SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
 
1
415 East Middlefield Road
Mountain View, CA 94043 USA
Tel. +1.650.919.8100
Fax +1.650.919.8006
info@mobileiron.com
AppConnect and AppTunnel:
Advanced Security for Mobile Apps
	
  
The largest companies in the world trust MobileIron® as their foundation for Mobile
IT. Available as a highly-scalable on-premise or cloud solution, MobileIron was
purpose-built to secure and manage mobile apps, documents, and devices.
MobileIron was the first to deliver key innovations such as multi-OS mobile device
management (MDM), mobile application management (MAM), and BYOD privacy.
As mobile becomes a primary computing platform for the enterprise, every business
function will mobilize core operations through apps. These apps live outside the
enterprise perimeter and can run on personally-owned or minimally managed
devices. Mobile IT must protect the app data while preserving the user experience.
The Connected Container
A “container” is set of protected data. This data is separated from all other data on
the device and is protected from unauthorized apps or users.
In the first generation of enterprise mobility, all business data and associated apps
were segregated into monolithic, email-based containers. While this protected
business data, it forced users into an experience they did not like.
In the new generation of enterprise mobility, user experience is core and requires:
• For end user: Security must be invisible. The mobile experience must be
integrated. Privacy must be preserved, especially on personally-owned
devices.
• For Mobile IT: Business data must be protected. Device support must be
broad. Helpdesk impact must be minimal. The business must be enabled
quickly.
The MobileIron connected container architecture meets these requirements and
secures the mobile apps lifecycle. It has two components:
1. MobileIron AppConnect:
MobileIron AppConnect containerizes apps to protect app data-at-rest without
touching personal data. Each app becomes a secure container whose data is
encrypted, protected from unauthorized access, and removable. Because each user
has multiple business apps, each app container is also connected to other secure
app containers. This allows the sharing of policies like app single sign-on and the
sharing of data like documents. All app containers are connected to MobileIron for
policy management.
2. MobileIron AppTunnel:
MobileIron AppTunnel provides secure tunneling and
Challenge
Prevent data loss as mobile apps become
business-critical and widely adopted
Solution
MobileIron AppConnect MobileIron
AppTunnel
Benefits
• Secure mobile app lifecycle
• Protect app data-at-rest without touching
personal data
• Protect app data-in-motion without VPN
• Protect privacy thru data separation
• Configure apps silently and update
policies dynamically without user action
• Support both SDK and wrapping methods
for app containerization
• Support both iOS and Android
• Support both in-house and public apps
Recent Recognition
Gartner: MobileIron positioned in the
Leaders Quadrant of the Magic Quadrant for
Mobile Device Management Software
(May 2012)
Info-Tech: MobileIron listed as a Champion
in the Mobile Device Management Suites
Vendor Landscape (Aug 2012)
IDC: MobileIron named fastest-growing
mobile enterprise management vendor in
the world (Sept 2012)
 
