Blogs https://www.mobileiron.com/en/blog/rss.xml/all?field_blog_taxo_target_id=All en MobileIron + Teamwire: Secure communications for remote workers https://www.mobileiron.com/en/blog/mobileiron-and-teamwire-secure-communications-for-remote-workers <span>MobileIron + Teamwire: Secure communications for remote workers</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Wed, 04/01/2020 - 13:38</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileiron-and-teamwire-secure-communications-for-remote-workers" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileiron-and-teamwire-secure-communications-for-remote-workers&amp;title=MobileIron%20%2B%20Teamwire%3A%20Secure%20communications%20for%20remote%20workers" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%20%2B%20Teamwire%3A%20Secure%20communications%20for%20remote%20workers&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileiron-and-teamwire-secure-communications-for-remote-workers" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/30-mobileiron-and-teamwire/blog-inline-image.jpg" width="656" height="290" alt="MobileIron + Teamwire" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Just a few weeks ago, few people might have comprehended what their daily lives would look like today. Around the world, families are staying home as much as possible. Those who can are trying to establish a work-from-home routine while still keeping up with family life and the latest developments to stay safe and secure. Many others are first responders working on the front lines of this crisis every day. In both cases, secure and reliable messaging is absolutely essential to staying in contact with co-workers.</p> <p>Whether you’re suddenly working from home or a first responder providing emergency services, you might be relying on messaging apps like WhatsApp. Although these kinds of mobile messaging apps are easily accessible and highly efficient, they typically lack adequate security, especially if you’re working in a heavily regulated industry like healthcare or financial services. This means that sensitive data such as IP and personal medical information can be intercepted by cyberattackers looking to profit from valuable data.</p> <p>The good news is — MobileIron and Teamwire have joined forces to help you quickly and easily establish a foundation for secure communications. Together, we ensure that your business communications and content are completely private and encrypted in an intuitive messaging app. As a result, you and your mobile workforce can focus on securely collaborating with any co-worker, on any mobile device, desktop, or network without sacrificing productivity — whether your digital workplace is at home or en route to an emergency situation.</p> <p>Register for our upcoming webinar to learn how our joint solution helps customers:</p> <ol><li>Deliver fast, easy, and secure enterprise messaging across the entire mobile infrastructure.</li> <li>Leverage MobileIron’s UEM platform for complete app management and security.</li> <li>Meet strict compliance requirements with enterprise-grade security.</li> <li>Ensure only compliant devices can access corporate messaging — and either quarantine or remediate non-compliant devices to mitigate the risk of a data breach.</li> </ol><p> </p> <p><strong>Register for one of our webinars taking place on April 15 at</strong><a href="https://info.mobileiron.com/webinar-teamwire-delivering-secure-mobile-enterprise-messaging-earlyam.html"><strong> </strong></a><a href="https://info.mobileiron.com/webinar-teamwire-delivering-secure-mobile-enterprise-messaging-earlyam.html"><strong>11am CEST</strong></a><strong> and </strong><a href="https://info.mobileiron.com/webinar-teamwire-delivering-secure-mobile-enterprise-messaging-am.html"><strong>11am ET</strong></a><strong> now to learn more about this integrated solution from MobileIron and Teamwire!</strong></p> </div> </div> </div> </div> Wed, 01 Apr 2020 20:38:39 +0000 sraikow 2599 at https://www.mobileiron.com 8 ways in which MobileIron can help secure your remote workforce https://www.mobileiron.com/en/blog/8-ways-mobileiron-can-help-secure-your-remote-workforce <span>8 ways in which MobileIron can help secure your remote workforce</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 03/31/2020 - 14:16</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F8-ways-mobileiron-can-help-secure-your-remote-workforce" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F8-ways-mobileiron-can-help-secure-your-remote-workforce&amp;title=8%20ways%20in%20which%20MobileIron%20can%20help%20secure%20your%20remote%20workforce" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=8%20ways%20in%20which%20MobileIron%20can%20help%20secure%20your%20remote%20workforce&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2F8-ways-mobileiron-can-help-secure-your-remote-workforce" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/29-8-ways-secure-remote-workforce/blog-inline-image.jpg" width="656" height="357" alt="8 ways in which MobileIron can help secure your remote workforce" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Work-from-home programs are often advertised by organizations as employee perks. When well implemented, they provide employees with the ability to be productive anywhere, anytime, and on any device. <a href="https://economics.stanford.edu/sites/g/files/sbiybj9386/f/alternative_work_arrangements.pdf">Surveys</a> have also shown that the average employee is willing to accept 8% less pay for the option to work remotely. While the employee benefits of remote work have been discussed broadly, the recent spread of COVID-19 has shown that having a scalable remote work program is also essential for business continuity.</p> <p>Many organizations across the globe are now requiring or encouraging their employees to work remotely, to stem the spread of COVID-19. This rapid transition to support remote workers is requiring IT to quickly on-board additional devices, deploy business applications such as Zoom, and provide secure connectivity to on-premises and cloud services, all while maintaining overall information security. Below are eight ways in which MobileIron can help IT  successfully enable a secure remote workforce.</p> <p> </p> <h4>Seamless onboarding and OTA provisioning for any device</h4> <p>The first step is to enroll new users and/or mobile devices in a <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management (UEM)</a> platform. With MobileIron UEM, organizations can easily onboard both BYOD and corporate-issued devices over-the-air. IT isn’t required to pre-image devices and employees are free to use any devices they want, including devices that run iOS, Android, macOS, or Windows 10. Using services such as Apple Business Manager or Android Enterprise Enrollment, IT can customize the onboarding process, resulting in a simple and smooth enrollment process for users. Furthermore, employees can use a self-service portal to track, add, or remove devices they have under management. </p> <p> </p> <h4>Configure a consistent set of security policies across devices</h4> <p>Next, you need to ensure that all devices being enrolled are secure and configured with policies that match your organization’s information security guidelines. <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">Mobile threat defense</a> (MTD) has the ability to validate device posture prior to enrollment. You can also enforce the need for policies such as passcodes and disk encryption. Disk encryption makes it harder for hackers to physically extract business data from devices. And MTD continues to protect against device, app, and network level threats.