.”</p> <p>We haven’t gotten together for group rides, but we do share a bunch of pictures (you should check out the crazy bike that Dustin Rhodes built) and talk gear.</p> <p> </p> <h4><b>What are your plans for the group? Do you have MobileIron cycle jerseys?</b></h4> <p>The group is doing what I hoped: offering a little fun and distraction for the team. If you enjoy cycling (or are curious), join the #mi-cycling Slack channel.</p> <p>I actually have a sample jersey with the new logo on it. Hopefully Santa will have something for our stockings :-)</p> <p> </p> <h4><b>How long have you been cycling? How did you get started? What do you like about it?</b></h4> <p>I’ve always had a bike and enjoyed riding off and on my whole life. Over the past several years, I’ve definitely ramped up my time on the bike. I love touring… being completely self-sufficient and the experience of heading out and literally going one-way. And while I’ve only occasionally been able to find the time to tour, I do make the time to go on long one-day rides. There’s nothing like the satisfaction that comes from completing something challenging. </p> <p> </p> <h4><b>Tell me about Cycle for the Cause that you recently took part in; what was it all about?</b></h4> <p>The Cycle for the Cause, also known as the Northeast AIDS Ride, is a 275 mile, 3-day ride from Boston to New York City. It’s the primary fundraiser of the LGBTQ Community Center in New York aimed at ending the HIV/AIDS epidemic.</p> <p> </p> <h4><b>Did you train? For how long? What was your training like?</b></h4> <p>I didn’t train specifically for this ride, but I was pretty confident that I could do it. Through late May and June, I trained extensively for the California Death Ride -- arguably the hardest ride I’ve ever done. I started with a big base (almost 2000 miles Jan-May) and in the 5 weeks before the Death Ride, I did four 100+ mile rides, each with progressively greater amounts of climbing.</p> <p>That got me ready for the actual event mid-July, which was 123 miles and 15,000 feet of climbing. After that soul-crushing experience, I took a well-deserved break for a couple of weeks before starting to get ready for the Cycle for the Cause event. In late August, I rode to our PM offsite in Monterey, which was a 116 mile affair, and then did one other century ride in early September. In general, it’s important to have a big base of consistent miles (something I could have used more of) combined with being comfortable doing really big rides.</p> <p> </p> <h4><b>What was your mindset before and after?</b></h4> <p>This is really where the story is. As soon as I arrived at the starting-line hotel in Framingham, MA the evening before the ride started, I was surrounded by hundreds of people who were clearly there for a cause. For three days and nights, I heard inspiring and heartbreaking stories of people who’ve watched as their friends, family, and community were ravaged by AIDS/HIV. They talked about the fear and hopelessness that this disease produced, the stigma and discrimination that comes right alongside infection, and the hope that’s come from the last decade’s medical advances.</p> <p>My mindset before I got there was centered on riding down part of the Atlantic Coast. Once I got there, I was humbled and incredibly grateful to be part of a truly extraordinary group with a such an important purpose.  </p> <p> </p> <h4><b>How much did you fundraise?</b></h4> <p>I raised about $3,000. Thanks to everyone at MobileIron who supported me on the ride! And the event in total raised an unbelievable $2.1 million.</p> <p> </p> <h4><b>What are your tips for someone doing this kind of cycling tour?</b></h4> <ol><li>Get a bike</li> <li>Build up your base over time -- aim for 3-4 one-hour rides (~15 miles each) per week for a few weeks.</li> <li>Add in one-two longer rides per week, working up to the point where a 40 mile ride is comfortable.</li> <li>Then start adding 5-10 miles to a ride once per week (50, 55, 60, etc.) until you can do a 75 mile ride without thinking you’re going to die. Now you’re in good shape to do some big riding ;-)</li> <li>Add in more climbing and try even longer rides every other week (make sure to give yourself some rest days).</li> <li>Always stretch and once you get over 1 hour on the bike make sure you carry Gatorade or some electrolyte replacement.</li> <li>Last but not least, try and mix in some core work.</li> </ol><p> </p> <h4><b>Anything else you’d like to share?</b></h4> <p>Anyone interested in learning more about bike touring should come by anytime.</p> </div> </div> </div> </div> Thu, 05 Dec 2019 22:54:04 +0000 sraikow 2461 at https://www.mobileiron.com Nine reasons why Microsoft customers choose MobileIron https://www.mobileiron.com/en/blog/9-reasons-microsoft-customers-choose-mobileiron <span>Nine reasons why Microsoft customers choose MobileIron</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 12/02/2019 - 14:44</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F9-reasons-microsoft-customers-choose-mobileiron" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F9-reasons-microsoft-customers-choose-mobileiron&amp;title=Nine%20reasons%20why%20Microsoft%20customers%20choose%20MobileIron" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Nine%20reasons%20why%20Microsoft%20customers%20choose%20MobileIron&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F9-reasons-microsoft-customers-choose-mobileiron" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/9-reasons-msft/blog-inline-image.jpg" width="656" height="290" alt="Nine reasons why Microsoft customers choose MobileIron" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Are you considering making the move to a Microsoft bundle with Intune? If so, you should take a close look as to what that means, including limits on end user choice and experience, security and operational flexibility that can slow growth plans for a modern digital workplace.</p> <p>In a highly competitive and noisy software security, mobility and identity industry – with lots of announcements that precede actual product capabilities – we are often asked by our customers how Microsoft and MobileIron complement each other and what are those uses cases. As a result, we identified <a href="https://www.mobileiron.com/en/resources-library/whitepapers/9-reasons-why-microsoft-customers-choose-mobileiron">nine reasons why many Microsoft customers choose MobileIron to close the gap</a> as they build a secure, digital workplace that aligns with their organizational goals:</p> <p> </p> <h4>1. Hybrid enterprises need the flexibility that MobileIron provides.