SlideShare a Scribd company logo
1 of 2
Download to read offline
 
1
415 East Middlefield Road
Mountain View, CA 94043 USA
Tel. +1.650.919.8100
Fax +1.650.919.8006
info@mobileiron.com
AppConnect and AppTunnel:
Advanced Security for Mobile Apps
	
  
The largest companies in the world trust MobileIronÂŽ as their foundation for Mobile
IT. Available as a highly-scalable on-premise or cloud solution, MobileIron was
purpose-built to secure and manage mobile apps, documents, and devices.
MobileIron was the first to deliver key innovations such as multi-OS mobile device
management (MDM), mobile application management (MAM), and BYOD privacy.
As mobile becomes a primary computing platform for the enterprise, every business
function will mobilize core operations through apps. These apps live outside the
enterprise perimeter and can run on personally-owned or minimally managed
devices. Mobile IT must protect the app data while preserving the user experience.
The Connected Container
A “container” is set of protected data. This data is separated from all other data on
the device and is protected from unauthorized apps or users.
In the first generation of enterprise mobility, all business data and associated apps
were segregated into monolithic, email-based containers. While this protected
business data, it forced users into an experience they did not like.
In the new generation of enterprise mobility, user experience is core and requires:
• For end user: Security must be invisible. The mobile experience must be
integrated. Privacy must be preserved, especially on personally-owned
devices.
• For Mobile IT: Business data must be protected. Device support must be
broad. Helpdesk impact must be minimal. The business must be enabled
quickly.
The MobileIron connected container architecture meets these requirements and
secures the mobile apps lifecycle. It has two components:
1. MobileIron AppConnect:
MobileIron AppConnect containerizes apps to protect app data-at-rest without
touching personal data. Each app becomes a secure container whose data is
encrypted, protected from unauthorized access, and removable. Because each user
has multiple business apps, each app container is also connected to other secure
app containers. This allows the sharing of policies like app single sign-on and the
sharing of data like documents. All app containers are connected to MobileIron for
policy management.
2. MobileIron AppTunnel:
MobileIron AppTunnel provides secure tunneling and
Challenge
Prevent data loss as mobile apps become
business-critical and widely adopted
Solution
MobileIron AppConnect MobileIron
AppTunnel
Benefits
• Secure mobile app lifecycle
• Protect app data-at-rest without touching
personal data
• Protect app data-in-motion without VPN
• Protect privacy thru data separation
• Configure apps silently and update
policies dynamically without user action
• Support both SDK and wrapping methods
for app containerization
• Support both iOS and Android
• Support both in-house and public apps
Recent Recognition
Gartner: MobileIron positioned in the
Leaders Quadrant of the Magic Quadrant for
Mobile Device Management Software
(May 2012)
Info-Tech: MobileIron listed as a Champion
in the Mobile Device Management Suites
Vendor Landscape (Aug 2012)
IDC: MobileIron named fastest-growing
mobile enterprise management vendor in
the world (Sept 2012)
 
