Enabling secure mobility is one of the best ways government agencies can deliver the benefits of modern work to employees and constituents alike. To help organizations embrace the power of modern endpoints, applications, and cloud services, the Department of Defense (DoD) Mobile Device Strategy outlines a vision for supporting a highly mobile workforce. This document offers recommendations for providing secure connectivity and access to critical data and apps — all of which can be enabled through a unified endpoint management (UEM) provider like MobileIron.

Put MobileIron to work for your agency

UEM for Government Agency Device security by MobileIron
Secure agency devices
  • Secure any government-issued or personal mobile device.
  • Enroll and configure devices automatically.
  • Deploy certificate-based security.
  • Selectively wipe devices.
Secure and protect mobile apps and data, MobileIron UEM for government employees
Protect mobile apps and data
  • Administer secure app store and enforce user authentication policies.
  • Meet federal security and availability mandates.
  • Protect app data on the device and in transit to the cloud.
MobileIron UEM reduces data overage charges
Reduce data overage charges
  • Remove high data usage apps from devices.
  • Enforce Wi-Fi only for apps on iOS devices.
  • Allow or block specific sites to prevent streaming through web browsers.
UEM for federal, state & local branches of government that increases field productivity
Support field productivity
  • Allow only approved apps on devices.
  • Ensure apps and data are always available to critical organizations such as FEMA.
  • Prevent mobile threats from accessing mobile devices, data, and cloud services.
two factor authentication (2fa) with MobileIron UEM
Enable two-factor authentication with derived credentials
  • Enable mobile access with existing authentication solutions, such as common access cards (CAC) and personal identity verification (PIV).
  • Simplify the user experience — no additional hardware is required.
  • Comply with regulations such as Homeland Security Presidential Directive-12 (HSPD-12), Federal ICAM initiatives, FIPS 201, and NIST SP:800-157.
  • Learn more about the MobileIron derived credentials solution with Entrust.
BYOD security for employee owned endpoints and devices
Support employee-owned devices
  • Secure access to government apps and data on personal devices.
  • Protect private employee apps and data and selectively wipe data.
  • Support multi-OS devices and apps.

MobileIron’s federal certifications

FIPS 140-2
FIPS 140-2

A 3rd party approved U.S. government computer security standard. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. 


Service Organization Controls (SOC) are a series of accounting standards that measure the control of financial information for a service organization. They are covered under the SSAE 16 and ISAE 3402 professional standards.


Fedramp is a mandatory U.S. government program that provides a standardized approach to security assessment, authorization and continuous monitoring for cloud services.


A National Information Assurance Program approved Protection Profile, which includes requirements to ensure particular functionality is present, and addresses DOD specific need for mobile device management servers.

NSA Approved
NSA Approved

Validated commercial solution for classified program components


CJIS is designed to secure fingerprint records, background check information and other criminal justice information that is stored with or shared between local, state and federal law enforcement agencies.

Derived Credentials & CAC/PIV
Derived Credentials & CAC/PIV

A Derived PIV Credential, which is issued by a Federal department or agency to ve used with mobile devices where the use of a physical card is impractical. The Derived PIV Credential is designed to serve as a Federal government-wide standard for a secure identity credential interoperable across agencies.

Government customer case studies

Learn more

Top 4 Ways Unified Endpoint Management Supports CDM

Top 4 Ways Unified Endpoint Management Supports CDM

CJIS Compliance guide

CJIS Compliance: A Mobile Best Practice Guide

Executive briefing series: Mobile cyber security

Executive briefing series: Mobile cyber security

MobileIron supports all phases of CDM compliance

MobileIron supports all phases of CDM compliance

Public safety datasheet

Public safety relies on secure and efficient mobile communication

Queensland Police case study

Queensland Police Services: iPads and MobileIron, A Modern Work Success Story

Entrust datasheet

MobileIron derived credentials with Entrust

Executive Briefing Series: CDM and Mobile Security

Executive Briefing Series: CDM and Mobile Security

CDM compliance datasheet

MobileIron supports all phases of CDM compliance

Mobile Government dataheet

Mobile First government datasheet 


MobileIron selected as subcontractor in USDA


MobileIron selected as subcontractor in Defense Information Systems Agency MDM/MAS contract

COVID-19 drives agencies to investigate alternatives to VPNs, raises need for BYOD support

COVID-19 drives agencies to investigate alternatives to VPNs, raises need for BYOD support