</h4> <p>As organizations shift from the on-premises datacenter to SaaS apps, they need a unified security platform that will accommodate all their needs. Hybrid enterprises require secure and seamless end-user access to all apps – legacy and modern. Microsoft currently does not provide this. MobileIron, on the other hand, gives customers and partners the ability to secure on-premises apps, cloud apps, data, devices and identity – all in one solution. And MobileIron offers a consistent password-less experience for all apps.</p> <p> </p> <h4>2. It’s more than just a Microsoft world</h4> <p>Microsoft’s integrations may be tighter and end-user experiences smoother with their own solutions, but for competing best-of-breed apps and services that are widely deployed at many companies, the end-user experience is not the same. Companies often want to keep their best-of-breed solutions for email, office collaboration, identity, security, mobility and device infrastructure because they have already worked through the adoption cycle. However, Microsoft’s approach effectively locks out best-of-breed tools. On the flip side, organizations that rely on Microsoft for everything may be forced into every future change in Microsoft’s technology roadmap. Are you ready for only Microsoft to guide your company’s operational and security direction now and into the future?</p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/9-reasons-msft/photo-1.jpg" width="100%" /></p> <p> </p> <h4>3. End-user experience and choice matter</h4> <p>When user choice and end user experience matters, customers chose MobileIron for simpler onboarding, best on device experience, and best admin UI. MobileIron offers the flexibility to work on any device with any app from any vendor, whereas with Microsoft Intune you have to scrutinize the details of the use case. For example, MIcrosoft currently doesn’t support Android devices with a managed personal profile, frontline workers, Samsung and Zebra devices with firmware over-the-air or full macOS control. MobileIron is the best solution for organizations that need to manage devices beyond Windows and iOS by providing support for all possible end-user device use cases.</p> <p> </p> <h4>4. Demand identity, device, app and data security—all in one</h4> <p>The highest security posture can be achieved when companies can manage user and device authentication, device posture, app and data security in a single product. MobileIron’s zero trust approach provides the visibility and IT controls needed to secure, manage and monitor every device, user, app, and network being used to access business data. It protects data the ways it’s being accessed and used – no matter where it is, or who owns the devices and services involved. These critical capabilities lay the groundwork for the expanded business use cases that Intune can’t fully support.</p> <p> </p> <h4>5. Eliminate passwords today with MobileIron’s device-as-identity approach</h4> <p>MobileIron’s device-as-identity approach is the first of its kind on the market. MobileIron enables passwordless access to cloud services from any device – managed <em>or </em>unmanaged – using the mobile device as the user’s secure ID, whereas Microsoft’s approach starts and ends on the desktop. Microsoft currently only provides passwordless authentication for Windows Hello.</p> <p> </p> <h4>6. MobileIron integrates well with best of breed technology partners</h4> <p>The modern digital workplace requires the right tools and best-of-breed solutions to properly secure the way employees want and need to work. MobileIron integrates with over 380 ecosystem partners, including ServiceNow, Splunk and many more. We understand the value of IT admin time and think about how to pre-populate info from one solution to the next for ease of use for admins.</p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/9-reasons-msft/photo-2.jpg" width="100%" /></p> <p> </p> <h4>7. The high cost and complexity of switching solutions</h4> <p>The complexity of an Intune integration is significant because it requires a complete re-architecture of mobile infrastructure and there’s no easy tool to migrate. IT must build new policies, manually add all settings, roll out a global education program, offer help desk support for device migration, and more. We’ve estimated the tasks and time involved to complete a migration from MobileIron to another UEM provider such as Intune, and the price tag comes to about $100-$150 per person, per device<sup>1</sup>. Migration to Intune is both costly and highly disruptive to end users.</p> <p> </p> <h4>8. Choice of on-prem or SaaS deployments</h4> <p>Most Fortune 2000 companies were not born in the cloud and will need to have the flexibility to continue to deploy UEM on-premises and/or in the cloud. When deployed within a network infrastructure, MobileIron UEM can adhere to strict corporate security policies by storing all data on site. It can also run on virtual environments, which allows for seamless deployments on different setups. Microsoft doesn’t offer customers that same option; it only supports UEM deployment in the cloud.</p> <p> </p> <h4>9. Choose a proven leader, acknowledged for driving the convergence of mobility, security and identity</h4> <p>MobileIron, named a Leader in Gartner Magic Quadrants for 9 consecutive years<sup>2</sup>, has enjoyed a strong standing among industry analysts for years. Most recently, in Gartner’s 2019 Magic Quadrant Critical Capabilities, MobileIron ranked higher than Microsoft in three out of four Gartner use cases and five out of eight critical capabilities. MobileIron was also the only UEM vendor in the study, in addition to being named a strong performer in the most recent “2019 Forrester Zero Trust X Wave.”<sup>3</sup></p> <p>To learn more about the sacrifices of switching to a Microsoft-only bundle, read our e-book <a href="https://www.mobileiron.com/en/resources-library/whitepapers/9-reasons-why-microsoft-customers-choose-mobileiron">here</a>. To find out more about how MobileIron can provide a comprehensive solution that fits your needs, contact a MobileIron Sales representative <a href="https://info.mobileiron.com/ContactUs.html">here</a>.</p> <p> </p> <hr /><p>1 - All migration costs estimated by MobileIron, 2019.<br /> 2 - 2019 Gartner Critical Capabilities for Unified Endpoint Management (UEM), MobileIron.<br /> 3 - The Forrester Wave™: Zero Trust EXtended Ecosystem Platform Providers, Q4 2019, MobileIron.</p> </div> </div> </div> </div> Mon, 02 Dec 2019 22:44:02 +0000 sraikow 2451 at https://www.mobileiron.com Secure your mobile devices this holiday season https://www.mobileiron.com/en/blog/public-wifi-security-usb-juice-jacking <span>Secure your mobile devices this holiday season</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 11/26/2019 - 10:23</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fpublic-wifi-security-usb-juice-jacking" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fpublic-wifi-security-usb-juice-jacking&amp;title=Secure%20your%20mobile%20devices%20this%20holiday%20season" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Secure%20your%20mobile%20devices%20this%20holiday%20season&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fpublic-wifi-security-usb-juice-jacking" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/secure-holiday/blog-inline-image.jpg" width="656" height="290" alt="Secure your mobile devices this holiday season" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>The holidays can be stressful, and cybersecurity may not always be top of mind. However, you should be on the watch for cyber threats and vulnerabilities at airports, coffee shops, hotels, shopping malls and other public spots.</p> <p>For example, public USB charging stations are a convenient way to charge devices. But think twice before plugging into these stations. There’s a USB charging scam called “juice jacking,” in which hackers use public USB ports to infect smartphones with dangerous malware or steal personal data.</p> <p>While juice jacking attacks are relatively uncommon, avoid using public kiosks to charge your phone. Instead, plug your device into an AC power outlet or use a portable battery pack. If you do use a public kiosk, leverage a USB data blocker to achieve USB security; a data blocker allows charging, yet blocks any data transfer capability or USB malware from infecting your device.</p> <p>Public WiFi networks are also convenient, though they are often not secure. One of the most serious types of threats occurs when an attacker intercepts a mobile device’s network traffic through a man-in-the-middle (MITM) attack or rogue access point. This allows an attacker to read and capture credentials, emails, calendars, contacts and other sensitive data as a preliminary step in a more advanced attack on you or your employer.</p> <p>To protect your data in motion and increase public WiFi security, use a virtual private network (VPN) to encrypt your data when connecting to a public WiFi network. And, make sure to remove the public WiFi network from your device by deleting it when you are done. Otherwise, you can still be an easy target for a hacker.</p> <p>To further mitigate these risks, organizations should deploy <a href="https://www.mobileiron.com/en/products/uem">MobileIron Unified Endpoint Management</a> (UEM) with <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">MobileIron Threat Defense</a> (MTD). MTD can detect and remediate mobile threats, including device, network, app and phishing attacks, even when the device is offline. MTD offers continuous protection against mobile device threats, including malware, MITM attacks and unencrypted networks, that exploit user behavior and security gaps.</p> </div> </div> </div> </div> Tue, 26 Nov 2019 18:23:00 +0000 sraikow 2430 at https://www.mobileiron.com MobileIron named a leader in three IDC MarketScape reports for UEM and EMM capabilities https://www.mobileiron.com/en/blog/leader-idc-marketscape-uem-emm <span>MobileIron named a leader in three IDC MarketScape reports for UEM and EMM capabilities</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 11/25/2019 - 13:21</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fleader-idc-marketscape-uem-emm" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fleader-idc-marketscape-uem-emm&amp;title=MobileIron%20named%20a%20leader%20in%20three%20IDC%20MarketScape%20reports%20for%20UEM%20and%20EMM%20capabilities" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%20named%20a%20leader%20in%20three%20IDC%20MarketScape%20reports%20for%20UEM%20and%20EMM%20capabilities&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fleader-idc-marketscape-uem-emm" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/idc-marketscape/blog-inline-image.jpg" width="656" height="290" alt="IDC MarketScape reports for UEM" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>We are delighted to share with you that MobileIron has been named a Leader in the following three IDC MarketScape reports: Worldwide Unified Endpoint Management Software 2019–2020 Vendor Assessment<sup>1</sup>, Worldwide Enterprise Mobility Management Software 2019-2020 Vendor Assessment<sup>2</sup>, and Worldwide Enterprise Mobility Management Software for Ruggedized/ IoT Device Deployments 2019-2020 Vendor Assessment.<sup>3</sup></p> <p>In these reports, IDC identified eighteen providers and compared them in the categories of capabilities, strategy and market presence and selected MobileIron as a leader.</p> <p>MobileIron has also been named a Major Player in the IDC MarketScape: Worldwide Enterprise Mobility Management Software for SMB 2019-2020 Vendor Assessment.<sup>4</sup></p> <p> </p> <h4>UEM serves as the foundation to manage and secure today’s digital workplace</h4> <p>Unified endpoint management (UEM) plays a critical role in securing and helping CIOs and CISOs realize a modern digital workplace. MobileIron’s mobile-centric, zero trust security platform significantly reduces risk by giving organizations complete control over their business data as it flows across devices, apps, networks, and cloud services. </p> <p>Allowing users to work from any device, using any app, from any location, over any network is key to the success of today’s digital workplace. <a href="https://www.mobileiron.com/en/products/uem">MobileIron UEM</a> secures business data across any device and app that employees choose—without affecting the user experience.</p> <p> </p> <h4>Enables Line of Business Owners</h4> <p>The Worldwide Unified Endpoint Management Software 2019–2020 Vendor Assessment and Worldwide Enterprise Mobility Management Software 2019-2020 Vendor Assessment reports recognized MobileIron for enabling frontline workers with secure mobile productivity, stating, “MobileIron has strong support for frontline endpoint management capabilities, such as ‘ownerless’ device deployments where iOS/Android/Windows devices can be deployed and used by multiple users (e.g., shift workers using a device for a single purpose or focused/limited-access use case).”</p> <p>Today’s frontline workers are pushed to be more productive than ever before. That’s why they need secure mobile devices and apps that allow them to access the information and workflows they need on any device, wherever they work. As traditional network perimeters become obsolete, secure productivity requires a zero-trust approach that validates every frontline worker device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to a device or user.</p> <p>MobileIron enables Line of Business owners to provide, secure and manage the right devices (rugged devices, etc) and apps for their frontline workers and task workers improving business efficiencies.