MobileIron Brings VPN-Like Tunnels To Mobile Security - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile
News
11/6/2012
10:46 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

MobileIron Brings VPN-Like Tunnels To Mobile Security

AppConnect and AppTunnel aim to help IT secure business apps while keeping them separate from personal content in a BYOD environment.

MobileIron announced two new additions to its suite of mobile device management (MDM) and mobile application management (MAM) products on Tuesday: AppConnect and AppTunnel.

The offerings reflect the manner in which IT priorities have evolved as the BYOD phenomenon has accelerated and matured. Early MDM trends focused on securing the device itself, but because a single phone or tablet is of relatively little value from an enterprise perspective, the emphasis has shifted to securing the data. This goal can be a delicate balance, however. Because so many workplace devices are owned by employees, IT needs to be wary of the way corporate content is accessed and handled. Then again, because the devices are not owned by the business, IT also needs to be mindful of privacy.

MobileIron's new products attempt to navigate this difficulty by separating business apps from personal content, an approach that bars company information from being moved into an unauthorized app while also giving IT control over the sanctioned ones. Savid Technologies CEO Mike Davis has previously told InformationWeek that such a separation represents the "holy grail" of mobile device security, so if businesses take to MobileIron's approach, the company could have a hit.

[ Carriers hope tracking and blocking missing mobile phones will deter thieves. Smartphone Anti-Theft Database: What's Enterprise Impact? ]

AppConnect turns each app into a secure, encrypted container. This capability is fairly run-of-the-mill, but MobileIron takes the concept a step further by allowing individual containers to communicate with one another. This effectively creates a larger wrapper around the individual containerized apps, allowing data to be shared among them according to permissions defined by an administrator. Functions such as cut-and-paste, for example, can be turned on or off depending on the user's level of access. AppConnect also allows single sign-on, eliminating the need to authenticate identity for each individual app.

MobileIron allows its wrapper to be implemented after an app has been completed or, for more precise control, via an SDK that allows the technology to be applied during the development process. With custom apps on the rise, many developers are likely to appreciate this flexibility.

AppTunnel, meanwhile, links each container to the corporate network through a secure tunnel. This pathway offers VPN-like protection without actually establishing a VPN or otherwise altering network security settings. Combined with AppConnect, AppTunnel is intended to protect sensitive content in all its states, whether in transit between the network and the device, in motion among individual apps or at rest on the smartphone or tablet.

Parity is fairly high among MDM and MAM products, but 451 Research analyst Chris Morales said in an email that the technology driving AppConnect and AppTunnel is fairly unique. He wrote that other competitors offer services that partially overlap with MobileIron's new products but cited none that offer the same full set of capabilities. He said, for example, that Zenprise offers VPN-like app tunnels but countered that, "[It] is not app-centric really. It tunnels the apps only but terminates to their client." He called Mocana the "closest competitor," noting that it includes app wrapping, data controls and app-centric VPN tunnels. "They don't have content management though," he stated.

Morales also offered that a mix of IT controls, separation of personal and business apps and secure tunneling "is the direction I prefer and would like to see the market go." He predicted that this sort of technology will become more ubiquitous.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Slideshows
10 Things Your Artificial Intelligence Initiative Needs to Succeed
Lisa Morgan, Freelance Writer,  4/20/2021
News
Tech Spending Climbs as Digital Business Initiatives Grow
Jessica Davis, Senior Editor, Enterprise Apps,  4/22/2021
Commentary
Optimizing the CIO and CFO Relationship
Mary E. Shacklett, Technology commentator and President of Transworld Data,  4/13/2021
White Papers
Register for InformationWeek Newsletters
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll