Improve company productivity with a Business Account.Sign Up

x
?
Solved

Security concerns & risks assessment of Mobile Iron Email+ in Android or iDevices

Posted on 2016-07-28
1
Medium Priority
?
51 Views
Last Modified: 2016-07-29
Anyone can provide risks assessments for the following & the mitigations:

Mobile Iron Email+ residing in Android or iDevices
0
Comment
Question by:sunhux
1 Comment
 
LVL 66

Accepted Solution

by:
btan earned 2000 total points
ID: 41732950
Assess threat based on device and apps exposure impact the information stored, in transit and in use. You will need the vendor to confirm on the applicable capability to reduce the exposure WITH additional apps install though I stated some brief one just for a start...

Threat - Data leakage/breach, Risk - loss of information confidentiality & integrity
>MobileIron Email - Encapsulate Email apps from other personal apps, Segregate Email information from other apps access, Encryption on device and Apps VPN (using AppsTunnel) for end to end protection

Threat - Mass infection, Risk - loss of information confidentiality & integrity & Availability
>MobileIron Email - Leverage on existing device AV or protective s/w for real time malware and compromised device state (e.g. jailbroken/rooted) detection, backend content filtering based on Enterprise email exchange AV scan before sending to device, apps are pushed down from MI trusted AppStore (signed apps)

Threat - Unauthorized Access, Risk - loss of information confidentiality & integrity
 > MobileIron Email - MI agent for MDM and MAM controls for customized email apps "watch over" based on policy usage and enable audit trail for proactive monitoring on any anomalous email usage activities, strict policy include login credentials for multi-user and enforce 2FA (if available)

Threat - Loss of device or device theft, Risk - loss of information confidentiality & availability
> MobileIron Email - MI agent for MDM and MAM controls for remote wipe of apps and device for selective information stored in the device or ext storage. At all times data at rest are encrypted.
1

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

It's not just another paperwork submission. Serious planning and rigour to managing the whole thought processes need to be put in place. The intent is not on drilling into the details, but to share tips in getting the first thing right to kick-start…
When it comes to building mobile apps, it is important to consider a framework that is easy to work upon and provides good benefits. The "Ionic framework" is one of the latest frameworks considered by Ionic App Development Companies when it comes to…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
In this video I will demonstrate how to set up Nine, which I now consider the best alternative email app to Touchdown.

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question