</p> <p> </p> <p><img alt="frontline workers and mobile" src="https://www.mobileiron.com/sites/default/files/Blog/2019/idc-marketscape/photo-1.jpg" width="100%" /></p> <p> </p> <p>With MobileIron UEM, organizations get a mobile-centric, zero trust security platform that supports frontline worker productivity in any environment, faster and more securely than ever before. Plus, IT has the confidence of knowing devices and apps are always in a consistent and secure state -- no matter how many users access them during the day.</p> <p> </p> <h4>Customers love our UEM solution</h4> <p>More than 19,000 customers, including the world’s largest financial institutions, intelligence agencies and other highly regulated companies, have chosen MobileIron to enable a seamless and secure user experience by ensuring only authorized users, devices, apps, and services can access business resources.</p> <p>We provide the industry’s best support and services and our customers love our product support and services. MobileIron has been singled out by customers for providing exceptional support services.</p> <p> </p> <h4>Get Started with MobileIron Today</h4> <p>Don’t get left behind and start your journey now. If you’d like to learn more about MobileIron UEM, please visit <a href="https://www.mobileiron.com/en/products/uem">here</a>. </p> <div> <div> </div> <div> </div> <div> <hr /><p>1  IDC MarketScape: Worldwide Unified Endpoint Management Software 2019–2020 Vendor Assessment, IDC #US45355119, November 2019</p> </div> <div id="ftn2"> <p>2  IDC MarketScape: Worldwide Enterprise Mobility Management Software 2019-2020 Vendor Assessment, IDC #US45353719, November 2019</p> </div> <div id="ftn3"> <p>3  IDC MarketScape: Worldwide Enterprise Mobility Management Software for Ruggedized/ IoT Device Deployments 2019-2020 Vendor Assessment, IDC #US45353819, November 2019</p> </div> <div id="ftn4"> <p>4  IDC MarketScape: Worldwide Enterprise Mobility Management Software for SMB 2019-2020 Vendor Assessment , IDC # US45353919, November 2019</p> </div> </div> </div> </div> </div> </div> Mon, 25 Nov 2019 21:21:16 +0000 sraikow 2427 at https://www.mobileiron.com MobileIron Recognized as a November 2019 Gartner Peer Insights Customers’ Choice https://www.mobileiron.com/en/blog/2019-gartner-peer-insights-customers-choice-uem <span>MobileIron Recognized as a November 2019 Gartner Peer Insights Customers’ Choice</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 11/21/2019 - 13:07</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2019-gartner-peer-insights-customers-choice-uem" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2019-gartner-peer-insights-customers-choice-uem&amp;title=MobileIron%20Recognized%20as%20a%20November%202019%20Gartner%20Peer%20Insights%20Customers%E2%80%99%20Choice" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%20Recognized%20as%20a%20November%202019%20Gartner%20Peer%20Insights%20Customers%E2%80%99%20Choice&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F2019-gartner-peer-insights-customers-choice-uem" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/peer-inisghts-2019/blog-inline-image.jpg" width="656" height="290" alt="2019 Gartner Peer Insights Customers’ Choice" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Our MobileIron team is very honored to have been recognized as a November 2019 Gartner Peer Insights Customers’ Choice for Unified Endpoint Management Tools, for the third time in a row. We’d like to extend a big thank you to those customers who submitted reviews, and to those who continue to shape the future of our products and services.</p> <p>We are also thrilled that MobileIron is the only Leader in the August 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools to also be named a <a href="https://www.gartner.com/reviews/customers-choice/unified-endpoint-management-tools">November 2019 Customers’ Choice for the UEM Tools market</a>. At MobileIron, we are laser-focused on helping our customers address their top security challenges.</p> <p><strong>Here are some excerpts of what MobileIron Customers are saying that led to this distinction:</strong></p> <ul><li><em>“Everything a company needs to be UEM ready for now and in the future!”<br />  </em><a href="https://www.gartner.com/reviews/review/view/1025713"><em>Application Manager in the Government Industry</em></a><br />  </li> <li><em>“Strong UEM strategic vision, robust partnerships, and ease of implementation.” </em><br /><a href="https://www.gartner.com/reviews/market/unified-endpoint-management-tools/vendor/mobileiron/product/mobileiron-enterprise-mobility-management-platform/review/view/922936"><em>End Point Solutions Architect in the Healthcare Industry</em></a><br />  </li> <li><em>“One of the must-have solutions for all Cloud Based IT Operations.” </em><br /><a href="https://www.gartner.com/reviews/review/view/997048"><em>IT Service Manager</em></a><a href="https://www.gartner.com/reviews/review/view/997048"><strong><em> </em></strong></a><a href="https://www.gartner.com/reviews/review/view/997048"><em>in the</em></a><a href="https://www.gartner.com/reviews/review/view/997048"><strong><em> </em></strong></a><a href="https://www.gartner.com/reviews/review/view/997048"><em>Miscellaneous Industry</em></a><br />  </li> <li><em>“Our Mobile Devices are now secure and end users don't have to be concerned at all.”<strong> </strong></em><br /><a href="https://www.gartner.com/reviews/review/view/1015000"><em>Software Analyst</em></a><a href="https://www.gartner.com/reviews/review/view/1015000"><strong><em> </em></strong></a><a href="https://www.gartner.com/reviews/review/view/1015000"><em>in the</em></a><a href="https://www.gartner.com/reviews/review/view/1015000"><strong><em> </em></strong></a><a href="https://www.gartner.com/reviews/review/view/1015000"><em>Miscellaneous Industry</em></a></li> <li><em>“We've been using it for the past 5 years and everything is just perfect.”</em><br /><a href="https://www.gartner.com/reviews/market/unified-endpoint-management-tools/vendor/mobileiron/product/mobileiron-enterprise-mobility-management-platform/review/view/1028287"><em>Software Analyst, miscellaneous industry</em></a></li> </ul><p>We are extremely grateful for this Gartner Peer Insights Customers’ Choice recognition. To ensure fair evaluation, Gartner maintains <a href="https://gartner.com/reviews-pages/peer-insights-customers-choice-methodology/">rigorous criteria</a> for evaluating vendors. To be named a Customers’ Choice, vendors must have a product that is aligned to the market, achieve an overall rating (out of 5 stars) equal or higher than the mean rating for that market, and meet coverage requirements for volume and diversity of reviews across industry verticals, company sizes and deployment regions.</p> <p>This follows the announcement that MobileIron was named a Leader in the 2019 <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-magic-quadrant-for-unified-endpoint-management?utm_medium=sem&amp;utm_source=adwords&amp;utm_campaign=uem&amp;utm_content=uem-uem&amp;gclid=EAIaIQobChMIjt-rmp6V5QIVIiCtBh3xZAjtEAAYAiAAEgIXOvD_BwE">Gartner Magic Quadrant for Unified Endpoint Management Tools</a> report. Additionally, MobileIron was recognized in the <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/gartner-critical-capabilities-uem">2019 Gartner Critical Capabilities for Unified Endpoint Management Tools</a> report. We believe this reflects our continued commitment to delivering security innovation and superior customer service.</p> <p><a name="_heading=h.gjdgxs" id="_heading=h.gjdgxs"></a>If you have a MobileIron story to share, we encourage you to join the <a href="https://www.gartner.com/reviews/market/unified-endpoint-management-tools/vendor/mobileiron">Gartner Peer Insights</a> crowd and weigh in.</p> <p> </p> <hr /><p><em>Gartner, Magic Quadrant for Unified Endpoint Management Tools, Chris Silva, Manjunath Bhat, et al., 6 August 2019.</em></p> <p><em>Gartner, Critical Capabilities for Unified Endpoint Management Tools, Chris Silva, Rich Doheny, et al., 10 October 2019. </em></p> <p><strong><em>Gartner Peer Insights Customers’ Choice disclaimer:</em></strong><br /><em>Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.</em></p> <p><strong><em>Magic Quadrant disclaimer:</em></strong><br /><em>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</em></p> </div> </div> </div> </div> Thu, 21 Nov 2019 21:07:11 +0000 sraikow 2419 at https://www.mobileiron.com Poking Holes in 5G with 5GReasoner https://www.mobileiron.com/en/blog/5greasoner-5g-vulnerabilities <span>Poking Holes in 5G with 5GReasoner</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Fri, 11/15/2019 - 11:19</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F5greasoner-5g-vulnerabilities" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F5greasoner-5g-vulnerabilities&amp;title=Poking%20Holes%20in%205G%20with%205GReasoner" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Poking%20Holes%20in%205G%20with%205GReasoner&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F5greasoner-5g-vulnerabilities" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/5greasoner/blog-inline-image.jpg" width="656" height="290" alt="5GReasoner, 5G Network Vulnerabilities &amp; Security, 5G Security Flaws" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>This week, we were once again greeted to a chorus of alarm bells heralding the latest vulnerabilities in the emerging 5G network. I’m afraid to say we are going to need to get used to it. We first heard about the possibility of launching <a href="https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/">targeted MiTM attacks</a> via 5G networks this summer at Black Hat. Now, researchers at Purdue University and the University of Iowa have published a new <a href="https://relentless-warrior.github.io/wp-content/uploads/2019/10/5GReasoner.pdf">paper</a> detailing 11 new 5G vulnerabilities.</p> <p> </p> <h4>How did they do it?</h4> <p>This is actually the most fascinating part. The researchers built a tool called “<strong>5GReasoner</strong>,” which essentially analyzes the 5G protocol stack to reveal 5G weaknesses. It’s important to note that the data set they tested against was based on theoretical modeling, since there are some challenges around collecting real-world 5G data sets right now -- there isn’t a lot of 5G in the wild and presumably the researchers would have needed to travel to a place that had 5G and stay there for a while; tough on a student budget right? <strong>5GReasoner</strong> hasn’t been released to the public and I wonder if it might have some commercial viability. When we begin to see “network slicing” (think private 5G networks) technology take off in the enterprise, there will be a need to test the sanctity of these networks.</p> <p>At any rate, the researchers’ findings are based on the 5G protocol stack in theory, not live data. That’s important because no two infrastructure vendors are going to implement the 5G protocol spec exactly the same; as with many protocols, there’s too much ambiguity in the spec and wriggle room in the standards. In my opinion, that means that once 5G networks truly become ubiquitous, we are going to see many more 5G security flaws, and many will be vendor-specific. And then of course, there’s Huawei. The US wants to ban them as an untrusted 5G infrastructure provider (they could be spying), but they <a href="https://www.npr.org/2019/10/24/759902041/chinas-tech-giant-huawei-spans-much-of-the-globe-despite-u-s-efforts-to-ban-it">continue to flourish internationally</a>.</p> <p> </p> <h4>What did they find?</h4> <p>The researchers reported their findings to the <a href="https://www.gsma.com/">GSMA</a>, a global telecom body that called the findings “nil or low impact.” Nevertheless, they felt they were important enough to add the researchers to their Mobile Security Research Hall of Fame. Here are some of the vulnerabilities they were able to theoretically exploit (many of these require a fake base station/small cell):</p> <ol><li>You can find a person’s location</li> <li>You can run up someone’s wireless bill with a replay attack. (NAS counter reset)</li> <li>MiTM attacks, Denial of Service Attacks, Battery depletion attacks</li> <li>You can Hijack the paging channel and create a fake emergency alert</li> </ol><p>GSMA dismisses these as low impact because they are based on the theoretical 5G protocol spec. However, do these seem relevant to you? Because in reality there are going to be <strong><em>many more exploits</em></strong> in the actual 5G network than the theoretical one.</p> <p> </p> <h4>What can we do?</h4> <p>Stay vigilant. That means if you haven’t done so yet, it’s the right time to move to a zero trust framework. We don’t know where the next attack or vulnerability is going to come from, but we can take steps to prepare. The first step is to stop trusting devices that we aren’t constantly monitoring. The next step is to take action the moment we discover any anomalies, actions such as removing all sensitive enterprise content, blocking a device from accessing cloud and enterprise resources, or even wiping a device entirely. Monitoring is important, but protecting your organization by acting swiftly is absolutely critical.