To stay productive, mobile users need secure, easy, anytime access to essential enterprise web resources inside or outside the firewall. To provide simple, immediate mobile access to internal web content and web applications, IT organizations need secure solutions that can:
- Provide secure mobile access to enterprise web content and apps.
- Preserve the native web browser experience.
- Prevent unauthorized access or sharing of corporate intranet content.
- Enable users to quickly locate web resources.
MobileIron [email protected] uses native Safari web-rendering technologies to display internal websites, existing web apps, and HTML5 apps with a look and feel that is consistent with standard mobile web browsers. Users can access familiar functions, such as the “pinch to zoom” gesture, to access and view content. [email protected] also provides an app-specific tunnel to give users immediate access to internal web content, which eliminates the need for a full-device VPN. The robust security of the tunnel is seamless and invisible to mobile users, allowing them to quickly and easily access the internal content they need to stay productive.
[email protected] Features
Secure data in motion
Enterprise web traffic is tunneled through MobileIron Sentry for secure transport and access control. To comply with privacy laws in some regions, IT can enable split-tunnel configurations, which allows external websites to bypass MobileIron Sentry and IT visibility.
Unlike a VPN, the tunnel is exclusive to [email protected], which allows IT to restrict access. For instance, some internal web resources can be restricted to users based on their group membership in the enterprise directory or other user and device characteristics. If the user or device falls out of compliance, the tunnel will be automatically blocked until the compliance issue is remediated. VPN is not required.
Containerized data at rest
Browser cache, cookies, history, and other website data are all encrypted and subject to wipe depending on device compliance.
Open in and cut/copy/paste functions can be restricted to ensure that corporate data does not leak to unauthorized applications.
Repurpose policies, users, roles, groups, and permissions already created in MobileIron to set [email protected] configurations. These include unique browser “bookmarks” to internal corporate web resources based on the user’s role in the organization.