MobileIron is redefining enterprise security with the industry’s first mobile-centric, zero trust platform built on a unified endpoint management (UEM) foundation to secure access and protect data across the perimeter-less enterprise. Zero trust is defined by a “never trust, always verify” approach to security. MobileIron’s mobile-centric, zero trust approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats to ensure that only authorized users, devices, apps, and services can access business resources.

Unifited Endpoint Management (UEM) Platform

MobileIron UEM offers the mostcomprehensive enterprise mobile security

MobileIron UEM is the foundation for the industry’s first mobile-centric, security platform. With MobileIron, organizations can quickly and easily onboard devices and provision them over the air with all of the apps, settings, and security configurations needed to protect any iOS, macOS, Android and Windows 10 endpoint across your digital workplace. MobileIron’s zero trust approach ensures that only authorized users, devices, apps, and services can access business resources. Users enjoy a seamless and productive experience during enrollment and the single console enables IT administrators to reduce the complexity and cost of managing a fleet of endpoints.

Superior end user choice and native experience during device enrollment

MobileIron UEM enables users to stay productive and happy on their favorite devices by supporting a seamless and native device experience. Users can get up and running fast because IT can provision devices automatically and over the air, so users can simply power up their devices to get all of the security configurations, settings, data, and apps they need on their iOS, macOS, Android and Windows 10 devices with minimum manual interaction.

UEM for iOS, macOS, Android and Windows 10 devices
UEM for Apple Business Manager (ABM), Apple School Manager (ASM) Samsung Knox Mobile Enrollment, Android Zero Touch and Windows AutoPilot

Leverage a single console for multi-OS and multi-app management

MobileIron helps you simplify the configuration of enterprise settings including email, Wi-Fi, and VPN and more. IT can leverage our support for Apple Business Manager (ABM), Apple School Manager (ASM) Samsung Knox Mobile Enrollment, Android Zero Touch and Windows AutoPilot to automate device onboarding. In addition, admins can create an enterprise app store with Apps@Work to enable seamless app distribution to any endpoint. We also enable seamless authentication using enterprise certificates and Active Directory integration, as well as ongoing compliance monitoring and auto-remediation policies. IT can also use MobileIron’s single console to manage the entire device lifecycle including enrollment, provisioning, security, wiping, and endpoint reassignment/retirement. This helps IT reduce the complexity and costs of purchasing individual consoles for each operating system.

Secure mobile apps and data on any endpoint

AppConnect enables IT to leverage native separation of work and personal data while preserving the seamless user experience on any personal or corporate-owned device. Protect data at rest by encrypting business data using FIPS 140-2 cryptographic modules. Protect data in motion by using a per app VPN that provides a secure tunnel to backend resources. Prevent data loss on any device by leveraging security features such as open-in and copy/paste restrictions. And, with a secure access gateway, IT can maintain granular app-level access control that users can’t modify.

Secure mobile apps and data w/ MobileIron UEM

Secure mobile productivity applications

MobileIron provides several secure mobile productivity apps for iOS and Android devices such as Email+, Docs@Work, and Help@Work. Email+ provides secure email, contacts, calendar, and tasks. Docs@Work provides an intuitive way to access, store, edit, and view documents from email, Sharepoint, and numerous document repositories. Help@Work enables iOS users to share their screens with a help desk agent to access efficient troubleshooting and resolve problems quickly.

Mobile threat Defense Products - MobileIron

Mobile Devices Have Become PrimeTargets for Hackers. Fight Back with MobileIron!

MobileIron Threat Defense (MTD) protects and remediates against known and unknown (zero-day) threats that target your organization’s Android and iOS devices. MTD provides the ideal deployment, detection, and remediation solution to defend against attacks that occur at the device-, network-, and application-level. Multi-vector anti-phishing enables you to protect your organization against the #1 social attack vector by leveraging complete mobile phishing protection made possible by taking full-advantage of the MobileIron UEM policy engine, MTD on-device machine learning and phishing URL lookup, optional expansion to include cloud-based phishing URL lookup and Zero Sign-On (ZSO), which eliminates user credentials — the primary target of phishing attacks today.

Protect Against Phishing, the #1 Attack Vector

Phishing attacks leverage deception to trick individuals into divulging personal information that can then be leveraged for fraudulent purposes. According to Verizon Data Breach Investigations Report (DBIR) 2020, phishing is the top form of social driven breaches. And while the vast majority of phishing attacks arrived via email, attacks were also carried out via website, phone and SMS. Why are mobile devices increasingly being targeted for phishing attacks? There are several reasons. Small mobile device screens make it difficult for users to access and view key information while being prompted to make fast decisions. And when it comes to text messages, it’s difficult to verify their authenticity. Don’t allow your users take the bait! MobileIron Threat Defense (MTD) protects and remediates against phishing attacks.