2	
  
access control to protect app data-in-motion without requiring VPN. While the
MobileIron platform also supports 3rd party VPNs, many customers do not want to
open up VPN access to every app on a device. As an alternative, AppTunnel
provides granular, app-by-app session security to connect each app container to the
corporate network. It builds upon the proven MobileIron Sentry technology, which is
installed at thousands of customers and was the industry’s first intelligent gateway
for ActiveSync email.
AppConnect
MobileIron AppConnect creates a secure app container through either an SDK and
wrapper for iOS or a wrapper for Android. This container is connected to other
secure app containers and to the MobileIron console for ongoing management:
• Authentication: Confirm identity through domain username and password
or certificates so only approved users can access business apps
• Single sign-on: Enforce time-based app-level sign-on across app
containers
• Authorization: Allow or block app usage or storage based on device
posture
• Configuration: Silently configure personalized settings such as user name,
server name, and custom attributes without requiring user intervention
• Encryption: Ensure that all app data stored on the device is encrypted
• DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste,
print, and open-in permissions, so sensitive data doesn’t leave the container
• Dynamic policy: Update app policies dynamically
• Reporting: Provide app usage statistics
• Selective wipe: Remotely wipe app data without touching personal data
AppTunnel
MobileIron AppTunnel provides tunneling and access control to protect app data-
inmotion without requiring VPN. AppTunnel provides several layers of security:
• Unique connection: Establish for only authorized apps, users, and devices
• Certificate-based session authentication: Prevent man-in-the-middle
attacks
• Access control rules: Block network access if app-side security is
compromised
About MobileIron
MobileIron has been chosen by thousands of organizations that are transforming
their businesses through enterprise mobility. Available as an on-premise or a cloud
solution, MobileIron was purpose-built to secure and manage mobile apps,
documents, and devices for global companies. MobileIron has been chosen by 7 of
the 10 top global pharmaceutical companies, 4 of the 5 top global automotive
manufacturers, 3 of the top 5 global retailers, and half of the 10 top global law firms.
Customer Perspective
Apps: “MobileIron has been a very strategic
platform for us to support and manage our
mobile devices and apps.”
Life Technologies (Life Sciences)
BYOD: “MobileIron provides exactly the
framework we needed to let our people use
the device of their choice.”
Thames River Capital (Financial Services)
Innovation: “MobileIron is helping us
become a technology innovator.”
Norton Rose (Legal)
Multi-OS: “We needed a truly multi-OS
solution. MobileIron was without doubt the
most comprehensive.”
Colt Car Co. / Mitsubishi (Automotive)
Scale: “[MobileIron] did a great job not only
helping us getting the product scaled, but
also fixing any kind of issues.”
Lexington School District (Education)
Security: “In our sector, the right mobile
security solution is not a nice to have, it’s
mandatory.”
National Health Service (Healthcare)
Support: “In this day and age of bad
customer service, my experience with
MobileIron has been consistently great.”
City of North Vancouver (Government)
User experience: “MobileIron’s strength is
its ease of use for iPad owners.”
KLA-Tencor (Technology)
Note: Some Android wrapping features are targeted
for a future release. Some features may differ
between operating systems.
Gartner, Inc., Magic Quadrant for Mobile Device
Management Software, Phillip Redman, John
Girard, Monica Basso, May 17, 2012. Gartner does
not endorse any vendor, product or service depicted
in its research publications, and does not advise
technology users to select only those vendors with
the highest ratings. Gartner research publications
consist of the opinions of Gartner's research
organization and should not be construed as
statements of fact. Gartner disclaims all warranties,
expressed or implied, with respect to this research,
including any warranties of merchantability or
fitness for a particular purpose.
Info-Tech Research Group, Inc., Vendor
Landscape: Mobile Device Management Suites,
August 2012. Info-Tech Research Group Vendor
Landscape reports recognize outstanding vendors
in the technology marketplace. Assessing vendors
by the strength of their offering and their strategy for
the enterprise, Info-Tech Research Group Vendor
Landscapes pay tribute to the contribution of
exceptional vendors in a particular category.
Š2009-2012 MobileIron. All rights reserved.
MobileIron, MyPhone@Work and Connected Cloud
are registered trademarks of MobileIron. All other
product or company names may be trademarks
and/or registered trademarks of their respective
owners. While every effort is made to ensure the
information given is accurate, MobileIron does not
accept liability for any errors or mistakes which may
arise. Specifications and other information in this
document may be subject to change without notice.

More Related Content

What's hot

Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobilitykhanrock247
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_minMatthew Shin
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...anuragsinghal1981
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesBiBoard.Org
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Mobile application development company
Mobile application development companyMobile application development company
Mobile application development companySankar Annamalai
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 

What's hot (20)

Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devices
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Mobile application development company
Mobile application development companyMobile application development company
Mobile application development company
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 

Similar to Secure Mobile Apps with AppConnect & AppTunnel

State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobileSolutionsDTAG
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Hepto Software Company
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSAP Solution Extensions
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesFuGenx Technologies
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlTech Mahindra
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics BlackBerry
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 

Similar to Secure Mobile Apps with AppConnect & AppTunnel (20)

State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-Administrators
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challenges
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Secure Mobile Apps with AppConnect & AppTunnel

