Latest Roll Out from MobileIron Promises Highest Grade Data Security to Enterprises

By CIOReview | Wednesday, April 13, 2016
725
1230
241

MOUNTAIN VIEW, CA: After deep analysis and understanding of enterprise data and their security requirements, MobileIron announces the launch of a new solution that strengthens data loss prevention. Christened ‘MobileIron Access’, the product is compatible with most enterprise cloud apps including Salesforce and Office 365. It has established a new security requirement where, corporate data can only be accessed by trusted users on trusted devices through trusted apps.

In legacy PC systems, data was more secure since the entirety of it resided inside a single system. Each employee had his own system with the data well veiled behind the firewall. The employees were authenticated using an Identity Management System such as Active Directory and granted access to corporate data.

Organizations can not resort to that outdated method since everything now is networked. Users these days can access data through random applications that utilize cloud services, authenticate to it and share it with other apps. This is an easy route for both data loss and illegal data access and hence enterprises have been on the look-out for authorized applications. Now with MobileIron Access, enterprises can ensure that only approved apps can connect to the cloud service via mobile devices.

“With MobileIron Access, we are bringing to market the answer to data security that our customers have been waiting for,” says Barry Mainz, CEO, MobileIron. “With MobileIron Access, customers get a best-of-breed solution that integrates into their existing technology like their identity provider, and, it does not require any modifications to the cloud apps. This is data security made simple.”

The MobileIron Access allows cloud services to make access decisions based on state of the device and corporate identity of the user. Integrating with identity providers (IdP) including ADFS and PingOne, Access denies any type of ingress to unauthorized apps and devices. It also delivers visibility into users, apps and devices accessing the cloud.