MobileIron Confidential MobileIron IoT Strategy Stratos Komotoglou Senior Manager, Marketing March 2017
MobileIron Confidential
MobileIron IoT Strategy
Stratos Komotoglou
Senior Manager, Marketing
March 2017
MobileIron Confidential MobileIron Confidential
What does MobileIron Do
Ensures
employees get
the best tools
to do their jobs
Provides
access to
corporate data
– anytime,
anywhere
Ensures data
is secure and
compliant
wherever it
lives
MobileIron Confidential MobileIron Confidential
Evolution of the customer
MobileIron Confidential | 4 Note: Some features will vary by device and deployment model
Policy and Identity
EMM solution
Apps@Work
Enterprise app store
Docs@Work
Secure content
Web@Work
Secure browsing
Help@Work
Troubleshooting
Tunnel
Per app VPN
Email+
Secure email
AppConnect
Ecosystem
Enablement Enforcement
Conditional Access Integration
Cloud Security
MobileIron Confidential | 5
Patent
portfolio
45 modern EMM
patents granted
Data and app
security
Analytics
Mobile activity intelligence
Virtual instance architecture for mobile device management systems
Adapting a mobile application to a partitioned environment
Adaptive encryption optimization
Auto-insertion of information classification
Distributed management with embedded agents in enterprise apps
Location and time based mobile app policies
Management of certificates for mobile devices
Management of mobile applications (enterprise app store)
Messaging gateway
Mobile posture-based policy, remediation and access control
Multi-user use of single-user apps
Partitioned application environment
Preventing content data leak on mobile devices
Remote verification for configuration updates
Rule based mobile device management delegation
Secure access to mobile applications
Secure controlled access to authentication servers
Secure copy and paste of mobile app data
Secure identification string
Secure mobile app connection bus
Secure virtual file management system
Self-removal of enterprise app data
Selective management of mobile device data (BYOD privacy)
User interface for secure virtual document management system
US8340633,US9042862,US9544752
US8060074,US8396465,US8626147,US8811970
US9430641
US9306913
US8813242
US9043460
US9426120
US8494485,US9300476
US8359016,US8731529,US8862105,US9374654
US8918529,US9544288
US8869307
US9445271
US9348678,US9465677
US9349018
US8898748,US9203698,US9559907
US9271142
US9210157,US9210170
US9548982
US9235717
US9386009
US9059974,US9537835
US8863297,US8863298,US8863299,US9213858,US9465953
US8949201,US9235584
US8695058
US9122887
Architecture
MobileIron Confidential MobileIron Confidential
Chosen by the most security conscious organizations in the world
Government Financial Healthcare
MobileIron Confidential MobileIron Confidential
3 steps to a successful IoT project
Define a
business goal
Ask the right
questions
Experiment
with pilots &
expand
MobileIron Confidential MobileIron Confidential
Architecture for mobile security
Policy
engine
Network
gateway
Edge client
MobileIron Confidential MobileIron Confidential
Architecture for IoT security
Network
gateway
Policy
engine
Edge client
MobileIron Confidential MobileIron Confidential
IoT: the right fit for MobileIron
Policy
engine
Customer requirements
match our architecture
Target customers match
our installed base
Routes to market
Network
gateway
Edge client
MobileIron Confidential MobileIron Confidential
Policy and Identity
Intelligent Edge IoT platform architecture
Cloud Security
EdgeAgent and EdgeConnect • Client and AppConnect extension
• Linux and other RTOSes
• App updating and hardening controls
• Sensor configuration
• Connectivity and secure routing
• Secure bus over local mesh
Next-gen policy engine Hydra API (Q1-Q3)
o IoT scale
o MQTT-based
o Data-level subscription
o Policy integration
• API-based registration
o Non-standard OS
• Data-driven automation
Spigot framework (Phase II) • For direct connection from sensor
IoT
gateway
Sensors
IoT application services
(cloud)
IoT application services
(on-premises)
• Private cloud (Azure, AWS)
• Cert-based security
• Identity awareness
• Intrusion detection
• Anomaly detection (machine learning)
• Multi-tenant public cloud
Sentry and Access
Devices Gateways Automation Big data Ingestion Action
End-to-end chain of trust
Enablement Enforcement
Conditional Access Integration
MobileIron Confidential