sb-au logo
Story image

MobileIron locks down mobile app to cloud security with new offering

MobileIron has debuted its newest security offering, MobileIron Access, locally, with the vendor saying the offering provides ‘the first unified solution for mobile and cloud security’.

The offering, which is designed to secure enterprise cloud data on mobile devices,

The offering, available via Distribution Central, enables only trusted apps on trusted devices with trusted users to be able to access corporate data in the cloud.

Administrators can define granular cloud access control policies based on application, IP address, identity and device posture.

Barry Mainz, MobileIron chief executive, says while mobile and cloud are becoming increasingly strategic to enterprises, people falsely believe cloud services are automatically secure because they require a username and password.

“That’s simply not true,” Mainz says.

He says MobileIron Access provides IT administrators with ‘the first unified solution for mobile and cloud security’.

Nick Verykios, Distribution Central chief executive, says rapid change in mobile and cloud technologies means rapid change for IT security requirements too.

“Any company that has employees using mobile devices and cloud services – and I’d say that is almost every company in Australia – should consider a solution that enhances their IT security at a mobile app level,” Verykios says.

Access builds on MobileIron’s existing portfolio which includes Sentry for protecting data-in-motion and blocking access from non-compliant devices and Tunnel, which does this for applications.

Identity Access management integration enables IT administrators to use Mobile Iron to make access decisions based on the device and user identity. The new Access offering extends that to cloud services.

Mainz says two key trends of the emergence of ‘mobile operating system’ Windows 10 and cloud, are driving MobileIron’s business – the company sold its 10 millionth seat last quarter and has billings of US$169 million.

“If you look at the way [Windows 10’s] management architecture works, EMM is going to be the model going forward.”

On the cloud front, he says as the perimeter disappears, enterprises are seeking new ways to manage security.

“We provide assets and solutions around mobile security, network security for connectivity and cloud security.”

A recent report from MobileIron highlighted a lack of mobile security measures in Australia.

The report shows only 7% of Australian companies are enforcing OS updates, and less than 5% are using app reputation or mobile threat detection software.

The report also shows 64% of Austrlaian companies had at least one device out of compliance.

Mainz says while the velocity of mobile attacks is increasing, the data shows enterprises are still not doing the things they could be to protect themselves.

“This lack of security hygiene demonstrates that enterprises are alarmingly complacent, even when many solutions are readily available.”

MobileIron says most new mobile attacks threatening enterprises are simply re-using tactics that have worked before, however when the attacks are successful, they can result in the loss of both personal and business data.

“A mobile device that is secured using EMM software triggers a security incident when the device is compromised or out-of-compliance with the company’s security policies,” MobileIron says.

“Network administrators can respond to notice of the security incident and take appropriate remedial action.

“This is an important feature of EMM because security incidents are often the precursor to a breach. When a device or app is out of compliance, then the device or app is vulnerable to attacks that can put enterprise data at risk.”

Link image
Gartner report: Why SD-WAN is becoming the de-facto option
Network service providers are increasingly challenged by established and new competition in the overlay SD-WAN management as well as in the underlay WAN transport, the report says.More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Link image
Creating a lean business machine with automation and low-code
Forrester data indicates that process automation was a strategic initiative for many organizations before COVID and remains so after. Catch this webinar to learn more about automation.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More