MobileIron (NASDAQ:MOBL), the company that introduced the industry’s first mobile-centric, zero trust platform for the enterprise, today announced that it has been ranked as a Leader in The Forrester Wave™: Unified Endpoint Management, Q4 2019 report.
The report evaluated 13 select vendors based on a comprehensive set of 23 evaluation criteria in the categories of current offering, strategy and market presence. MobileIron earned the highest possible scores in the partner ecosystem and product support and services criteria.
“MobileIron’s vision is to make the mobile device the center of enterprise security, and the company’s portfolio of products, which includes Unified Endpoint Management, MobileIron Access, and MobileIron Threat Defense, positions it well to do so,” wrote Andrew Hewitt, analyst serving infrastructure and operations professionals at Forrester, in the report.
The report also identified new MobileIron capabilities such as Zero Sign-On (ZSO), which enables access to enterprise resources without a password, and AppStation, a MAM-only solution with integrated threat defense, that will enable MobileIron to expand its addressable market to contractors, seasonal workers, and frontline workers.
“We believe being named a Leader in Unified Endpoint Management from Forrester Research is a testament to our platform’s ability to deliver a highly secure and user-friendly experience,” said Brian Foster, SVP of Product Management, MobileIron. “We are solving one of the biggest security risks and driving greater efficiency by eliminating passwords and making the mobile device your digital ID and secure access to the enterprise. Our mobile-centric zero trust approach addresses the security challenges posed by the perimeter-less modern enterprise while also allowing the agility and anytime access that employees require.”
“As the importance of employee experience (EX) grows, providing a flexible workspace experience across a variety of devices, apps, and locations becomes paramount. Vendors that can provide advanced modern management, identity, and threat capabilities across traditional and mobile endpoints position themselves to successfully deliver secure, user-friendly UEM experiences to their customers,” wrote Hewitt in the report.
By being easy to implement and imperceptible to the end user, MobileIron’s mobile-centric zero trust approach bridges the gap between high security and low friction, which is essential to success. MobileIron’s unified endpoint management (UEM) platform provides complete control over business data as it flows across devices, apps, networks and cloud services, without sacrificing productivity. Organizations can build upon MobileIron’s UEM platform with ZSO user and device authentication, multi-factor authentication (MFA), and mobile threat defense (MTD) technologies.
MobileIron is redefining enterprise security with the industry’s first mobile-centric, zero trust platform built on the foundation of unified endpoint management (UEM) to secure access and protect data across the perimeter-less enterprise. Zero trust assumes that bad actors are already in the network and secure access is determined by a “never trust, always verify” approach. MobileIron goes beyond identity management and gateway approaches by utilizing a more comprehensive set of attributes before granting access. A mobile-centric, zero trust approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to a device or user.
The MobileIron security platform is built on the foundation of award-winning and industry-leading unified endpoint management (UEM) capabilities with additional zero trust-enabling technologies, including zero sign-on (ZSO), multi-factor authentication (MFA), and mobile threat defense (MTD). Over 19,000 customers, including the world’s largest financial institutions, intelligence agencies and other highly regulated companies, have chosen MobileIron to enable a seamless and secure user experience by ensuring only authorized users, devices, apps, and services can access business resources.