</p> <p>Before we allow a device to access enterprise content or cloud services, we need to make sure it passes our most stringent tests. We need to be certain that a 5G device isn’t rooted or jailbroken, is running the latest and most secure version of the OS and security patches, never transmits unencrypted data, and isn’t currently undergoing a 5G MiTM or any other kind of attack. MobileIron provides tools like <a href="https://www.mobileiron.com/en/products/mobile-threat-defense" title="mobile threat defense">MobileIron Threat Defense</a> and <a href="https://www.mobileiron.com/en/products/access" title="zero sign on">Access</a> that can help protect your organization from emerging threats. Click to learn more about the only mobile security platform mentioned in <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/forrester-wave-zero-trust-report">The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019</a> report, or to have a MobileIron rep contact you, please click <a href="https://info.mobileiron.com/ContactUs.html">here.</a></p> </div> </div> </div> </div> Fri, 15 Nov 2019 19:19:49 +0000 sraikow 2416 at https://www.mobileiron.com MobileIron and Zebra FOTA: Closing the gap in Android threat remediation https://www.mobileiron.com/en/blog/3-ways-to-secure-zebra-phones <span>MobileIron and Zebra FOTA: Closing the gap in Android threat remediation</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 11/11/2019 - 10:11</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F3-ways-to-secure-zebra-phones" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F3-ways-to-secure-zebra-phones&amp;title=MobileIron%20and%20Zebra%20FOTA%3A%20Closing%20the%20gap%20in%20Android%20threat%20remediation" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%20and%20Zebra%20FOTA%3A%20Closing%20the%20gap%20in%20Android%20threat%20remediation&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F3-ways-to-secure-zebra-phones" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/zebra/blog-inline-image.jpg" width="656" height="290" alt="zebra phone security, zebra device security, android zebra fota" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Over the years, Android devices have been the targets of all kinds of exploits. Some exploits are simply annoying while others can take over the entire device and download other forms of malware without the user knowing. Some attackers even offer legitimate services through malicious apps that are widely available and downloaded through third-party app stores. While Android's open-source operating system has provided affordable mobile access to millions of people around the world, it has also made it easier for hackers to infiltrate devices. </p> <p>Large device manufacturers have taken enormous steps to help consumers protect their personal devices from Android exploits. But what about enterprise users?</p> <p>Mobile employees with corporate-owned devices tend to worry less about malicious threats because they assume their IT department has all of their security bases covered. This sometimes means mobile employees are less vigilant about good security hygiene — which can make the job of mobile IT security that much harder. In addition, because corporate-owned mobile devices are widely dispersed around the company (or around the world), it can be a huge challenge to keep them consistently updated with the latest security patches.</p> <p>The good news is, MobileIron provides comprehensive <a href="https://www.mobileiron.com/en/unified-endpoint-management/solutions/mobile-device-management" title="mobile device management (MDM)">mobile device management (MDM)</a> and security for all of your corporate-owned Android devices (as well as iOS, macOS, Windows 10, and more). Our mobile-centric, zero trust <a href="https://www.mobileiron.com/en/products/uem" title="UEM platform">unified endpoint management (UEM) platform</a> helps you proactively prevent mobile threats on Zebra devices because our solution is fully integrated with Zebra’s Lifeguard for Android service, which delivers critical firmware over the air (FOTA) updates. This helps automate and simplify three key steps to prevent device and OS level threats:</p> <ol><li> <p><strong>Identify threats.</strong> <a href="https://www.mobileiron.com/en/products/mobile-threat-defense" title="Mobile threat defense (MTD)">MobileIron Threat Defense (MTD)</a> proactively detects and remediates threats on the device using machine learning and forensics that can alert admins when an exploit is detected. </p> </li> <li> <p><strong>Mitigate risk. </strong>MobileIron UEM can be configured to apply a security policy based on the threat level. For instance, if high-risk attacks like Android zero-day, Xhelper, or man-in-the-middle exploits are detected, the device can be blocked or quarantined from corporate access until the threat is remediated.</p> </li> <li> <p><strong>Update software to fix the exploit. </strong>MobileIron’s support for FOTA means that IT can instantly push security fixes to any or all Zebra devices to protect them from the exploit. Not only does this provide immediate protection, it eliminates the time-consuming task of manually updating every corporate-owned device. It also ensures 100% coverage for OS updates because no user action is required to install and activate security patches. </p> </li> </ol><p>If you’re an IT security professional worried about the latest Android threat dominating the headlines, you can hopefully sleep better at night knowing that MobileIron has you covered with Android MDM.</p> <p>Want to learn more? Find out how MobileIron is helping customers deploy <a href="https://www.mobileiron.com/en/unified-endpoint-management/operating-systems/android-device-management/zebra" title="zebra phone security">Zebra phone security</a> to frontline employees wherever they work.</p> </div> </div> </div> </div> Mon, 11 Nov 2019 18:11:46 +0000 sraikow 2409 at https://www.mobileiron.com MobileIron named a Leader in The Forrester Wave: Unified Endpoint Management https://www.mobileiron.com/en/blog/leader-forrester-wave-uem-q4-2019 <span>MobileIron named a Leader in The Forrester Wave: Unified Endpoint Management</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Mon, 11/11/2019 - 14:29</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fleader-forrester-wave-uem-q4-2019" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fleader-forrester-wave-uem-q4-2019&amp;title=MobileIron%20named%20a%20Leader%20in%20The%20Forrester%20Wave%3A%20Unified%20Endpoint%20Management" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%20named%20a%20Leader%20in%20The%20Forrester%20Wave%3A%20Unified%20Endpoint%20Management&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fleader-forrester-wave-uem-q4-2019" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/forrester-uem-2019/blog-inline-image.jpg" width="656" height="290" alt="The Forrester Wave: UEM" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>We are ecstatic that MobileIron has been named a Leader in <a href="https://www.mobileiron.com/en/company/press-room/press-releases/independent-research-firm-names-mobileiron-leader-uem">The Forrester Wave™: Unified Endpoint Management, Q4 2019 report</a>. In the report, Forrester identified 13 providers that matter the most and how they compare using 23 evaluation criteria in the categories of current offering, strategy and market presence. MobileIron earned the highest possible scores in the product support and services and   partner ecosystem criteria.