2	
  
access control to protect app data-in-motion without requiring VPN. While the
MobileIron platform also supports 3rd party VPNs, many customers do not want to
open up VPN access to every app on a device. As an alternative, AppTunnel
provides granular, app-by-app session security to connect each app container to the
corporate network. It builds upon the proven MobileIron Sentry technology, which is
installed at thousands of customers and was the industry’s first intelligent gateway
for ActiveSync email.
AppConnect
MobileIron AppConnect creates a secure app container through either an SDK and
wrapper for iOS or a wrapper for Android. This container is connected to other
secure app containers and to the MobileIron console for ongoing management:
• Authentication: Confirm identity through domain username and password
or certificates so only approved users can access business apps
• Single sign-on: Enforce time-based app-level sign-on across app
containers
• Authorization: Allow or block app usage or storage based on device
posture
• Configuration: Silently configure personalized settings such as user name,
server name, and custom attributes without requiring user intervention
• Encryption: Ensure that all app data stored on the device is encrypted
• DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste,
print, and open-in permissions, so sensitive data doesn’t leave the container
• Dynamic policy: Update app policies dynamically
• Reporting: Provide app usage statistics
• Selective wipe: Remotely wipe app data without touching personal data
AppTunnel
MobileIron AppTunnel provides tunneling and access control to protect app data-
inmotion without requiring VPN. AppTunnel provides several layers of security:
• Unique connection: Establish for only authorized apps, users, and devices
• Certificate-based session authentication: Prevent man-in-the-middle
attacks
• Access control rules: Block network access if app-side security is
compromised
About MobileIron
MobileIron has been chosen by thousands of organizations that are transforming
their businesses through enterprise mobility. Available as an on-premise or a cloud
solution, MobileIron was purpose-built to secure and manage mobile apps,
documents, and devices for global companies. MobileIron has been chosen by 7 of
the 10 top global pharmaceutical companies, 4 of the 5 top global automotive
manufacturers, 3 of the top 5 global retailers, and half of the 10 top global law firms.
Customer Perspective
Apps: “MobileIron has been a very strategic
platform for us to support and manage our
mobile devices and apps.”
Life Technologies (Life Sciences)
BYOD: “MobileIron provides exactly the
framework we needed to let our people use
the device of their choice.”
Thames River Capital (Financial Services)
Innovation: “MobileIron is helping us
become a technology innovator.”
Norton Rose (Legal)
Multi-OS: “We needed a truly multi-OS
solution. MobileIron was without doubt the
most comprehensive.”
Colt Car Co. / Mitsubishi (Automotive)
Scale: “[MobileIron] did a great job not only
helping us getting the product scaled, but
also fixing any kind of issues.”
Lexington School District (Education)
Security: “In our sector, the right mobile
security solution is not a nice to have, it’s
mandatory.”
National Health Service (Healthcare)
Support: “In this day and age of bad
customer service, my experience with
MobileIron has been consistently great.”
City of North Vancouver (Government)
User experience: “MobileIron’s strength is
its ease of use for iPad owners.”
KLA-Tencor (Technology)
Note: Some Android wrapping features are targeted
for a future release. Some features may differ
between operating systems.
Gartner, Inc., Magic Quadrant for Mobile Device
Management Software, Phillip Redman, John
Girard, Monica Basso, May 17, 2012. Gartner does
not endorse any vendor, product or service depicted
in its research publications, and does not advise
technology users to select only those vendors with
the highest ratings. Gartner research publications
consist of the opinions of Gartner's research
organization and should not be construed as
statements of fact. Gartner disclaims all warranties,
expressed or implied, with respect to this research,
including any warranties of merchantability or
fitness for a particular purpose.
Info-Tech Research Group, Inc., Vendor
Landscape: Mobile Device Management Suites,
August 2012. Info-Tech Research Group Vendor
Landscape reports recognize outstanding vendors
in the technology marketplace. Assessing vendors
by the strength of their offering and their strategy for
the enterprise, Info-Tech Research Group Vendor
Landscapes pay tribute to the contribution of
exceptional vendors in a particular category.
©2009-2012 MobileIron. All rights reserved.
MobileIron, MyPhone@Work and Connected Cloud
are registered trademarks of MobileIron. All other
product or company names may be trademarks
and/or registered trademarks of their respective
owners. While every effort is made to ensure the
information given is accurate, MobileIron does not
accept liability for any errors or mistakes which may
arise. Specifications and other information in this
document may be subject to change without notice.

Contenu connexe

Tendances

Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobilitykhanrock247
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...anuragsinghal1981
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesBiBoard.Org
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Mobile application development company
Mobile application development companyMobile application development company
Mobile application development companySankar Annamalai
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 

Tendances (20)

Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devices
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Mobile application development company
Mobile application development companyMobile application development company
Mobile application development company
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 

Similaire à MobileIron's Enterprise Solution for App Security and Management

State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobileSolutionsDTAG
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Hepto Software Company
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesFuGenx Technologies
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlTech Mahindra
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics BlackBerry
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 

Similaire à MobileIron's Enterprise Solution for App Security and Management (20)

State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-Administrators
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challenges
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 

