Welcome!

News Feed Item

MobileIron Enhances iOS 7 App Security with Integrated Per-App VPN

MOUNTAIN VIEW, Calif., April 1, 2014 /PRNewswire/ -- As companies become Mobile First organizations, they are transforming core business processes through mobile apps. Each of these apps must be secured without compromising the user experience. Some of these apps will be built by the enterprise while others will be downloaded from public app stores to allow the organization to leverage the innovation of the commercial app ecosystem.

MobileIron's Logo.

Today, MobileIron, a leader in security and management for apps, content, and devices, announced MobileIron Tunnel to deliver an end-to-end solution for per-app VPN on iOS. Within its AppConnect ecosystem, MobileIron has already provided enterprise-grade security for apps built using the AppConnect framework. MobileIron Tunnel will extend the ability to secure data-in-motion to almost any App Store app that is managed by the enterprise.

Secure App Data in Motion
MobileIron Tunnel was purpose-built for the needs of mobile users and IT. Tunnel will allow organizations to authorize specific business apps, including both internally built apps and App Store apps, to access corporate resources behind the firewall. Unapproved and personal apps will be blocked from using Tunnel, which enhances security and protects user privacy. The result is that only business data will flow through Tunnel.

This per-app access will be dynamic and will be based not just on device and user identity but also on the overall security posture of the device. If the device is not compliant, Tunnel will block even authorized apps from accessing the enterprise. Devices fall in and out of compliance regularly, especially in BYOD programs, making such dynamic access control essential.

Streamline Authentication
Tunnel will also simplify authentication through its support of iOS 7 single sign on (SSO). MobileIron's ability to proxy Kerberos will allow iOS 7 SSO to be used with devices that are not on the corporate network without needing to expose the Kerberos Key Distribution Center (KDC). This will protect both data-in-motion and the customer's Kerberos infrastructure. For example, Tunnel will enable Apple's Safari browser to securely access intranet sites behind the firewall with transparent authentication so that users do not have to re-enter their usernames and passwords as they go from site to site.

The unique power of Tunnel is that it combines the secure transport of traditional VPN with certificate-based identity and posture-based policy, all managed through a single console. This will simplify both enterprise access for the user and data security for IT.

"Our customers want total freedom to be able to choose the right apps for their business, but they can't compromise on security or the user's expectation of a great experience," said Sean Convery, Vice President of Product at MobileIron. "MobileIron Tunnel will bridge the gap between traditional information security requirements and the mobile application explosion that is reshaping the IT landscape."

For more information on MobileIron Tunnel, visit http://www.mobileiron.com/products/tunnel and register here to join MobileIron for a webinar on April 8 at 8AM PDT and April 9 at 9AM HKT.

Safe Harbor
Statements concerning future prospects, business outlook, and product availability and plans are forward looking statements that involve a number of uncertainties and risks. Factors that could cause actual events or results to differ materially include: sales productivity; possible disruptive effects of organizational changes; shifts in customer demand; perceptions of MobileIron and its prospects; technological changes; competitive factors; unanticipated delays in scheduled product availability dates; general business conditions; delays and inabilities in negotiating third partner partnerships, and other factors. The information is intended to outline our general product direction and it should not be relied upon in making purchasing decisions. The information is not a commitment, promise or legal obligation to deliver any material, code or functionality. The development, release and timing of any features or functionality described for our products remains at MobileIron's sole discretion. Future product will be priced separately. This does not constitute an offer to sell any product or technology.

About MobileIron
A leader in security and management for mobile apps, content, and devices, MobileIron's mission is to enable organizations around the world to embrace mobility as their primary IT platform in order to transform their businesses and increase their competitiveness. Leading global companies rely on MobileIron's scalable architecture, rapid innovation, and best practices as the foundation for their Mobile First initiatives. For more information, please visit www.mobileiron.com.

Logo - http://photos.prnewswire.com/prnh/20120920/MM78751LOGO

SOURCE MobileIron

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
Docker containers have brought great opportunities to shorten the deployment process through continuous integration and the delivery of applications and microservices. This applies equally to enterprise data centers as well as the cloud. In his session at 20th Cloud Expo, Jari Kolehmainen, founder and CTO of Kontena, discussed solutions and benefits of a deeply integrated deployment pipeline using technologies such as container management platforms, Docker containers, and the drone.io Cl tool. H...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...