  • 1.   1 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com AppConnect and AppTunnel: Advanced Security for Mobile Apps   The largest companies in the world trust MobileIronÂŽ as their foundation for Mobile IT. Available as a highly-scalable on-premise or cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy. As mobile becomes a primary computing platform for the enterprise, every business function will mobilize core operations through apps. These apps live outside the enterprise perimeter and can run on personally-owned or minimally managed devices. Mobile IT must protect the app data while preserving the user experience. The Connected Container A “container” is set of protected data. This data is separated from all other data on the device and is protected from unauthorized apps or users. In the first generation of enterprise mobility, all business data and associated apps were segregated into monolithic, email-based containers. While this protected business data, it forced users into an experience they did not like. In the new generation of enterprise mobility, user experience is core and requires: • For end user: Security must be invisible. The mobile experience must be integrated. Privacy must be preserved, especially on personally-owned devices. • For Mobile IT: Business data must be protected. Device support must be broad. Helpdesk impact must be minimal. The business must be enabled quickly. The MobileIron connected container architecture meets these requirements and secures the mobile apps lifecycle. It has two components: 1. MobileIron AppConnect: MobileIron AppConnect containerizes apps to protect app data-at-rest without touching personal data. Each app becomes a secure container whose data is encrypted, protected from unauthorized access, and removable. Because each user has multiple business apps, each app container is also connected to other secure app containers. This allows the sharing of policies like app single sign-on and the sharing of data like documents. All app containers are connected to MobileIron for policy management. 2. MobileIron AppTunnel: MobileIron AppTunnel provides secure tunneling and Challenge Prevent data loss as mobile apps become business-critical and widely adopted Solution MobileIron AppConnect MobileIron AppTunnel Benefits • Secure mobile app lifecycle • Protect app data-at-rest without touching personal data • Protect app data-in-motion without VPN • Protect privacy thru data separation • Configure apps silently and update policies dynamically without user action • Support both SDK and wrapping methods for app containerization • Support both iOS and Android • Support both in-house and public apps Recent Recognition Gartner: MobileIron positioned in the Leaders Quadrant of the Magic Quadrant for Mobile Device Management Software (May 2012) Info-Tech: MobileIron listed as a Champion in the Mobile Device Management Suites Vendor Landscape (Aug 2012) IDC: MobileIron named fastest-growing mobile enterprise management vendor in the world (Sept 2012)
  • 2.   2   access control to protect app data-in-motion without requiring VPN. While the MobileIron platform also supports 3rd party VPNs, many customers do not want to open up VPN access to every app on a device. As an alternative, AppTunnel provides granular, app-by-app session security to connect each app container to the corporate network. It builds upon the proven MobileIron Sentry technology, which is installed at thousands of customers and was the industry’s first intelligent gateway for ActiveSync email. AppConnect MobileIron AppConnect creates a secure app container through either an SDK and wrapper for iOS or a wrapper for Android. This container is connected to other secure app containers and to the MobileIron console for ongoing management: • Authentication: Confirm identity through domain username and password or certificates so only approved users can access business apps • Single sign-on: Enforce time-based app-level sign-on across app containers • Authorization: Allow or block app usage or storage based on device posture • Configuration: Silently configure personalized settings such as user name, server name, and custom attributes without requiring user intervention • Encryption: Ensure that all app data stored on the device is encrypted • DLP controls: Set data loss prevention (DLP) policies, e.g., copy/paste, print, and open-in permissions, so sensitive data doesn’t leave the container • Dynamic policy: Update app policies dynamically • Reporting: Provide app usage statistics • Selective wipe: Remotely wipe app data without touching personal data AppTunnel MobileIron AppTunnel provides tunneling and access control to protect app data- inmotion without requiring VPN. AppTunnel provides several layers of security: • Unique connection: Establish for only authorized apps, users, and devices • Certificate-based session authentication: Prevent man-in-the-middle attacks • Access control rules: Block network access if app-side security is compromised About MobileIron MobileIron has been chosen by thousands of organizations that are transforming their businesses through enterprise mobility. Available as an on-premise or a cloud solution, MobileIron was purpose-built to secure and manage mobile apps, documents, and devices for global companies. MobileIron has been chosen by 7 of the 10 top global pharmaceutical companies, 4 of the 5 top global automotive manufacturers, 3 of the top 5 global retailers, and half of the 10 top global law firms. Customer Perspective Apps: “MobileIron has been a very strategic platform for us to support and manage our mobile devices and apps.” Life Technologies (Life Sciences) BYOD: “MobileIron provides exactly the framework we needed to let our people use the device of their choice.” Thames River Capital (Financial Services) Innovation: “MobileIron is helping us become a technology innovator.” Norton Rose (Legal) Multi-OS: “We needed a truly multi-OS solution. MobileIron was without doubt the most comprehensive.” Colt Car Co. / Mitsubishi (Automotive) Scale: “[MobileIron] did a great job not only helping us getting the product scaled, but also fixing any kind of issues.” Lexington School District (Education) Security: “In our sector, the right mobile security solution is not a nice to have, it’s mandatory.” National Health Service (Healthcare) Support: “In this day and age of bad customer service, my experience with MobileIron has been consistently great.” City of North Vancouver (Government) User experience: “MobileIron’s strength is its ease of use for iPad owners.” KLA-Tencor (Technology) Note: Some Android wrapping features are targeted for a future release. Some features may differ between operating systems. Gartner, Inc., Magic Quadrant for Mobile Device Management Software, Phillip Redman, John Girard, Monica Basso, May 17, 2012. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Info-Tech Research Group, Inc., Vendor Landscape: Mobile Device Management Suites, August 2012. Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. Assessing vendors by the strength of their offering and their strategy for the enterprise, Info-Tech Research Group Vendor Landscapes pay tribute to the contribution of exceptional vendors in a particular category. Š2009-2012 MobileIron. All rights reserved. MobileIron, MyPhone@Work and Connected Cloud are registered trademarks of MobileIron. All other product or company names may be trademarks and/or registered trademarks of their respective owners. While every effort is made to ensure the information given is accurate, MobileIron does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice.