Enterprise Mobility Report 06/2015. Creation date: 1.7.2015. Vlastimil Turzík



Similar documents
Securing Office 365 with MobileIron

AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview

Mobile Security: Threats and Countermeasures

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Adobe Flash Player and Adobe AIR security

Five Steps to Android Readiness

Kaspersky Security for Mobile Administrator's Guide

Symantec Mobile Management Suite

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

2X SecureRemoteDesktop. Version 1.1

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Device Independence - BYOD -

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Mobile First Government

Guideline on Safe BYOD Management

CHOOSING AN MDM PLATFORM

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

How To Protect Your Mobile Device From Attack

SA Series SSL VPN Virtual Appliances

Configuration Guide BES12. Version 12.1

Managing and Securing the Mobile Device Invasion IBM Corporation

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.

The ForeScout Difference

Kaspersky Security 10 for Mobile Implementation Guide

Symantec Mobile Management 7.1

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Choosing an MDM Platform

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Configuration Guide. BES12 Cloud

ForeScout MDM Enterprise

What ios 9 Means for the Enterprise

Configuration Guide BES12. Version 12.2

The Future of Mobile Device Management

Mobile Iron User Guide

Enterprise Mobility as a Service

Feature List for Kaspersky Security for Mobile

Novell Filr. Mobile Client

Optimizing the Mobile Cloud Era Through Agility and Automation

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Embracing Complete BYOD Security with MDM and NAC

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Symantec Mobile Management 7.1

ios Enterprise Deployment Overview

BYPASSING THE ios GATEKEEPER

============================================================= =============================================================

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

A Review of Different Comparative Studies on Mobile Operating System

Kaspersky Security for Mobile

Key Requirements of Enterprise Mobility Management Solutions

Windows Phone 8.1 in the Enterprise

What We Do: Simplify Enterprise Mobility

AirWatch Solution Overview

Mobile Device Management

Security Best Practices for Mobile Devices

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

EndUser Protection. Peter Skondro. Sophos

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Solve BYOD with! Workspace as a Service!

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

MobileConnect. Getting Started Guide

Enterprise mobility trends 2015 and beyond

PrinterOn Mobile Applications for ios and Android

End User Devices Security Guidance: Apple ios 8

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Athena Mobile Device Management from Symantec

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

SAST, DAST and Vulnerability Assessments, = 4

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

Fear and Loathing in BYOD

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Guidance End User Devices Security Guidance: Apple ios 7

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Special Report. Choosing the right mobile device platform for your business

Configuration Guide BES12. Version 12.3

How To Support Bring Your Own Device (Byod)

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

BlackBerry 10.3 Work and Personal Corporate

Mobile Device Strategy

JUNOS PULSE APPCONNECT

Systems Manager Cloud Based Mobile Device Management

Why Digital Certificates Are Essential for Managing Mobile Devices

Transcription:

06/2015 Creation date: 1.7.2015 Author: Vlastimil Turzík

Content Content... 2 Introduction... 4 ios... 4 Vulnerability... 4 ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords... 4 Versions: 8.4... 5 Android... 5 Vulnerability... 5 Samsung vulnerability affects up to 600 million Android devices... 5 CVE-2015-3096... 5 CVE-2015-3098... 6 CVE-2015-3099... 6 CVE-2015-3100... 7 CVE-2015-3101... 7 CVE-2015-3102... 8 CVE-2015-3103... 8 CVE-2015-3104... 8 CVE-2015-3105... 9 CVE-2015-3106... 9 CVE-2015-3107... 10 CVE-2015-3108... 10 Versions... 10 Blackberry... 11 Vulnerability... 11 Versions... 11 Vulnerability... 11 Versions... 11 MobileIron... 12 2

Vulnerability... 12 Interesting Articles... 12 MobileIron and Google to Bring MobileIron AppConnect to Android for Work... 12 Preview of MobileIron for Windows 10 Launches Today... 13 ios 9: Making a Great Enterprise User Experience Even Better... 14 Gartner Positions MobileIron as a Leader and Furthest on Completeness of Vision Axis in 2015 Magic Quadrant for Enterprise Mobility Management Suites... 15 3

