Full Course Clf100 r62 Solution Overview
Full Course Clf100 r62 Solution Overview
Full Course Clf100 r62 Solution Overview
1
Solution Solution Overview
Overview
Industry Certifications
Here is a list of the lessons included in this Cloud Fundamentals R63 course.
2
Business data is increasingly accessed on mobile devices and other end points that
are outside of the corporate network. Security for this modern era is different than
traditional enterprise security and has a mobile focus.
To keep up with today’s security needs, enterprises need to consider how they can
best >>>provision end points like mobile phones and laptops, how they can grant
access based on a full set of imperative data, not just a user’s credentials, how they
can protect data at rest and in motion, as well as be able to perform actions that
need to be taken when enforcement is required.
3
A MOBILE-CENTRIC ZERO TRUST APPROACH
Where are you on your journey to zero trust?
MobileIron’s solution to this modern problem meets all four of these challenges.
4
>>>Lastly, once you gain clarity on the signals occurring in your environment it is
essential you take the appropriate action. With the use of MobileIron’s UEM
platform, MobileIron Access and MobileIron Threat Defense you can monitor any
change in signals and trigger adaptive policies to remediate threats, quarantine
devices and maintain compliance.
4
Solution Architecture
Next let’s take a look at the mobile-centric zero trust architecture for the hybrid
enterprise.
5
As an overview, the main components of MobileIron’s layered security model
include:
>>> Our unified endpoint management or UEM system which is for provision and
managing endpoints
>>>Our in-line intelligent gateway Sentry, which is for securing access to on-
premise resources
>>>MobileIron Access which is for cloud security and passwordless access
>>>And MobileIron Threat Defense or MTD which is for threat detection and
remediation
Together, these components help organizations realize the mobile-centric zero
trust framework.
Now let’s take a look at how these components flow within the architecture.
6
MobileIron security architecture for the mobile enterprise
MobileIron implements a layered security approach across the modern mobile centric
platform. A layered security model is about multiple types of security measures, each
protecting against a different vector for attack.
>>>UEM is the foundation and enables the ability to secure, control and provide
policy enforcement for desktop computers, laptops, smartphones and tablets in a
connected, cohesive manner from a single console. With UEM, we provision a trusted
workspace to the endpoint. This workspace includes secure email, apps,
configurations, and connectivity like Wi-Fi and VPN, that your employees require to
be productive. We then separate personal from business data on employee devices
so that business data does not leak into personal apps and personal data is not
inadvertently accessed by IT.
>>>Sentry encrypts data between the data center back end and the device. Sentry
works to protect the back end from threats. It provides identity and access services
to on-prem users including single sign on and seamless authentication.
>>>Using MobileIron Access ensures secure, conditional access control for cloud
services such as Microsoft Office 365, Salesforce, G Suite, Box, and others. We
provide seamless authentication for the end-user, with single sign-on and
passwordless authentication. This makes for a great user experience. We block
7
untrusted endpoints and apps from accessing cloud services so that your corporate
data does not get compromised.
>>>The last MobileIron component in this layer security model includes MobileIron
Threat Defense. Once the back end is protected, you need to protect the network
from external threats on the device side. This is accomplished with MobileIron Threat
Defense. MTD enables you to protect company data by detecting and remediating
known and zero-day threats on the mobile device, whether they are online or not.
Additionally, there is no need for your users to take any action when threats are
detected as actions are automated and invisible to the user so they can continue
being productive.
As a whole these solutions create a modern layered security model for a mobile
centric world.
7
Products
8
MobileIron Unified Endpoint Management
Policy Application
configuration & management & Access control Threat detection
enforcement distribution
For IT, the MobileIron UEM platform provides the fundamental visibility and IT
controls needed to secure, manage, and monitor any corporate or employee-owned
mobile device or desktop that accesses business-critical data. It allows organizations
to secure a vast range of employee devices being used within the organization while
managing the entire lifecycle of the device including:
>>>Policy configuration and enforcement
>>>Enterprise app distribution and management
>>>Access control and multifactor authentication with MobileIron Access
>>>And threat detection and remediation with MobileIron Threat Defense
9
Advanced security for the mobile enterprise
Protecting your mobile and cloud resources from unauthorized or malicious access is
one of the biggest challenges organizations face today — and password-only security
is no longer up to the task. MobileIron Access introduces zero sign-on technology
that evaluates a comprehensive set of attributes before granting access to enterprise
resources, without ever requiring a password.