</p> <p>In addition, at the time of enrollment, you can provision a secure workspace on the device, using either Apple device management or Android Enterprise profiles, separate from the personal space to ensure you are safeguarding the user’s privacy, while maintaining control over business data.</p> <p> </p> <h4>Enable secure connectivity for on-premises and cloud applications</h4> <p>At the time of enrollment, you can deploy a variety of network settings and profiles for Wi-Fi, per-app VPNs, or device-wide VPNs. This is critical to protect data in transit and allow users to connect securely to the intranet, services behind firewalls, and even cloud applications. MobileIron Tunnel, a per-app VPN solution, can automatically be triggered to launch on a per-app, on-demand, or always-on mode to secure the connection over the insecure Internet. This provides users with a seamless experience while ensuring business data is always secure. In addition, MobileIron Sentry provides secure and conditional access to on-premises resources and can be deployed easily without requiring you to undertake a massive redesign to your datacenter for external access.</p> <p> </p> <h4>Distribute email, PIM, secure browsing</h4> <p>To ensure productivity, organizations need to equip remote workers with secure access to email, calendars, contacts, and secure browsing capabilities on their devices. MobileIron UEM can remotely configure and secure both native productivity apps or cloud productivity apps that are part of the Office 365 bundles and G Suite. In addition, we also have our own suite of secure productivity apps designed for companies with higher security requirements.</p> <p> </p> <h4>Deploy video conferencing, collaboration, and other business apps</h4> <p>In addition to distributing email, many organizations need to deploy communication and collaboration apps such as Zoom and Slack. These are essential to allow employees to continue collaborating even as they work from home. MobileIron UEM can silently install and configure (using <a href="http://www.appconfig.org">AppConfig</a> - an industry standard) these applications so employees have access to them, without requiring them to search for apps and configure them on their own. In addition to reducing helpdesk tickets, remote installs and configurations mean that employees are quickly enabled to be productive at home. MobileIron can also publish an enterprise app catalog where employees can easily find other business applications such as HRportals, apps to file expenses, and so on. In addition to making it easier for employees to find business apps, the enterprise app catalog also ensures that employees do not download fake and potentially malicious versions of popular business applications.</p> <p> </p> <h4>Remote troubleshooting to increase help desk efficiency</h4> <p>New remote workers will face challenges with the shift to working from home and having to use new applications, tools, and methods to get work done. Your IT helpdesk is the frontline to ensuring employees remain productive during these times and it is important to equip them with the right tools to be efficient. Training employees is critical. However, empowering IT with tools such as MobileIron Help@Work - an application that enables remote screen sharing with user consent will go a long way in allowing the helpdesk to see, diagnose, and fix issues in an efficient manner.</p> <p> </p> <h4>Activate passwordlessMFA for secure user authentication</h4> <p>Companies are moving fast to enable remote access and employees are still adapting to this new paradigm. Meanwhile, hackers are absolutely taking advantage of the chaos and confusion. Many organizations have reported an increase in phishing attempts. Enabling passwordless MFA will not only protect your organization from phishing attacks, but also reduce the number of helpdesk tickets resulting from account lockouts and password reset requests. MobileIron <a href="https://www.mobileiron.com/en/products/access">zero sign-on</a> eliminates passwords and provides quick, easy, and secure access to applications by using devices as user’s identity. In addition, ZSO integrantes with our UEM platform to provide secure conditional access to ensure only authorized and compliant users, devices, and apps have access to business services.</p> <p> </p> <h4>Deprovisioning for end-to-end lifecycle management</h4> <p>Tracking the state of all devices being used to connect with business resources is important from a security and compliance perspective. MobileIron UEM provides a single console via which IT can view all managed devices and track critical information such as operating system versions, app versions and so on. This can be used to identify devices running potentially vulnerable software and quarantine them. User’s can be instructed on actions required to bring devices back to compliance. And if the user needs to retire a device, or if IT chooses to, unenrollment can be initiated remotely. Organizations have the option to selectively wipe devices such that all business data and applications are removed while leaving all personal information in place. This goes a long way in protecting user privacy while reducing the liability of organizations as they adopt BYOD programs. This ability to deprovision devices remotely and selectively wipe data is critical for an end-to-end device lifecycle management program.</p> <p>To learn more about MobileIron UEM and how it can help enable a remote workforce, <a href="https://lp.mobileiron.com/enable-remote-work-covid19/">contact us here</a>. You can also register for one of our upcoming webinars <a href="https://www.mobileiron.com/en/blog/webinar-series-enabling-remote-workforce-pandemic">here</a>.</p> </div> </div> </div> </div> Tue, 31 Mar 2020 21:16:26 +0000 sraikow 2597 at https://www.mobileiron.com Shared iPad for Business https://www.mobileiron.com/en/blog/shared-ipad-for-business <span>Shared iPad for Business</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 03/31/2020 - 13:08</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fshared-ipad-for-business" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fshared-ipad-for-business&amp;title=Shared%20iPad%20for%20Business" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Shared%20iPad%20for%20Business&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fshared-ipad-for-business" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/28-shared-ipad-for-business/blog-inline-image.jpg" width="656" height="357" alt="Shared iPad for Business" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><h4>What is a Shared iPad?</h4> <p>A Shared iPad allows you to deliver personalized experiences on an iPad shared by multiple users. Apple introduced its <a href="https://developer.apple.com/education/shared-ipad/">shared iPad for education </a>capability in iOS9.3 and supported it on Apple School Manager.</p> <p>This enables school authorities to wirelessly configure settings and restrictions according to the school’s requirements and then easily assign the devices to a concerned group (Shared devices) or individual. A student uses his or her Managed Apple ID to sign in to the iPad, which is then populated by that student’s relevant data, apps and resources. The data is all stored in iCloud and downloaded when required.</p> <p> </p> <h4>What is new with Shared iPad?</h4> <p>The same shared iPad capability available for education is now extended to business and supported on Apple Business Manager with iOS 13.4. Shared iPad enables businesses to share devices between multiple employees, while still providing a personalized experience. Employees can sign in with a Managed Apple ID to begin loading their data, including their Mail accounts, files, iCloud Photo Library, app data, and more. The data is stored in iCloud, so employees can sign in to any Shared iPad that belongs to the organization.</p> <p> </p> <h4>Why Do Businesses need Shared iPad?</h4> <p>Companies are moving forward with enabling their employees with the right technologies and tools. They are digitally empowering their firstline/frontline workforce while considering the user experience and not compromising on the security of the organization and user data. Shared iPad for Business can be used in healthcare, retail, and industrial applications. For example, a doctor and nurses can share one device, as they can each securely access the user profile uniquely designed for them. In retail stores, firstline/frontline workers can be empowered with access to product information, resources, expertise to delight the customers and provide better shopping experiences.</p> <p> </p> <h4>What is a temporary session?</h4> <p>Shared iPad for Business supports temporary sessions, which allows users to sign in without an account and then erases their data when they sign out. Apple has provided a restriction for admins to allow temporary sessions on SharedDevice. This can be leveraged by School iPad for Schools too, without requiring an Apple ID to login. So when a student logs out, his or her data is removed, and the iPad is ready for the next student.</p> <p> </p> <h4>How does Shared iPad for Business work?</h4> <p>It starts with devices added to Apple Business Manager, where iPads are enrolled using an automated enrollment profile with shared mode on. Employees simply sign in with a company-provided Managed Apple ID and password. Apple Business Manager admins can manually create these accounts or federate to an identity provider like Azure Active Directory. Following is the list of requirements to be considered before you can start using Shared iPads:</p> <ol><li>Shared iPad requires a mobile device management (MDM) solution.</li> <li>Shared iPad requires Managed Apple ID. Admins can manually create these accounts or federate to an identity provider like Azure Active Directory.</li> <li>Devices must have at least 32GB of storage and be <a href="https://support.apple.com/en-gb/guide/mdm/payload-list-mdm5370d089/1/web/1#mdmada36dd54">supervised</a>.</li> </ol><p> </p> <h4>Conclusion</h4> <p>This is an exciting feature for businesses! Shared iPad delivers personalized experiences on an iPad shared by multiple users along with cost effectiveness. Apple not only equips users with the best products and software, but also the best user experience. It will be interesting to see how the support for multi-users will shift the gears in businesses. MobileIron is gearing up to support this exciting feature from Apple. Please stay tuned for more information and updates!</p> </div> </div> </div> </div> Tue, 31 Mar 2020 20:08:32 +0000 sraikow 2596 at https://www.mobileiron.com Employee Spotlight: Danielle Striker https://www.mobileiron.com/en/blog/employee-spotlight-danielle-striker <span>Employee Spotlight: Danielle Striker</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 03/26/2020 - 11:26</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femployee-spotlight-danielle-striker" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femployee-spotlight-danielle-striker&amp;title=Employee%20Spotlight%3A%20Danielle%20Striker" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Employee%20Spotlight%3A%20Danielle%20Striker&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Femployee-spotlight-danielle-striker" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/27-employee-spotlight-danielle-striker/blog-inline-image.jpg" width="656" height="290" alt="Employee Spotlight: Danielle Striker" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Each month I take time to learn more about one of our employees. This month, I sat down with Danielle Striker, director of business development at MobileIron. She is passionate about cybersecurity, identity and fraud. She works with partners to innovate by leveraging MobileIron's <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management</a> (UEM) technology to enable zero trust access, zero sign-on (ZSO), multi-factor authentication (MFA), and <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">mobile threat defense</a> (MTD).</p> <p> </p> <h4>How did you start off in the security industry and what led you to join MobileIron?</h4> <p>I wound up in cybersecurity completely by accident. I was working for a startup called NetBoost in Silicon Valley that specialized in speeding up packets on the network for VPNs and firewalls. I was managing our strategic alliances with Cisco, McAfee, and Symantec and realized that the need for network security was going to be important.</p> <p>I really didn’t know that much about networking or security at the time, so I decided to become a network engineer and CISSP. I figured those certifications coupled with my background as a programmer would help me to identify opportunities to innovate with my OEM partners.</p> <p>Prior to MobileIron, I was a subject matter expert for identity and fraud prevention at TransUnion. I was working with some of the largest banks and financial institutions in the world. Although preventing fraud and stopping synthetic identity theft is very interesting, it’s simply not cybersecurity. Those disciplines deal more with fraudsters as opposed to <em>hackers. </em></p> <p>I was looking for an opportunity in mobile security, and saw that MobileIron had a position open for OEM Director of Business Development - which is my passion! I also saw that Brian Foster was at MobileIron. Our paths had crossed many times over the years and I knew he was a thought leader in security. My best friend had worked with Brian when he was at Symantec, and said I should jump at the chance to work with him. So I reached out, got an interview and the rest is history!</p> <p> </p> <h4>What do you like most about working at MobileIron?</h4> <p>The people at MobileIron are incredible. They are smart, supportive and incredibly committed to helping our partners. I love that we are a leader for UEM and that our solutions really help IT manage devices and secure remote worker access (especially at this time with COVID-19).</p> <p> </p> <h4>What have been your favorite team moments?</h4> <p>My favorite team moment last year was celebrating Diwali with everyone! I even got Henna artwork on my hand. It was beautiful.</p> <p> </p> <h4>Who inspires you?