New tools let IT admins cut the cord to manage mobile users

The new version of MobileIron's management software gives mobility to IT administrators, and segments and segregates admin privileges.

The new release of MobileIron's software for managing mobile devices and data helps IT staff themselves be more mobile and lets management tasks be grouped and segregated to improve privacy and security.

The changes mean that IT staff in charge of mobile deployments no longer are chained to their own desk or laptops: a new app, available on Android or iOS device, now lets administrators access the MobileIron server from anywhere. For large-scale mobile populations, management tasks and responsibilities can be divided up by geography or department, so administrators don't have untrammeled access to all mobile users, apps and data.

The new mobile app for IT is called Insight, downloaded from the iTunes App Store or Google Play. Once installed, an administrator taps it, fills in the login screen and then sees a "dashboard" or a graphical summary of the enterprise's mobile deployment -- the number of active devices, the number out of compliance, roaming devices, or devices by platform or carrier or by ownership (BYOD or corporate-issued devices). In essence, they have access to the main features of the MobileIron management platform as they did from a PC.

Clicking on a pie chart or other item starts to bring up more and more details, letting administrators drill down, filter, and display "all iOS devices that are roaming" for example. A search function aids administrators in troubleshooting problems, identifying them and fixing them.

"In the past, an admin had to do this from browser on a desktop PC," says Ojas Rege, vice president of strategy, MobileIron, Mountain View, Calif. "We have 'bubbled up' the most common tasks and put these in the Insight app, to answer the question 'What's the state of my deployment?'"

The new MobileIron version also creates an IT management hierarchy, which the vendor dubs "Spaces," for mobile deployments. "Endusers want to know that a corporate BYOD policy provides enforceable privacy controls that protect them," says Rege.

As the name suggests, Spaces lets a company segment and segregate administrative privileges, so that administrators are authorized with specific responsibilities, tasks and access to subsets of mobile users. Devices in the U.S. and in Europe would be handled only by specified local MobileIron administrators for example.

Spaces also limits that administrators can see on privately-owned devices used for business -- they have access only to corporate data and apps, not to a user's private email, photos, and the like.

Privileges can also be ranked. For example, an admin may have certain access rights to a device in the "Americas" space, but if that device is also in the "BYOD" space which has a higher rank, then stricter access rules associated with BYOD will take precedence.

Also part of the new release:

+ MobileIron's AppConnect secure container now can work with the APIs in the Samsung's enterprise Android security specification, Knox version 2.0

+ support for Windows Phone 8.1

+ support for the PhoneGap open source mobile app development toolkit

+ MobileIron Sentry, a mobile data gateway, now supports content filtering and inspection data traffic.

The new Insight mobile app is available now, at no charge, for iOS and Android. The other software features will be released over the next few weeks. There is no change in pricing for the MobileIron platform or components.

Earlier this year, MobileIron announced that it was embedding code from Splunk and releasing a MobileIron app for Splunk Enterprise, which is a software platform that monitors, collects and analyzes a wide range of machine data from such entities as enterprise websites, applications, servers, networks, sensors, and mobile devices. It also released for employees an iOS app called Help@Work, which lets users share their iOS screen with corporate helpdesk staff.

Join the CSO newsletter!

Error: Please check your email address.

Tags mobile managementMobileIronGoogleenterprise mobilitysecuritymobile security

More about GoogleInsightMobileIronMountain ViewSamsungSentrySplunk

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John Cox

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place