>>>MobileIron Access can use your secure mobile device as your identity. With your
mobile device as your identity, accessing any business app, device, or resource
requires no more than a glance or the tap of your finger. By making mobile devices
your identity, we create a world free from the constant pains of password recovery
and the threat of data breaches due to easily compromised credentials. This is zero
sign-on!
10
>>>With regards to securing your cloud resources, MobileIron Access provides
standards-based security for the mobile to cloud world so that business information
is only available to verified users on authorized endpoints, apps, and cloud services.
Access helps you make smart access control decisions that go beyond a user’s
identity and includes validating the device, app, service, user location, and network
before granting access.
10
Client Mobile threat detection
and remediation,
on-device
One integrated client
Advanced apps analytics engine
Securing business data in a perimeter-less, zero trust world requires more than
traditional firewall-based protection. Since every endpoint, app, network, and user is
potentially compromised, you have to continually verify the security and compliance
of everything that tries to access your enterprise resources. >>>MobileIron Threat
Defense or MTD supports a mobile-centric, zero trust security. It uses machine-
learning algorithms optimized to run continuously on the device and can detect
threats even when the device is offline.
>>>MTD achieves 100% user adoption with one app making it easy to deploy and
manage because MTD is built into the MobileIron client. Users are not required to
take any action to activate MTD and they cannot remove it. This integrated client
supports local actions and notifications.
>>>MTD has an advanced app analytics engine that helps you gain immediate
and ongoing visibility into malicious threats across all mobile devices, and detailed
analyses of risky apps. This analytics engine helps you identify privacy and security
risks.
11
>>>For the admin, MTD helps them easily manage corporate and employee-owned
devices with the integration of MTD’s cloud-based management console with
MobileIron’s unified endpoint management server.
11
In-line gateway that manages, encrypts, and secures traffic
between the mobile device and back-end enterprise systems
Securing data in motion is essential. MobileIron Sentry, >>>an in-line gateway that
manages, encrypts, and secures traffic between the mobile endpoint and back-end
enterprise systems. Data and traffic between the mobile device and corporate
resources can be configured to flow through Sentry, providing real-time secure
tunneling and access control. Sentry enforces the security policies set by IT, enabling
it to allow or deny access to corporate information and resources in real time.
>>>Sentry Security:
Sentry prevents unauthorized interception and malicious manipulation of data
through its support for certificate-based authentication. Sentry can encrypt email
attachments to protect them from unauthorized apps or cloud services. Sentry
ensures the integrity of mobile app traffic by restricting access to the right corporate
destinations and applications.
>>>Sentry Scalability
Sentry can scale to meet the high-volume performance and redundancy requirements
of global organizations. Organizations can set up multiple Sentry gateways in a
cluster to accommodate standard and peak data volume scenarios.
>>>Sentry User Experience
Sentry supports certificate-based SSO authentication, which can eliminate the need
for users to enter their username and password when accessing email, intranet sites,
and corporate data behind the firewall. Sentry provides on-demand, app-specific
VPN’s, greatly improving user experience by eliminating the need for manually
enabling device-wide VPN’s.
12
End users want to be equipped with the apps they need and want to be able to get
work done wherever they are. Admins want to enable users to have what they need
to succeed. As a result, MobileIron has focused on enhancing the process involved
with configuring and deploying apps with the App Catalog.
>>>The MobileIron App Catalog can also be combined with Apple Volume Purchase
Program to facilitate secure distribution of mobile apps on iOS devices. Further
MobileIron can harness the capabilities found in iOS managed apps and Android
Enterprise. This allows for easy configuration within MobileIron’s UEM platform of
app-level settings and security policies for both of these advanced app security
functions. All of these choices, help IT cultivate the right level of security for their
users and their organization.
13
When you need to secure enterprise data at rest MobileIron’s app containerization
technology is essential. >>>MobileIron AppConnect containerizes apps to protect
app data at rest without touching personal data. Each app becomes a secure
container whose data is encrypted, protected from unauthorized access, and
removable. Each app container is also connected to other secure app containers
through MobileIron UEM, so policies such as app single sign-on can be easily shared
and updated across devices.
>>>MobileIron offers two ways to secure your in house app with AppConnect.