</p> <p> </p> <h3>UEM is critical to the success of the modern digital workplace</h3> <p>Forrester has identified better digital employee experience, modern management and security as critical factors that differentiate UEM providers and we could not agree more.</p> <p> </p> <h3>Enabling better digital experience</h3> <p>Today’s digital workplace could be anywhere: on a plane, in the mountains, on public transit, at a home office or corporate workspace, or on the beach. This modern digital workplace plays a critical part in fueling digital transformation within organizations. Digital workplace initiatives rely on giving users a choice to use a wide range of apps, devices and technologies facilitate and advance business velocity.  To stay productive, employees need seamless and secure access to business resources from their mobile devices, wherever they work. </p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/forrester-uem-2019/photo-1.jpg" width="100%" /></p> <p> </p> <p>Our mobile-centric zero trust approach provides comprehensive security for digital workplaces, so companies can be productive and secure at the same time. It validates every device, establishes user context, checks app authorization, verifies networks, and detects and remediates threats, before granting access to corporate data. It creates the ideal intersection between high-grade security and the way people want to work, so organizations can free their employees to be productive without limits.</p> <p> </p> <h3>Zero Trust Security</h3> <p>MobileIron is redefining enterprise security with a mobile-centric, zero trust approach that’s built on an unified endpoint management (UEM) foundation to secure access across the perimeter-less enterprise. Our new approach to security allows you to:</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/forrester-uem-2019/photo-2.jpg" width="100%" /></p> <p> </p> <p>MobileIron’s approach to mobile-centric, zero trust security significantly reduces risk by giving you complete control over your business data as it flows across devices, apps, networks, and cloud services.  It natively supports all the key components of a Zero Trust eXtended ecosystem such as network security, device security, data security, workload security and people security. It also natively supports many security technologies such as email classification, per-app VPN tunneling and many more. Recently, MobileIron was recognized a strong performer in <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/forrester-wave-zero-trust-report">The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 report</a>.</p> <p>Our MobileIron Threat Defense (MTD) solution is integrated with our UEM platform and blocks and remediates all types of mobile device threats on your mobile device. It detects and remediates mobile threats such as device, network, app and phishing attacks, even when the device is offline. MTD helps protect against Android threats and iOS vulnerabilities with continuous protection against mobile device threats that exploit user behavior and security gaps. It enforces local remediation with mobile defense capabilities such as notifying users or quarantining iOS and Android devices.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/forrester-uem-2019/photo-3.jpg" width="100%" /></p> <p> </p> <p>Our Zero Sign-on solution is a passwordless authentication by using mobile devices as the user ID and primary factor for authentication.  It eliminates the need for passwords on any device — managed or unmanaged. You can go beyond single sign-on (SSO), which still requires a password. With Zero Sign-On you get adaptive authentication, including multi-factor authentication (MFA), based on risk.</p> <p> </p> <h3>Native modern management</h3> <p>Our UEM management platform is open, comprehensive and transformative. It uses modern management principles and architecture to secure any cloud, all popular operating systems (iOS, Android, macOS, Win10), SaaS apps, legacy apps and all devices that make up todays digital workplace. Our management platform integrates with a wide variety of apps, SaaS tools and infrastructure components that are a must to have for today’s modern enterprise.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/forrester-uem-2019/photo-4.jpg" width="100%" /></p> <p> </p> <h3>Market Leading Partner Ecosystem</h3> <p>MobileIron partners with leading companies to offer the industry’s most comprehensive UEM ecosystem to our customers. We offer on-premises and cloud-based solutions for the enterprise, from 50 users to organizations with hundreds of thousands of users.  This helps customers to extend the reach of use cases that can be solved using MobileIron UEM platform.</p> <p> </p> <p><img alt="photo" src="https://www.mobileiron.com/sites/default/files/Blog/2019/forrester-uem-2019/photo-5.jpg" width="100%" /></p> <p> </p> <h3>Our customers love the breadth and depth of our UEM solution</h3> <p>We provide the industry’s best support and services and our customers love our product support and services which includes the following:</p> <ul type="disc"><li>Assessment, Implementation and Strategy consulting services</li> <li>Fully managed management, security and help desk services</li> <li>Dedicated support, 24x7x365 support and global availability</li> </ul><p>MobileIron has been singled out by customers for providing exceptional support services.</p> <p>Since our first product release more than 13 years ago, more than 19,000 customers, including the world’s largest financial institutions, intelligence agencies and other highly regulated companies, have chosen MobileIron to enable a seamless and secure user experience by ensuring only authorized users, devices, apps, and services can access business resources.</p> <p> </p> <h3>Get Started with MobileIron Today</h3> <p>MobileIron was also recently ranked as a Strong Performer in <a href="https://www.mobileiron.com/en/resources-library/analyst-reports/forrester-wave-zero-trust-report">The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 report</a>. If you’d like to learn more about MobileIron UEM, please visit <a href="https://www.mobileiron.com/en/products/uem">here</a>. </p> </div> </div> </div> </div> Mon, 11 Nov 2019 22:29:17 +0000 sraikow 2410 at https://www.mobileiron.com checkm8 Jailbreak: “Don’t let the checkra1n down on me!” https://www.mobileiron.com/en/blog/risks-of-checkra1n-ios-jailbreak <span>checkm8 Jailbreak: “Don’t let the checkra1n down on me!”