Dernier

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

MobileIron's Enterprise Solution for App Security and Management

  • 1.   1 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com AppConnect and AppTunnel: Advanced Security for Mobile Apps   The largest companies in the world trust MobileIron® as their foundation for Mobile IT. Available as a highly-scalable on-premise or cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy. As mobile becomes a primary computing platform for the enterprise, every business function will mobilize core operations through apps. These apps live outside the enterprise perimeter and can run on personally-owned or minimally managed devices. Mobile IT must protect the app data while preserving the user experience. The Connected Container A “container” is set of protected data. This data is separated from all other data on the device and is protected from unauthorized apps or users. In the first generation of enterprise mobility, all business data and associated apps were segregated into monolithic, email-based containers. While this protected business data, it forced users into an experience they did not like. In the new generation of enterprise mobility, user experience is core and requires: • For end user: Security must be invisible. The mobile experience must be integrated. Privacy must be preserved, especially on personally-owned devices. • For Mobile IT: Business data must be protected. Device support must be broad. Helpdesk impact must be minimal. The business must be enabled quickly. The MobileIron connected container architecture meets these requirements and secures the mobile apps lifecycle. It has two components: 1. MobileIron AppConnect: MobileIron AppConnect containerizes apps to protect app data-at-rest without touching personal data. Each app becomes a secure container whose data is encrypted, protected from unauthorized access, and removable. Because each user has multiple business apps, each app container is also connected to other secure app containers. This allows the sharing of policies like app single sign-on and the sharing of data like documents. All app containers are connected to MobileIron for policy management. 2. MobileIron AppTunnel: MobileIron AppTunnel provides secure tunneling and Challenge Prevent data loss as mobile apps become business-critical and widely adopted Solution MobileIron AppConnect MobileIron AppTunnel Benefits • Secure mobile app lifecycle • Protect app data-at-rest without touching personal data • Protect app data-in-motion without VPN • Protect privacy thru data separation • Configure apps silently and update policies dynamically without user action • Support both SDK and wrapping methods for app containerization • Support both iOS and Android • Support both in-house and public apps Recent Recognition Gartner: MobileIron positioned in the Leaders Quadrant of the Magic Quadrant for Mobile Device Management Software (May 2012) Info-Tech: MobileIron listed as a Champion in the Mobile Device Management Suites Vendor Landscape (Aug 2012) IDC: MobileIron named fastest-growing mobile enterprise management vendor in the world (Sept 2012)
  • 2.   2   access control to protect app data-in-motion without requiring VPN. While the MobileIron platform also supports 3rd party VPNs, many customers do not want to open up VPN access to every app on a device. As an alternative, AppTunnel provides granular, app-by-app session security to connect each app container to the corporate network. It builds upon the proven MobileIron Sentry technology, which is installed at thousands of customers and was the industry’s first intelligent gateway for ActiveSync email. AppConnect MobileIron AppConnect creates a secure app container through either an SDK and wrapper for iOS or a wrapper for Android. This container is connected to other secure app containers and to the MobileIron console for ongoing management: • Authentication: Confirm identity through domain username and password or certificates so only approved users can access business apps • Single sign-on: Enforce time-based app-level sign-on across app containers • Authorization: Allow or block app usage or storage based on device posture • Configuration: Silently configure personalized settings such as user name, server name, and custom attributes without requiring user intervention • Encryption: Ensure that all app data stored on the device is encrypted • DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste, print, and open-in permissions, so sensitive data doesn’t leave the container • Dynamic policy: Update app policies dynamically • Reporting: Provide app usage statistics • Selective wipe: Remotely wipe app data without touching personal data AppTunnel MobileIron AppTunnel provides tunneling and access control to protect app data- inmotion without requiring VPN. AppTunnel provides several layers of security: • Unique connection: Establish for only authorized apps, users, and devices • Certificate-based session authentication: Prevent man-in-the-middle attacks • Access control rules: Block network access if app-side security is compromised About MobileIron MobileIron has been chosen by thousands of organizations that are transforming their businesses through enterprise mobility. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices for global companies. MobileIron has been chosen by 7 of the 10 top global pharmaceutical companies, 4 of the 5 top global automotive manufacturers, 3 of the top 5 global retailers, and half of the 10 top global law firms. Customer Perspective Apps: “MobileIron has been a very strategic platform for us to support and manage our mobile devices and apps.” Life Technologies (Life Sciences) BYOD: “MobileIron provides exactly the framework we needed to let our people use the device of their choice.” Thames River Capital (Financial Services) Innovation: “MobileIron is helping us become a technology innovator.” Norton Rose (Legal) Multi-OS: “We needed a truly multi-OS solution. MobileIron was without doubt the most comprehensive.” Colt Car Co. / Mitsubishi (Automotive) Scale: “[MobileIron] did a great job not only helping us getting the product scaled, but also fixing any kind of issues.” Lexington School District (Education) Security: “In our sector, the right mobile security solution is not a nice to have, it’s mandatory.” National Health Service (Healthcare) Support: “In this day and age of bad customer service, my experience with MobileIron has been consistently great.” City of North Vancouver (Government) User experience: “MobileIron’s strength is its ease of use for iPad owners.” KLA-Tencor (Technology) Note: Some Android wrapping features are targeted for a future release. Some features may differ between operating systems. Gartner, Inc., Magic Quadrant for Mobile Device Management Software, Phillip Redman, John Girard, Monica Basso, May 17, 2012. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Info-Tech Research Group, Inc., Vendor Landscape: Mobile Device Management Suites, August 2012. Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. Assessing vendors by the strength of their offering and their strategy for the enterprise, Info-Tech Research Group Vendor Landscapes pay tribute to the contribution of exceptional vendors in a particular category. ©2009-2012 MobileIron. All rights reserved. MobileIron, MyPhone@Work and Connected Cloud are registered trademarks of MobileIron. All other product or company names may be trademarks and/or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, MobileIron does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.