Welcome!

Containers Expo Blog Authors: Elizabeth White, Gregor Petri, Ian Khan, Yeshim Deniz, AppDynamics Blog

News Feed Item

MobileIron Introduces the First Complete Mobile App Persona for the Enterprise

Delivers Mobile App Wrapping, App SDK, and App Tunneling To Secure Data-at-Rest and Data-in-Motion

MOUNTAIN VIEW, Calif., Nov. 6, 2012 /PRNewswire/ -- Companies are moving their core business operations to mobile apps. App developers are at the center of this transformation and must deliver great apps quickly while ensuring that business data remains secure. Many of the apps they build, however, will run on employee-owned devices, and, as a result, clear separation between business and personal data is essential. To address this challenge, MobileIron today introduced the first complete mobile app persona for the enterprise. MobileIron customers can now secure data-at-rest and data-in-motion for business apps while preserving the native experience their users demand.

(Logo:  http://photos.prnewswire.com/prnh/20120920/MM78751LOGO )

Watch the video on YouTube: https://info.mobileiron.com/mobileironapplications.html

An enterprise app persona includes all the apps and data used for business on a mobile device. It is associated with a specific user, based on that user's identity, and managed through policy. A complete approach to enterprise app persona delivers the ability to:

  • Secure both app data-at-rest and data-in-motion
  • Support major app operating systems, including iOS and Android
  • Secure both internal and third-party apps
  • Provide containerization through both an app wrapper and a software development kit (SDK)

MobileIron is launching two new products for establishing and securing an enterprise app persona. The first product is MobileIron AppConnect, which containerizes apps to protect app data-at-rest without touching personal data. This populates the enterprise app persona. The second product is MobileIron AppTunnel, which provides tunneling and access control to protect app data-in-motion without requiring VPN. This allows apps in the enterprise app persona to securely connect to data stores behind the firewall.

"Mobile apps are exploding across our customer base. App developers must move fast and innovate but still secure business app data and app traffic," said Bob Tinker, CEO, MobileIron. "Until now, these app developers had to trade off user experience against security. They no longer have to make that compromise. MobileIron AppConnect and AppTunnel make security painless for the developer, simple for Mobile IT, and invisible to the user. The enterprise app persona is the latest in a string of MobileIron app innovations, dating to the first enterprise app storefront in 2009, that have helped our customers make mobile apps a central part of their business operations."

MobileIron AppConnect

AppConnect transforms an iOS or Android app into a secure container with clear data separation and protection from unauthorized access. Because each user will have multiple business apps, each app container is also connected to other app containers to allow the secure sharing of data, like documents, and of policies, like app single sign-on. All app containers are connected to MobileIron for central policy management. Any app can leverage AppConnect through an easy-to-use app wrapper or a simple SDK. App wrapping minimizes developer time and secures apps post-development. The SDK can be used at any time during the development process.

MobileIron AppTunnel

AppTunnel provides granular, app-by-app session security to connect each app container to the corporate network through a secure tunnel. Mobile apps can now use AppTunnel to access back-end enterprise data without opening a full VPN connection or altering perimeter network security settings. AppTunnel uses the proven MobileIron Sentry intelligent gateway, which is already installed at thousands of enterprises.

New Capabilities

With MobileIron AppConnect and AppTunnel, organizations can now implement:

  • Authentication: Confirm user identity through domain username and password or certificates
  • Single sign-on: Enforce time-based app-level sign-on across secured app containers
  • Authorization: Allow or block app usage or data storage based on device or user risk
  • Configuration: Silently configure personalized settings such as user name, server name, and custom attributes without requiring user intervention
  • Encryption: Ensure that all app data stored on the device is encrypted
  • DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste, print, and open-in permissions, so unauthorized apps cannot access secure data
  • Dynamic policy: Update app policies dynamically
  • Reporting: Provide app usage statistics
  • Selective wipe: Remotely wipe app data without touching personal data

Protecting employee privacy

The value of the enterprise app persona to the employee is that it protects privacy. Privacy is a top concern in mobile deployments because most employees use their mobile devices for both personal and business purposes, regardless of who owns the device. They want to do their work while mobile, but they don't want to put their personal data at risk. Employee adoption of mobile initiatives depends on the credible and clear separation of business app data into an enterprise app persona that can be managed separately by the Mobile IT team. MobileIron AppConnect containers prevent all unauthorized access to business data, so IT only has to manage the container and does not need any visibility into the rest of the data on the device. This preserves user privacy, drives user adoption, and protects the organization.

About MobileIron

Recognized by leading market research advisory firm IDC as the fastest growing mobile enterprise management vendor in the world, MobileIron has been chosen by more than 3,000 organizations that are transforming their businesses through enterprise mobility. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), BYOD privacy controls, and mobile DLP. MobileIron has been chosen by 7 of the 10 top global pharmaceutical companies, 4 of the 5 top global automotive manufacturers, 3 of the top 5 global retailers, and half of the 10 top global law firms. For more information, please visit www.mobileiron.com

Safe Harbor Statement

This information is intended to outline MobileIron's general product direction and should not be relied on when making a purchasing decision.

 

 

 

SOURCE MobileIron

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...