</h4> <p>Sadhguru. He is a Hindu yogi and mystic, and my guru. He inspires me to simply be present and enjoy being alive! <em>Aum…..</em></p> <p> </p> <h4>Can you tell me about your poker career?</h4> <p>I have been playing poker for 15 years. My husband and I moved to Las Vegas in 2000. I was never interested in gambling or poker. One day, a business associate and I were visiting San Jose. He thought that since I was from Las Vegas I would like to play poker at a card room called Bay 101. He laughed when I told him I didn’t even know how to play. We wound up going and of course, I got hooked. When I got back home, I hired a professional coach and started to enter and win tournaments. I have read over 350 books on poker. I started my poker career as a Texas Hold’em tournament player, but love playing cash games. I was just getting ready to play in the World Series of Poker again this year, but I think they will cancel it due to the coronavirus.</p> <p> </p> <h4>Tell me a bit about the book you authored, “Poker Samadhi: A Divine Collection of Poker Wisdom,” and how you relate it to your career.</h4> <p>Poker is a deep thinking game and a game of observation. It’s been said that “poker is a game of people, played with cards.” Observing yourself and others is key to becoming a great player. I was playing poker one night and had a “peak” experience - it was really like an out-of-body experience. I recognized that poker is analogous to life, and that both are just a game.</p> <p>The objective in poker is to win. That’s the same objective in business and in life! Poker and business are very similar. Every hand you play is a negotiation. You have to play your hand the best you can to extract the most value when you have the nuts (the best hand). The concept is to maximize your hand for the most value. In business you have to do the same thing. You have to be able to read your opponent and negotiate the best deal. You have to know where you’re at in the hand - on the flop, the turn and the river. In a business negotiation, you have to determine where you’re at in the stage of the deal, and determine how your opponent may respond.</p> <p>Poker is also about making good decisions and reading people. I have learned how to do both much better from playing poker. I wrote the book “Poker Samadhi” to share the wisdom I have learned from playing poker to help others play their best life!</p> </div> </div> </div> </div> Thu, 26 Mar 2020 18:26:04 +0000 sraikow 2585 at https://www.mobileiron.com Safe Employees, Secure Business https://www.mobileiron.com/en/blog/safe-employees-secure-business <span>Safe Employees, Secure Business</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Wed, 03/25/2020 - 12:31</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fsafe-employees-secure-business" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fsafe-employees-secure-business&amp;title=Safe%20Employees%2C%20Secure%20Business" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Safe%20Employees%2C%20Secure%20Business&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fsafe-employees-secure-business" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/26-safe-employees-secure-business/blog-inline-image.jpg" width="656" height="357" alt="Safe Employees, Secure Business" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>If you told me what we would all experience in the period of one week, it would be hard to comprehend what is now the new normal. Much of the globe is sheltering in place, settling into a work-from-home routine with family and work completely intertwined, and keeping up with latest governmental and public health developments to stay safe and secure.</p> <p>We are here to help you support your employees, many of whom are now at home and who need to connect securely and seamlessly to corporate applications from any type of device to stay as productive as possible, during this challenging time. Our teams around the globe are committed to providing the same always-on service our customers have come to expect. We have a host of information we are updating regularly on our <a href="https://www.mobileiron.com/en/solutions/covid-19">COVID-19 Resources</a> page of our MobileIron website. And you can <a href="https://lp.mobileiron.com/enable-remote-work-covid19/">contact us</a> to find the offers that we’re providing during this time.</p> <p>We’ve created this quick start guide below on how to enable a remote worker. It outlines the steps IT needs to take from quickly on-boarding, authorizing and securing new users and devices to deploying business applications such as Zoom, and providing secure connectivity and access to on-premises and cloud services, all while maintaining overall security.</p> <p>Stay safe and secure.<br /> Simon</p> <p> </p> <p><a href="https://www.mobileiron.com/sites/default/files/infographics/8-steps-to-enable-remote-workers.pdf"><img alt="Remote Worker infographic" border="0" src="https://www.mobileiron.com/sites/default/files/Blog/2020/26-safe-employees-secure-business/infographic-remote-workers.jpg" width="100%" /></a></p> <p><a href="https://www.mobileiron.com/sites/default/files/infographics/8-steps-to-enable-remote-workers.pdf">Download the PDF</a></p> <p> </p> </div> </div> </div> </div> Wed, 25 Mar 2020 19:31:36 +0000 sraikow 2583 at https://www.mobileiron.com Working from home? Don’t let your kid’s mobile device bring down your company’s network https://www.mobileiron.com/en/blog/working-from-home-dont-let-your-kids-mobile-device-bring-down-your-companys-network <span>Working from home? Don’t let your kid’s mobile device bring down your company’s network</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 03/24/2020 - 11:48</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fworking-from-home-dont-let-your-kids-mobile-device-bring-down-your-companys-network" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fworking-from-home-dont-let-your-kids-mobile-device-bring-down-your-companys-network&amp;title=Working%20from%20home%3F%20Don%E2%80%99t%20let%20your%20kid%E2%80%99s%20mobile%20device%20bring%20down%20your%20company%E2%80%99s%20network" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Working%20from%20home%3F%20Don%E2%80%99t%20let%20your%20kid%E2%80%99s%20mobile%20device%20bring%20down%20your%20company%E2%80%99s%20network&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fworking-from-home-dont-let-your-kids-mobile-device-bring-down-your-companys-network" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/25-working-from-home/blog-inline-image.jpg" width="656" height="290" alt="Working from home?" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Working remotely is the new normal, due to the coronavirus crisis. And it may stay that way for the foreseeable future. Many organizations have started to implement structure around their work-from-home policies and faced some questions around security best practices. For example, how do we simply push out the latest apps to our employees’ devices while they are working from home on unsecured networks? How do we prevent our employees from introducing new vulnerabilities to our corporate network and most vital on-premises and cloud applications? Do we have a way of ensuring that new applications being downloaded to laptops or mobile devices, which may include malware, are not creating holes that can wreak additional havoc?