</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 11/07/2019 - 14:11</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Frisks-of-checkra1n-ios-jailbreak" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Frisks-of-checkra1n-ios-jailbreak&amp;title=checkm8%20Jailbreak%3A%20%E2%80%9CDon%E2%80%99t%20let%20the%20checkra1n%20down%20on%20me%21%E2%80%9D" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=checkm8%20Jailbreak%3A%20%E2%80%9CDon%E2%80%99t%20let%20the%20checkra1n%20down%20on%20me%21%E2%80%9D&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Frisks-of-checkra1n-ios-jailbreak" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2019/checkm8-Jailbreak/blog-inline-image.jpg" width="656" height="290" alt="checkm8 Jailbreak, checkra1n exploit explained, checkra1n ios vulnerability, what is checkra1n, checkra1n release date" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><h3>Background</h3> <p>Do you remember the <a href="https://twitter.com/axi0mX/status/1177544174163263489">checkm8 announcement on Twitter</a> back on Sept. 27 that announced a “forever day” SecureROM Jailbreak for the following Apple iDevices running the A5 to A11 chips?</p> <ul><li>iPhone 4s to iPhone X</li> <li>iPad 2 to 7</li> <li>iPad mini 1 to iPad mini 4</li> <li>iPad Pro 1 and 2.</li> <li>Apple TV 3 to 4K</li> <li>iPod touch 5 to 7</li> </ul><p>The iPhone XS, XS Max, XR, iPhone 11, 11 Pro, and 11 Pro Max, along with the 11” and 12.9” iPad Pro running the A12 and A13 chips are not affected.</p> <p> </p> <p><img alt="photo-1" src="https://www.mobileiron.com/sites/default/files/Blog/2019/checkm8-Jailbreak/photo-1.jpg" width="100%" /></p> <p> </p> <p>We also <a href="https://www.mobileiron.com/en/blog/apple-checkm8-forever-day-exploit">wrote a blog post about it here</a> on Oct. 1, which stated,<em>“When a full jailbreak is created, MobileIron UEM will be able to detect the device health is out of compliance and halt the enrollment process preventing the provisioning of VPN, WiFi, email, identity certificates, managed apps, and content onto the device. </em><a href="https://www.mobileiron.com/en/products/mobile-threat-defense"><em>MobileIron Threat Defense (MTD)</em></a><em> will also be able to detect the Jailbreak state and quickly remediate any UEM-provisioned settings on the device via quarantine or selective wipe compliance actions after the device has enrolled to UEM. Access to enterprise and cloud resources will also be blocked.”</em></p> <p> </p> <h3>Introducing the checkra1n exploit!</h3> <p>Apparently, <a href="https://twitter.com/Yalujb/status/1191803295045521408">that day is coming this Friday, Nov. 8</a>, with the full permanent Jailbreak called checkra1n!</p> <p>Some websites and followers boldly state<em>, “This Jailbreak enables iOS downgrading and upgrading to any version without SHSH2 blobs and dual booting of iPhones. Simply, you will see Android running iPhones in the near future thanks to Checkm8 Jailbreak!”</em></p> <p> </p> <h3>Here’s an umbrella and a trench coat for <strong>checkra1n security</strong></h3> <p>Good news! We have confirmed that <a href="https://www.mobileiron.com/en/products/uem">MobileIron Unified Endpoint Management (UEM)</a> and <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">MobileIron Threat Defense (MTD)</a> are both able to detect the checkra1n vulnerability! MTD is also able to detect five unique device-level threats (Vulnerable iOS Version, Device Jailbroken/Rooted, Elevation of Privileges (EoP), File System Changed, and System Tampering), as well as the Sideloaded App threat at the app-level for the installation of package managers like Cydia, Installer, or Zebra apps. If a Configuration Profile is also installed, then the Suspicious Profile threat will be triggered.</p> <p><strong> </strong></p> <p><strong><img alt="photo-2" src="https://www.mobileiron.com/sites/default/files/Blog/2019/checkm8-Jailbreak/photo-2.jpg" width="100%" /></strong></p> <p> </p> <h3><strong>Wear your rain boots also!</strong></h3> <p>A permanent Jailbreak might sound cool to customize your device and load any app you want, but the immediate results can lead to cybercriminals taking over your device without you knowing! Your company will not allow your iDevice to connect to the corporate network or cloud resources if the potential for threats living on the device is detected. Allowing this means your company will be the victim of a data breach where the malicious exploit can move laterally from your iDevice to the corporate network to harvest more credentials and sensitive company data. Deploy MobileIron UEM, MTD, and Access as a multi-layered security framework to protect your personal information and your company secrets from cybercriminals!</p> <p> </p> <h3><strong>How to detect checkra1n jailbreak</strong><br />  </h3> <p> <style type="text/css"> <!--/*--><![CDATA[/* ><!--*/ .embed-container { position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; max-width: 100%; } .embed-container iframe, .embed-container object, .embed-container embed { position: absolute; top: 0; left: 0; width: 100%; height: 100%; }<br /> /*--><!]]>*/ </style></p> <div class="embed-container"><iframe allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/3DRLv4PoOMM"></iframe></div> <p> </p> <h3><strong>checkra1n capabilities</strong></h3> <p> </p> <table border="0" cellspacing="20" width="100%"><tbody><tr><td valign="top" width="49%"><strong>Supported iDevices:</strong> <p> </p> <p> </p> <p> </p> <ul><li>iPhone 4s to iPhone X</li> <li>iPad 2 to 7</li> <li>iPad mini 1 to iPad mini 4</li> <li>iPad Pro 1 and 2</li> <li>Apple TV 3 to 4k</li> <li>iPod touch 5 to 7</li> </ul></td> <td> </td> <td valign="top" width="49%"><strong>Unsupported iDevices:</strong> <p> </p> <p> </p> <p> </p> <ul><li>iPhone XS, XS Max and XR</li> <li>iPhone 11, 11 Pro, and 11 Pro Max</li> <li>iPad Pro 11" nad 12.9"</li> </ul></td> </tr><tr><td valign="top" width="1%"> </td> <td valign="top" width="1%"> </td> <td valign="top" width="1%"> </td> </tr><tr><td valign="top" width="50%"><strong>Capabilities:</strong> <p> </p> <p> </p> <p> </p> <ul><li>Run any app (app store or 3rd party)</li> <li>Downgrade or upgrage iOS version</li> <li>Dual-boot Android or Windows OS</li> </ul></td> <td> </td> <td valign="top" width="50%"><strong>Security and privacy risks:</strong> <p> </p> <p> </p> <p> </p> <ul><li>Not checked for app security</li> <li>Can contain malicious exploit</li> <li>Take complete control of mobile device (steal credentials and lateral movement)</li> <li>Blocked from connecting to enterprise network</li> </ul></td> </tr></tbody></table><p> </p> </div> </div> </div> </div> Thu, 07 Nov 2019 22:11:46 +0000 sraikow 2399 at https://www.mobileiron.com