- You can include our SDK in your in-house app when you develop it.
- Or MobileIron can wrap your in-house app.
Both methods put a security ring around your application that allows for the app to
be managed by MobileIron’s UEM platform.
14
Now let’s cover four UEM apps that keep the user productive and secure.
>>>Email+ is a cross-platform, secure PIM application for iOS and Android. Security
controls include government-grade encryption, certificate-based authentication,
S/MIME, application-level encryption, and passcode enforcement.
>>>Docs@Work allows users to access, create, edit, markup, and share content
securely from repositories such as SharePoint, Box, Google Drive, and more. This is
important so users can maximize productivity on the go.
>>>Web@Work enables secure web browsing by protecting both data in motion and
data at rest on the endpoint. Custom bookmarks and secure tunneling ensure that
users have quick and safe access to business information. With Web@Work users
can access internal web resources quickly and easily.
>>>Help@Work is an app that lets IT remotely view and control a user’s screen, with
the user’s permission, to help solve issues in an efficient manner.
15
These secure productivity apps keep the user productive without sacrificing security.
15
Per-app VPN capabilities
Authorize select apps to
seamlessly access resources
behind the corporate firewall
Multi-OS app Seamless user Support all
VPN experience apps
Securely use Split-tunnel Secure, simple
browsers capabilities access
Maintaining user privacy is critical to the success of any mobile enterprise. User
privacy isn’t just limited to personal apps and content on the device; it extends to the
network as well. That means IT must be able to secure traffic from enterprise apps
without capturing personal traffic. Protecting employee privacy requires IT to move
beyond device-wide VPNs to more secure, intelligent, and granular app VPNs.
>>>Tunnel allows organizations to authorize any business app, including in-house and
third-party apps, to access resources on the corporate intranet using a secure
network connection.
- Further, per app VPNs can be established over any network, including public Wi-Fi
networks or cellular networks to ensure business data is always secure.
- Tunnel also leverages MobileIron’s advanced closed-loop compliance engine to
ensure jailbroken and otherwise non-compliant devices are not allowed to access
sensitive business data.
- Finally, Tunnel significantly improves the user experience by establishing on-demand
or always-on app VPN connections without requiring the user to take any additional
steps.
16
Secure the entire PC lifecycle:
IT can apply policies and scripts already in place without requiring a systems image,
domain join, or multiple channels of communication to the device. Further
MobileIron Bridge allows IT to deploy legacy apps and set granular policies to
Windows 10 PCs through MobileIron’s UEM platform.
17
Extensibility
18
MobileIron’s UEM platform is enhanced by having integration points with a vibrant
ecosystem of partners. These integrations include both client and server side
integrations and encompass major functionality like network access control, identity
providers, VPNs, communication apps and a myriad of cloud services.
19
Industry
Certifications
20
In this lesson, the certifications that MobileIron has achieved in order to provide the
industries leading Unified Endpoint Management products are covered.
MobileIron products and services have been validated against the following set of
security standards and certifications. For certain certifications or qualifications,
MobileIron leverages independent third-party evaluators to ensure all security
requirements are met.
>>>As part of our commitment to trust and security, MobileIron has successfully
completed a SOC 2 Type 2 assessment. As part of the SOC 2 assessment, the
operational and security processes of MobileIron Cloud was reviewed by an
independent certified public accounting firm.
21
cryptography and it's utilization. This standard is recognized by many governments
and public sector organizations including the US federal government.
>>>MobileIron became the first company in the world to receive Common Criteria
certification against Version 2.0 of the Mobile Device Management Protection Profile
from the National Information Assurance Partnership. The National Information
Assurance Partnership is the United States’ government initiative, operated by the
National Security Agency, that oversees the national program to evaluate technology
products for conformance to Common Criteria.
>>>CSA STAR is the industry’s most powerful program for security assurance in the
cloud. STAR encompasses key principles of transparency, rigorous auditing, and
harmonization of standards. STAR certification provides multiple benefits, including
indications of best practices and validation of security posture of cloud offerings.
>>>The National Security Agency’s Commercial Solutions for Classified Program has
been established to enable commercial products to be used in layered solutions
protecting classified NSS data. This provides the ability to securely communicate
based on commercial standards in a solution that can be fielded in months, not years.
As you can see MobileIron security certifications are extensive all with the goal of
building a secure UEM offering.
21
22