</p> <p>Let’s face it, many distractions happen during the day. Amazon delivers multiple times per day now, bringing toilet paper and other essential items. And kids bombard your new office space with earth-shattering news they just heard from their friends, like how the highly coveted Golden Goose shoes are now on sale or that they need to download a new application to play games – all while you are in the middle of a very important meeting with your VP! To simply get your kids out of your hair, you hand your credit card over if they promise not to bother you again that day.</p> <p>What happens next? Your kid gets a link from a friend and sideloads/downloads a new app to play games or keep up to date with all the latest and greatest apparel. Unbeknownst to you, the website is fake and asks personal questions that we would advise him or her not to answer if we were really paying attention. Fast forward a few days, your home network seems to have slowed down because the video is not working as well as it did before and everyone in the family is unhappy because the “internet doesn’t work!” Malicious actors are now in your home network and your kid’s mobile device is the culprit!</p> <p><a name="_heading=h.gjdgxs" id="_heading=h.gjdgxs"></a>Malicious apps are incredibly easy to introduce to not only your home network, but your company’s network as well, thanks to work-from-home being thrust upon many of us and the fact that most of us don’t want to use a corporate VPN as it requires a different set of credentials, so we use our mobile phones or webmail instead. Many IT teams also require a physical token that you must plug into your laptop to protect your data. So, in order to access corporate data on a laptop, you must use a password to log into your laptop, another password to log into your VPN, and then make sure that you have your token to authenticate into email. Oh, and then you need another set of credentials to log into Salesforce.com. Passwords, apps and home Wi-Fi networks are a security afterthought for most people today, but they are easy avenues for bad guys to take control of your home network and potentially impact your company’s network, if not properly secured. Many corporate VPNs implement a split-tunnel VPN, which can still introduce a mobile threat onto a device via drive-by malware download.</p> <p>As we begin to flatten the curve and heal, it will be essential for organizations to learn from their business continuity, disaster response policies and procedures. Bringing our workforce back into the office and learning from the challenges will result in an unprecedented opportunity to create positive change to how people work securely in a world without passwords. Think about our healthcare workers right now. Using biometrics, they can easily log into their personal mobile devices to let their loved ones know they are safe and will be home soon. However, other mobile devices being used to treat patients often require passwords and another keyboard that could be contaminated. Attracting and retaining the best talent on the market requires organizations of all sizes to be flexible and look for exciting new technologies that improve end user satisfaction, reduce service desk tickets while increasing security to comply with regulations and reducing risk of a breach.</p> <p>MobileIron <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management (UEM)</a> can silently install the VPN client along with its profile that can use identity certificates to authenticate to MobileIron Sentry or MobileIron Access. MobileIron Tunnel can automatically be triggered to launch on a per-app, on-demand, or always-on mode to secure the connection over the insecure Internet. MobileIron Access provides conditional access rules for the permitted app, source IP address, and domain. <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">MobileIron Threat Defense</a> provides protection for both malicious apps like malware and leaky apps. MTD can also detect device and network level threats.</p> <p>Working from home was thrust on me when I left a large enterprise software company 17 years ago and joined a smaller, nimbler .com company. It was tough going from my own office with a nice desk, comfortable executive chair, fresh fruit every Tuesday, coffee on-demand and other amenities to working out of a spare bedroom in a less-than-comfortable dining room chair. The harder part was the isolation and feeling of being on an island without any life preserver.</p> <p>Fast forward to today: I’ve learned lessons along the way, and now I’m successfully working at home with two teenagers and a wife. Having a routine and being thoughtful are key to my success. My day starts with exercise and a deep stretch to clear my thoughts. As you begin to define your new normal look for the small things that make you smile!</p> <p>And to learn more about MobileIron UEM and how it can help enable a remote workforce, <a href="https://lp.mobileiron.com/enable-remote-work-covid19/">contact us here</a>.</p> </div> </div> </div> </div> Tue, 24 Mar 2020 18:48:39 +0000 sraikow 2568 at https://www.mobileiron.com COVID-19 drives agencies to investigate alternatives to VPNs, raises need for BYOD support https://www.mobileiron.com/en/blog/federal-employees-teleworking-heightens-requirements-vpn-byod <span>COVID-19 drives agencies to investigate alternatives to VPNs, raises need for BYOD support</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Thu, 03/19/2020 - 17:24</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffederal-employees-teleworking-heightens-requirements-vpn-byod" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffederal-employees-teleworking-heightens-requirements-vpn-byod&amp;title=COVID-19%20drives%20agencies%20to%20investigate%20alternatives%20to%20VPNs%2C%20raises%20need%20for%20BYOD%20support" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=COVID-19%20drives%20agencies%20to%20investigate%20alternatives%20to%20VPNs%2C%20raises%20need%20for%20BYOD%20support&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Ffederal-employees-teleworking-heightens-requirements-vpn-byod" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/24-federal-employees-teleworking/blog-inline-image.jpg" width="656" height="290" alt="Federal employee telework" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>A year ago, even a month ago, only a portion of federal employees and contractors were teleworking. Now, in the midst of the coronavirus pandemic, there is a mandate from the Office of Management and Budget (<a href="https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-16.pdf">OMB M:2016</a>) to maximize telework, sustain the mission of the agency, and encourage all employees and contractors who can work from home to do so.  This presents a security and an access challenge that agencies must quickly address.  MobileIron offers government-grade solutions, which are detailed below and already in place at some agencies.</p> <p> </p> <h3>The big change</h3> <p>The rapid escalation in the number of workers connecting to federal networks has been drastic and occurred almost overnight.  Some of those workers had been provisioned to telework, at least on an occasional basis or in exigent circumstances.  