Access additions

MobileIron has introduced new lifecycle features for its cloud security solution MobileIron Access.

  • 7 years ago Posted in
From Discovery to Analytics: MobileIron Access Expands the Cloud Security Lifecycle
 
The new features include:
  • MobileIron Access Risk Discovery identifies unauthorized devices and apps accessing business cloud services like Office 365 and Salesforce.
  • MobileIron Access for Mac and PC brings conditional access to the desktop and ensures that only trusted Macs, Windows 10, and Windows 7 devices can access those services.
  • MobileIron Access Authentication Analytics identifies unusual patterns of usage that could indicate either a new business need or a potential security threat.
MobileIron Access gives organizations a unified security architecture to enable and protect the business cloud services their employees want to use.

“Cloud services are a mandate for many organizations but companies are losing data every day to unauthorized devices and apps,” said Barry Mainz, President and CEO, MobileIron. “Logins and passwords do not provide enough security. We are defining the next phase of cloud security which involves the tools to discover security risks; conditional access based on user, device, and app; analytics and reporting; and the ability to extend this technology across all endpoints. We’re the only company that is purely focused on this area.”  
Unauthorized cloud services run rampant
Ask a CIO how many cloud apps and services their organization uses and they are likely to estimate between 30 and 40. However, the reality is that they typically have more than 900 apps on their extended network, most of which were adopted without IT approval or oversight.*
Devices and apps pose serious cloud security risks
There are a variety of security risks that exist between devices and apps and the services to which they connect. For example:
  • Jailbroken device: An employee uses Office 365 mobile app to access business data from a jailbroken device. Business data is now on a hacked device.
  • Unauthorized Mac or PC: An employee syncs Google Drive files to a personal computer. Business data is now on an unsecured device.
  • Unauthorized cloud app: A salesperson downloads one of the dozens of apps that use APIs to connect to the salesforce.com cloud service. Business data is now in an unsecured mobile app.
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and...
New distribution agreement set to bolster Westcon-Comstor’s Zero Trust offering in more markets...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...