Latest Roll Out from MobileIron Promises Highest Grade Data Security to Enterprises
MOUNTAIN VIEW, CA: After deep analysis and understanding of enterprise data and their security requirements, MobileIron announces the launch of a new solution that strengthens data loss prevention. Christened ‘MobileIron Access’, the product is compatible with most enterprise cloud apps including Salesforce and Office 365. It has established a new security requirement where, corporate data can only be accessed by trusted users on trusted devices through trusted apps.
In legacy PC systems, data was more secure since the entirety of it resided inside a single system. Each employee had his own system with the data well veiled behind the firewall. The employees were authenticated using an Identity Management System such as Active Directory and granted access to corporate data.
Organizations can not resort to that outdated method since everything now is networked. Users these days can access data through random applications that utilize cloud services, authenticate to it and share it with other apps. This is an easy route for both data loss and illegal data access and hence enterprises have been on the look-out for authorized applications. Now with MobileIron Access, enterprises can ensure that only approved apps can connect to the cloud service via mobile devices.
“With MobileIron Access, we are bringing to market the answer to data security that our customers have been waiting for,” says Barry Mainz, CEO, MobileIron. “With MobileIron Access, customers get a best-of-breed solution that integrates into their existing technology like their identity provider, and, it does not require any modifications to the cloud apps. This is data security made simple.”
The MobileIron Access allows cloud services to make access decisions based on state of the device and corporate identity of the user. Integrating with identity providers (IdP) including ADFS and PingOne, Access denies any type of ingress to unauthorized apps and devices. It also delivers visibility into users, apps and devices accessing the cloud.
By Dr. John Bates, CTO, Intelligent Business Operations &...
By Denise Zabawski, CIO, Nationwide Childrens Hospital
By Cynthia Weaver, A.V.P of IT, Walbridge
By Kris Lappala, CIO, Kiewit
By Sherry Aaholm, VP & CIO, Cummins [NYSE:CMI]
By Leo Casusol, CIO, Liquidity Services
By Joe Fuller, VP/CIO, Dominion Enterprises
By Dennis Fiszer, CCO, HUB International
By David Butler, Sr. Director, Digital Customer Experience,...
By Mark Jacobsohn, SVP, Booz Allen Hamilton
By Miguel Gamino, CIO & Executive Director-Department of...
By Jonathan Reichental, CIO, City of Palo Alto
By Pam Puetz, VP & HR Services, First American Financial...
By Aref Matin, CTO, Ascend Learning
By Jim Sills, CIO/Cabinet Secretary, State of Delaware
By Jesse Laver, Vice President Global Sector Development,...
By Andy Newsom, CIO, CSL Behring
By Jason Cook, CISO, BT Americas [NYSE:BT]
By Jim Grubb, VP Marketing & Chief Demonstration Officer, Cisco
By Don Lindsey, VP and CIO, Tallahassee Memorial HealthCare