But for most federal agencies, they might have seen at most 20% of their workforce connecting remotely, even under extended weather-related closures.  Now, some agencies are seeing 80% or more of their workforce attempting to connect from home, and, with the OMB mandate, this will increase and remain high for the foreseeable future.  For many users, there have been no provisions made to enable them to officially telework.  They have neither government furnished equipment (GFE) or appropriate training on how to connect to, sign-on to, and access federal networks, applications, and resources.  They are using their own devices, such as smartphones, tablets, and (frequently) older, less well-maintained laptops and desktops with out-of-date operating systems and virus protections (or no virus protection at all). </p> <p>The tsunami of connections from users’ personal devices to federal networks has resulted in the relaxation of some access and security policies and the circumvention of others.  In addition, even if users are accessing a government network via an established virtual private network (VPN), VPNs were not designed with the capacity to accept this volume of traffic, nor were they designed to provide additional security controls for bring-your-own-device (BYOD) and mobile devices in general. </p> <p>The growth of remote workers and network connections has increased the attack surface, and federal agencies and employees are at risk now more than ever. These unanticipated personal devices may lack appropriate authentication capabilities, and many may not be using multi-factor credentials or approved derived credentials.  Identity fraud, phishing attacks designed to capture and compromise authentication credentials (especially user IDs and passwords), malicious code, and advanced persistent threats are all rising. And these threats are increasingly likely to succeed due to the increased volume of remote workers, especially those who are less experienced with security processes and technology.  Over the last several days, we have seen attacks against the US Department of Health and Human Services in the form of nation-state attacks to spread disinformation and increase fear and uncertainty among the US population.  We also anticipate increased levels of denial-of-service (DoS), man-in-the-middle (MITM), and brute force attacks against basic authentication access portals.</p> <p> </p> <h3>The challenge</h3> <p>One of the ways that federal agencies are trying to protect their networks and IT resources is by requiring that users employ a VPN.  While there are several different types of VPNs – including remote-access, site-to-site, Layer 3 Multiprotocol Label Switching (L3MPLS), Dynamic Multipoint VPN (DMVPN), and more - they all share common objectives to encrypt and secure end to end communications, and some common limitations.  Nearly all VPNs can operate in different modes, such as device wide, always-on, on-demand, or per-app.  The per-app mode is only initiated when the configured application is launched and only that application’s traffic traverses the encrypted tunnel.  As a result, the battery drain is less than for an always-on VPN, however, it is very specific about the traffic that is protected.  For the teleworker user case, the remote-access VPN is the most applicable. Traditional enterprise network VPNs are expensive, challenging and time-consuming to implement.  Terminated at the edge of the enterprise network, they have limited capacity for the number of simultaneous connections permitted and are bound by license keys.  These VPNs require significant time and effort by network administrators to configure and implement the appropriate termination points.</p> <p>In addition, VPN licenses are expensive and frequently not dynamically extensible to accommodate a dramatic increase in the number of users and hours per day those users will be connected.  Many federal agencies continue to rely on these types of traditional enterprise network VPNs.  Federal IT modernization efforts have resulted in some agencies adopting a per-app VPN solution, which provides greater fine-grained control over the origination and termination endpoints of the VPN tunnel, stronger encryption, and additional features. However, it also adds bandwidth constraints, license costs, and complexity to the efforts by the network administrators to provide the required maintenance and upgrades, configure the settings of the VPN gateways, and manage the cryptography and required certificates.</p> <p>In nearly all cases, these VPNs were not designed for mobile devices or mobile device traffic.  Enterprise VPNs do not have the capability to enforce security policies on a mobile device, or to evaluate the compliance of a mobile device with established baseline requirements. </p> <p> </p> <h3>What we offer that’s different and more effective</h3> <p>The MobileIron solution leverages an integrated VPN component called Tunnel, used in conjunction with the native operating system, <a href="https://www.mobileiron.com/en/products/uem">MobileIron Unified Endpoint Management</a>, for data security at rest and cybersecurity policy enforcement that can validate the compliant state of the device before initiating the application and allowing access.  MobileIron can determine if the device is jailbroken, if the OS is current, if the device is on an authorized (or unauthorized/public) Wi-Fi network, if the application is approved and from a trusted app store, and if the device is currently protected by a <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">mobile threat defense solution</a> that detects and remediates malicious threats and apps. In addition, MobileIron provides stronger multi-factor authentication and contextual awareness of the user, device, and credential, which all become part of the zero sign-on access control. </p> <p>MobileIron Tunnel allows agencies to enable any business app, including in-house and third-party apps, to access resources on the enterprise network or intranet using a secure network connection. App VPNs can be established over any network, including cellular networks, to ensure federal data is always secure. Tunnel also leverages MobileIron’s advanced closed-loop compliance engine to ensure non-compliant devices are not allowed to access sensitive agency data.</p> <p>In addition, Tunnel significantly improves the user experience by establishing on-demand or always-on app VPN connections, without requiring the user to take any additional steps. Personal and malicious apps are blocked so that only appropriate data flows through Tunnel, which provides greater protection for government data and user privacy.</p> <p>In October 2019, Branko Bokan of the Cybersecurity and Infrastructure Security Agency (CISA), a component of DHS, stated that “To provide maximum coverage against mobile threat actions, organizations must deploy Enterprise Mobility Management (EMM), Mobile Threat Defense (MTD), and Mobile App Vetting (MAV) capabilities together as in integrated solution, and not as a series of standalone products.” </p> <p>MobileIron is an integrated, full function solution providing an innovative cybersecurity platform for iOS, Android, MacOS, and Win10 based devices, combining EMM, MTD, and MAV capabilities into a single mobile-centric, zero-trust security solution.  