  • Achieve 100% user adoption for anti-phishing.
  • Deploy multi-vector phishing protection and remediation.
  • Control the balance between security and user privacy.
Prevent Mobile Phishing Attacks with mobile threat prevention - Mobileiron MTD
Deploy and Activate Mobile Threat Protection Easily with MobileIron

Easily Deploy with 100% User Adoption

No User Interaction Required to Deploy and Activate Protection

One of the biggest enterprise security challenges is ensuring that mobile security is actually activated and updated on all user devices. Since organizations can’t rely on users to download and activate applications, any mobile threat protection should be automatically activated on the device. This helps ensure users are continuously protected from threats that come from connecting to unsecured Wi-Fi, leaving Bluetooth enabled, downloading an app from a questionable app store, or simply clicking on a link they believe to be harmless.

  • MTD is built directly into the MobileIron unified endpoint management (UEM) client to ensure seamless and continuous on-device protection.
  • No user action is required to deploy and activate MTD.
  • Users cannot disable MTD or remove it from their UEM managed devices.Download Solution Brief

Speed Matters

In the race against hackers, speed matters. Most mobile threat detection solutions rely on a backend cloud service to perform threat detection, inform UEM of a policy violation and then send remediation instructions to the UEM agent. A man-in-the-middle (MITM) attack can easily prevent connection to the cloud service, rendering threat detection capabilities completely useless, and thus failing to trigger the necessary remedial action. MTD uses machine-learning algorithms optimized to continuously detect threats, even when the device is offline. MTD’s unique approach to detection and remediation ensures immediate and ongoing visibility into malicious threats across all Android and iOS mobile devices, as well as detailed analyses of risky apps.

  • Get faster, on-device detection and remediation of known and zero-day threats, even without cellular or Wi-Fi connectivity.
  • Machine-learning algorithms provide immediate and ongoing visibility into malicious threats across all protected Android and iOS devices.
  • Gain real-time insight into the apps installed on user devices, and improve decision-making using analytics and detailed reports that provide threat assessment score, explanation of risks, and implications.
Mobile Threat Detection powered by Machine Learning
Administrative view for continuous app visibility and monitoring

Continuous App Visibility and Evaluation

MTD provides the level of visibility you need to continuously review and evaluate the mobile apps that are downloaded and installed on your users’ Android and iOS devices. This enables you to quickly identify those apps that pose security and privacy threats.

  • Easily determine the number of users who have risky apps on their devices.
  • Proactively leverage app usage policies to allow safe apps and disallow risky apps.
  • Allow or deny apps based upon app risk scoring, app behaviors, domains, certificates, shared code, and network communications.
  • Upload any app for analysis by using an app store URL or an actual file.

Get Granular Control Over Mobile Configuration

More granular control over your mobile app configuration policy enables you to better maintain your organization’s overall security posture. MTD app analytics provide the ability to easily identify those apps which could potentially access and expose customer and employee data, as well as other intellectual property.

  • Quickly uncover those mobile apps that violate your organization’s compliance policies and take necessary corrective actions.
  • Filter mobile apps via a variety of characteristics such as location gathering, SMS reading, and screen recording.
  • Receive notification when newly created apps include characteristics that you have identified as security risks, and disallow those apps.
  • Leverage a variety of mobile app security and privacy risk summary reports to make faster, more informed decisions to best support your organization’s security posture.
Administrative granular control for app policies
MobileIron Threat Defense compliance configuration

Flexible Compliance Actions Support User Productivity

MTD protects your organization against data loss while driving user productivity. That’s because MTD enables admins to configure automated, incremental compliance actions based upon the perceived severity of the security threat. Non-intrusive actions such as monitoring, can be automatically increased to send an alert, block AppConnect and email, quarantine the device, and perform selective wipe. So rather than automatically block a user’s access to corporate resources simply because they connect to unsecured Wi-Fi in their hotel room, or install a non-compliant social media app, a more gradual series of compliance actions can be taken as deemed necessary by the admin. This provides a much better experience for the users, and allows them to remain productive.

  • Admins can choose from a list of granular compliance actions that can be either server-initiated, or initiated at the device level.
  • Create and apply multiple local remediation action configurations to different user groups.
  • Shorten the “kill chain” for attacks by transforming the mobile device into the policy enforcement point to reduce detection time of threats and attacks.

Benefits of MobileIron Threat Defense

Security posture

Improve the security posture of your organization by achieving 100% user activation for MTD on the devices you manage with MobileIron UEM.

unnecessary expenses

Proactively protect your business from unnecessary expenses by reducing the exposure of confidential customer data, potential regulatory fines, and damage to your reputation.

Machine Learning

Machine learning algorithms support your mobile threat defense strategy by providing ongoing threat intelligence with or without Internet connectivity.

Apps

Gain insight into which apps are installed on users’ devices, and leverage threat assessment scores, as well as explanations of risks and implications to determine which compliance actions (if any, and in what order)should be taken.

Threat notifications

Compliance actions and threat notifications performed on the device shorten the “kill chain” and increase your chances for data loss prevention when battling today’s complex attacks on mobile devices.

cloud-based and on-premises

Choose between flexible cloud-based and on-premises deployment options to best meet the needs of your organization.