Latest Roll Out from MobileIron Promises Highest Grade Data Security to Enterprises
MOUNTAIN VIEW, CA: After deep analysis and understanding of enterprise data and their security requirements, MobileIron announces the launch of a new solution that strengthens data loss prevention. Christened ‘MobileIron Access’, the product is compatible with most enterprise cloud apps including Salesforce and Office 365. It has established a new security requirement where, corporate data can only be accessed by trusted users on trusted devices through trusted apps.
In legacy PC systems, data was more secure since the entirety of it resided inside a single system. Each employee had his own system with the data well veiled behind the firewall. The employees were authenticated using an Identity Management System such as Active Directory and granted access to corporate data.
Organizations can not resort to that outdated method since everything now is networked. Users these days can access data through random applications that utilize cloud services, authenticate to it and share it with other apps. This is an easy route for both data loss and illegal data access and hence enterprises have been on the look-out for authorized applications. Now with MobileIron Access, enterprises can ensure that only approved apps can connect to the cloud service via mobile devices.
“With MobileIron Access, we are bringing to market the answer to data security that our customers have been waiting for,” says Barry Mainz, CEO, MobileIron. “With MobileIron Access, customers get a best-of-breed solution that integrates into their existing technology like their identity provider, and, it does not require any modifications to the cloud apps. This is data security made simple.”
The MobileIron Access allows cloud services to make access decisions based on state of the device and corporate identity of the user. Integrating with identity providers (IdP) including ADFS and PingOne, Access denies any type of ingress to unauthorized apps and devices. It also delivers visibility into users, apps and devices accessing the cloud.
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...