This approach provides agencies with complete control over government data as it flows across devices, apps, networks, and cloud services.</p> <p>With COVID-19 containment in effect, the need for this deployment of capabilities has rapidly accelerated.  If you would like more information, please click <a href="https://info.mobileiron.com/ContactUs.html">here</a> to be contacted by a MobileIron representative.</p> </div> </div> </div> </div> Fri, 20 Mar 2020 00:24:26 +0000 sraikow 2567 at https://www.mobileiron.com Webinar series: Quickly enabling a remote workforce in a time of pandemic https://www.mobileiron.com/en/blog/webinar-series-enabling-remote-workforce-pandemic <span>Webinar series: Quickly enabling a remote workforce in a time of pandemic</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Wed, 03/18/2020 - 11:46</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwebinar-series-enabling-remote-workforce-pandemic" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwebinar-series-enabling-remote-workforce-pandemic&amp;title=Webinar%20series%3A%20Quickly%20enabling%20a%20remote%20workforce%20in%20a%20time%20of%20pandemic" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Webinar%20series%3A%20Quickly%20enabling%20a%20remote%20workforce%20in%20a%20time%20of%20pandemic&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fwebinar-series-enabling-remote-workforce-pandemic" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/23-webinar-remote-workforce/blog-inline-image.jpg" width="656" height="290" alt="Remote workforce webinar series" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>As COVID-19 continues to spread around the world, many organizations are following federal and global guidelines from the CDC and WHO in order to make the right accommodations to prioritize the health of their workforce. As a result, many companies are encouraging employees to work remotely. </p> <p>Whether you are considering issuing more corporate-owned devices or enabling a BYOD program for employees who are now at home and who need to connect securely and seamlessly to corporate applications, the MobileIron <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management</a> (UEM) platform has you covered.</p> <p>MobileIron UEM allows organizations to deploy mobile-centric zero trust security. Employees benefit from easy anytime access to corporate data on devices of their choice while IT teams benefit from seamless device lifecycle management with over-the-air onboarding, configuration, app management, security policy enforcement, and visibility - while maintaining user privacy.</p> <p>Join us for this six-part webinar series that will provide in-depth guidance on topics such as…</p> <p> </p> <p><strong>Webinar Series Part 1: </strong><br /><strong>Rapidly Securing Your Remote Workforce in Times of Pandemics Such As COVID-19</strong></p> <ul><!--<li>March 26, 2020 at 8 AM PST - <a href="https://info.mobileiron.com/webinar-covid-19-part-1-registration.html">Register Here</a></li> <li>March 31, 2020 at 11 AM CEST - <a href="https://info.mobileiron.com/webinar-covid-19-part-1-registration-emea.html">Register Here</a></li>--><li>Now available on-demand - <a href="https://www.mobileiron.com/en/resources-library/webinars/rapidly-secure-your-remote-workforce-pandemic-covid-19">View now</a></li> </ul><p> </p> <p><strong>Webinar Series Part 2: </strong><br /><strong>How to On-Board Remote Workers Over-the-Air for Both Corporate Owned and BYOD Devices</strong></p> <ul><li>April 2, 2020 at 8 AM PST - <a href="https://info.mobileiron.com/webinar-covid-19-part-2-registration.html">Register Here</a></li> <li>April 7, 2020 at 11 AM CEST - <a href="https://info.mobileiron.com/webinar-covid-19-part-2-registration-emea.html">Register Here</a></li> </ul><p> </p> <p><strong>Webinar Series Part 3: </strong><br /><strong>How to Enable Remote Workers With Secure Access to Cloud and On-Premises Apps Across Any Device</strong></p> <ul><li>April 9, 2020 at 8 AM PST - <a href="https://info.mobileiron.com/webinar-covid-19-part-3-registration.html">Register Here</a></li> <li>April 14, 2020 at 11 AM CEST - <a href="https://info.mobileiron.com/webinar-covid-19-part-3-registration-emea.html">Register Here</a></li> </ul><p> </p> <p><strong>Webinar Series Part 4: </strong><br /><strong>How to Automate Enrollment of iOS and macOS Endpoints for Remote Workers</strong></p> <ul><li>April 16, 2020 at 8 AM PST - <a href="https://info.mobileiron.com/webinar-covid-19-part-4-registration.html">Register Here</a></li> <li>April 28, 2020 at 11 AM CEST - <a href="https://info.mobileiron.com/webinar-covid-19-part-4-registration-emea.html">Register Here</a></li> </ul><p> </p> <p><strong>Webinar Series Part 5: </strong><br /><strong>Zero Touch Enrollment of Android Devices for Remote Workers</strong></p> <ul><li>April 30, 2020 at 8 AM PST - <a href="https://info.mobileiron.com/webinar-covid-19-part-5-registration.html">Register Here</a></li> <li>May 5, 2020 at 11 AM CEST - <a href="https://info.mobileiron.com/webinar-covid-19-part-5-registration-emea.html">Register Here</a></li> </ul><p> </p> <p><strong>Webinar Series Part 6: </strong><br /><strong>How to Protect Your Employees From Mobile Threats and Attacks</strong></p> <ul><li>May 14, 2020 at 8 AM PST - <a href="https://info.mobileiron.com/webinar-covid-19-part-6-registration.html">Register Here</a></li> <li>May 19, 2020 at 11 AM CEST - <a href="https://info.mobileiron.com/webinar-covid-19-part-6-registration-emea.html">Register Here</a></li> </ul><p> </p> <p> </p> </div> </div> </div> </div> Wed, 18 Mar 2020 18:46:30 +0000 sraikow 2565 at https://www.mobileiron.com Protecting your health by protecting your telemedicine mobile devices https://www.mobileiron.com/en/blog/protecting-your-health-by-protecting-your-telemedicine-mobile-devices <span>Protecting your health by protecting your telemedicine mobile devices</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Wed, 03/18/2020 - 09:46</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fprotecting-your-health-by-protecting-your-telemedicine-mobile-devices" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fprotecting-your-health-by-protecting-your-telemedicine-mobile-devices&amp;title=Protecting%20your%20health%20by%20protecting%20your%20telemedicine%20mobile%20devices" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=Protecting%20your%20health%20by%20protecting%20your%20telemedicine%20mobile%20devices&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fprotecting-your-health-by-protecting-your-telemedicine-mobile-devices" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/22-protecting-health-telemedicine/blog-inline-image.jpg" width="656" height="290" alt="Protecting telemedicine mobile devices" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>Telemedicine. Have you heard of it? With the shelter-in-place orders recently implemented in the Bay Area to curb the spread of the coronavirus and the shutdown of non-essential services, including medical appointments that are not emergencies, many people are now acutely affected by telemedicine. So, what is telemedicine or e-medicine? Think of it as a doctor’s visit without driving to the doctor’s office. No person-to-person contact is required. Healthcare exams and consultations are performed using a mobile device, like an iPad or Android tablet, over the Internet using video conferencing and other communications tools. You, as a patient, can be interactively evaluated, diagnosed, and treated all in the comfort of your home. The doctor or any healthcare provider can also remotely monitor your condition by collecting vital health data. The doctor can prescribe any medication, forward it to the local pharmacy to fill, and then arrange to have it picked up or delivered by courier or mail. Any follow-up appointments can also be arranged.</p> <p>MobileIron’s solutions - <a href="https://www.mobileiron.com/en/products/uem">MobileIron Unified Endpoint Management (UEM)</a>, <a href="https://www.mobileiron.com/en/products/access">MobileIron Access</a>, and <a href="https://www.mobileiron.com/en/products/mobile-threat-defense">MobileIron Threat Defense</a> - all work together to securely provision these telemedicine mobile devices by turning on strong and seamless multi-factor authentication (MFA) like live scan biometrics or security keys to access the device, installing only the required medical kiosk communications apps, and enabling device-wide encryption to protect data at rest. The mobile device can be configured to connect to only known secure wireless networks or a private Access Point Name (APN). </p> <p>A remote access VPN client like MobileIron Tunnel can also be installed and configured for per-app, on-demand, or always-on VPN to protect any data in transit as the device communicates with the patient and any external resources to ensure any health ailments are resolved. MobileIron Access can provide conditional access to both on-premises (hospital) and/or cloud-based (SaaS) health resources, including storage of patient records, and then restrict access to them. MobileIron Threat Defense can ensure that the mobile device is free from leaky or malicious apps, along with device and network level threats, and provide anti-phishing protection. It does all of this in full-compliance with HIPAA regulations.</p> <p>To learn more, <a href="https://www.mobileiron.com/en/case-studies/oxford-health-nhs-foundation-trust">read the case study</a> about how Oxford Health NHS Foundation Trust implemented the MobileIron UEM platform. This has contributed to the Trust making savings and efficiency gains totaling more than £1 million per year. The organization’s clinicians can now log onto secured iPads to offer long-distance counseling sessions via video chat, take notes during patient visits, get guidance on discussing sensitive topics, and use video recordings to enhance the quality of care they provide.</p> </div> </div> </div> </div> Wed, 18 Mar 2020 16:46:19 +0000 sraikow 2564 at https://www.mobileiron.com MobileIron’s Business Continuity and Emergency Readiness for COVID-19 https://www.mobileiron.com/en/blog/mobileirons-business-continuity-and-emergency-readiness-for-covid-19 <span>MobileIron’s Business Continuity and Emergency Readiness for COVID-19</span> <span><span lang="" about="/en/user/43" typeof="schema:Person" property="schema:name" datatype="">sraikow</span></span> <span>Tue, 03/17/2020 - 10:50</span> <div class="rrssb"> <ul class="rrssb-buttons demo"> <li class="rrssb-facebook social-icon-1"> <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileirons-business-continuity-and-emergency-readiness-for-covid-19" class="popup"> </a> </li> <li class="rrssb-linkedin social-icon-2"> <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileirons-business-continuity-and-emergency-readiness-for-covid-19&amp;title=MobileIron%E2%80%99s%20Business%20Continuity%20and%20Emergency%20Readiness%20for%20COVID-19" class="popup"> </a> </li> <li class="rrssb-twitter social-icon-3"> <a href="https://twitter.com/intent/tweet?text=MobileIron%E2%80%99s%20Business%20Continuity%20and%20Emergency%20Readiness%20for%20COVID-19&amp;url=https%3A%2F%2Fwww.mobileiron.com%2Fen%2Fblog%2Fmobileirons-business-continuity-and-emergency-readiness-for-covid-19" class="popup"> </a> </li> </ul> </div> <div class="field field--name-field-article-main-content field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-header-blog-image field--type-entity-reference field--label-hidden field--item"><figure><article class="media media-image view-mode-default"> <div class="field field--name-field-m field--type-image field--label-hidden field--item"> <img src="/sites/default/files/Blog/2020/21-mobileirons-business-continuity/blog-inline-image.jpg" width="656" height="290" alt="MobileIron’s Business Continuity and Emergency Readiness for COVID-19" typeof="foaf:Image" class="img-responsive" /> </div> </article> </figure></div> </div> </div> <div class="field--item"><div class="eck-entity"> <div class="field field--name-field-regular-paragraph field--type-text-long field--label-hidden field--item"><p>As COVID-19 continues to spread around the world, I want to take this opportunity to reassure customers and partners that we do not see impact to any services for our customers. To that end, we can assure you that our teams around the globe are committed to providing the same always-on service you have come to expect.</p> <ul><li>MobileIron will continue to deliver 24x7 service (MobileIron Cloud and MobileIron Access clusters) around the world. All of our services are up and running, and we are monitoring and upgrading them as usual, bringing new services on, and business will continue as usual.</li> <li>Our globally distributed Customer Success and Sustaining Engineering Teams are enabled to operate, respond to and resolve customer requests without any disruptions, 24 hours a day, 7 days a week.</li> <li>Our globally distributed security team is able to monitor all MobileIron networks, systems and applications for suspicious activities and threats, and follow a formal incident response process.</li> </ul><p>We are also making every effort to help enable secure remote work, as many organizations are making the right accommodations to prioritize the health of their workforce. It’s critical that organizations have the right tools to ensure business continuity and security as they increasingly adopt work from home policies.</p> <p>The MobileIron <a href="https://www.mobileiron.com/en/products/uem">unified endpoint management</a> (UEM) platform allows organizations to deploy mobile-centric zero trust security. Employees benefit from easy anytime access to corporate data on devices of their choice while IT teams benefit from seamless device lifecycle management with over-the-air onboarding, configuration, app management, security policy enforcement, and visibility - while maintaining user privacy.</p> <p>There are a lot of things that employees and organizations are concerned about with the COVID-19 virus, but working from home shouldn’t be one of them. A zero trust approach deals with the security challenges posed by the perimeter-less enterprise while also allowing the agility, anytime, anywhere access that employees require. By giving employees seamless and secure access to business apps and data, whenever and wherever they need it, organizations can enhance productivity.</p> <p>To learn more about MobileIron UEM and how it can help enable a remote workforce, <a href="https://lp.mobileiron.com/enable-remote-work-covid19/">contact us here</a>.</p> </div> </div> </div> </div> Tue, 17 Mar 2020 17:50:38 +0000 sraikow 2563 at https://www.mobileiron.com