Introduction This is the public version of System4u's Enterprise Mobility report. You can find here news about security of ios, Android, Blackberry and Windows Phone operating systems from last week. We cover also EMM solution MobileIron in this report, others EMM solutions will come in the future. Full version of report is issued for our customers and subcsribers. You can find there not only the news about security, but also interesting articles, links from the enterprise mobility world and recommendations to mitigate the vulnerabilities. ios Vulnerability No vulnerabilities in this month. ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords http://www.morningledger.com Security researcher, Jansoucek, recently published the attack code on Github which reportedly exploits vulnerability on Apple s Mail app to steal user information. The attack can be used to steal important details such as the icloud password, the location as well as identity details of the user. He had already notified of this issue to Apple back in January, but the company is yet to fix it with a patch. Even the latest version of ios Mail App v8.3 has this vulnerability. So, he has finally published the attack code with full details on GitHub. According to ARSTechnica, attackers can use the fact that the ios Mail app does not remove HTML codes from incoming messages, which makes it easy for them to collect user information. For example, in a proof of concept attack, the existing HTML codes can be used to download a form which looks a lot like the icloud login prompt from the remote server. This can be then displayed when the user opens up the mail. 4

Since the mail app is known to ask for login details in between, this attack may turn out to be successful. Any user who does not pay close attention to the dialog may end up sending his or her password to the attacker. Versions: 8.4 Android Vulnerability Samsung vulnerability affects up to 600 million Android devices http://searchsecurity.techtarget.com Hundreds of millions of Android mobile devices may be at risk because of a flaw in the default keyboard used by Samsung, and because of the level of access Samsung affords the keyboard software. Mobile security vendor NowSecure found that the version of the SwiftKey keyboard built-in to many popular Samsung Galaxy devices, from the Galaxy S3 to the S6 on multiple carriers, downloads language packs via HTTP and does not use a secure transfer protocol. This leaves devices vulnerable to a man-in-the-middle attack wherein a malicious actor capable of controlling a user's network traffic can intercept a request to download a language pack upgrade or new language pack and deliver back an infected file. CVE-2015-3096 Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass a CVE-2014-5333 protection mechanism via unspecified vectors. 5

CVSS Score 6.8 CVE-2015-3098 Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3099 and CVE-2015-3102. CVSS Score 5.0 CVE-2015-3099 Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3102. CVSS Score 5.0 6

CVE-2015-3100 Stack-based buffer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors. CVSS Score 10.0 CVE-2015-3101 The Flash broker in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, when Internet Explorer is used, allows attackers to perform a transition from Low Integrity to Medium Integrity via unspecified vectors. CVSS Score 4.3 7

CVE-2015-3102 Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3099. CVSS Score 5.0 CVE-2015-3103 Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3106 and CVE-2015-3107. CVSS Score 10.0 CVE-2015-3104 Integer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe 8

AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors. CVSS Score 10.0 CVE-2015-3105 Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. CVSS Score 10.0 CVE-2015-3106 Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3107. CVSS Score 10.0 9

CVE-2015-3107 Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3106. CVSS Score 10.0 CVE-2015-3108 Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors. CVSS Score 5.0 Versions Android 5.1.1 Lollipop Android 4.4.4 KitKat Supported mobiles all supported mobiles 10

Blackberry Vulnerability No vulnerabilities in this month Versions Tmobile Czech Windows Phone 1) OS 7.1.0.2807 BlackBerry Bold 9900, 9810 2) OS 6.0.3159 Blackberry 9800, 9780, 9300 3) OS 7.1.2814 Blackberry 9790 4) OS 7.1.0.2839 Blackberry Curve 9720 5) OS 7.1.0.2814 Blackberry Curve 9320, 9360, 9320 6) OS 5.0.0.1168 Blackberry Curve 8520 7) OS 5.0.0.1748 Blackberry Bold 9000 8) OS 2.1.0.1917 BlackBerry PlayBook 9) OS 10.2.1.3175 Z30, Z10, Q10, Q5, Blackberry Passport, Porsche Design P 9983 Vulnerability No vulnerabilities in this month. Versions Windows Phone 8.1 11

MobileIron Vulnerability No vulnerabilities in this month. Interesting Articles MobileIron and Google to Bring MobileIron AppConnect to Android for Work www.mobileiron.com MOUNTAIN VIEW, Calif. June 10, 2015 MobileIron (NASDAQ: MOBL), the leader in mobile enterprise security, announced that it is working with Google to bring the MobileIron AppConnect framework to the Android for Work platform. Google s release of Android for Work earlier this year delivered a unified way to secure enterprise apps, and to separate work and personal data on Android V5.0 using an EMM platform like MobileIron. On Android V5.0, the combination of MobileIron and Android for Work allowed Android apps to be installed and run in a secure workspace on the device without any modification to those apps. Because the security controls are at the OS-level, they can be applied to any app running on that OS. However, many organizations have devices running prior versions of Android, specifically V4.0 to V4.4. These devices do not have Android for Work security controls at the OS-level, so Google recently released the Android for Work App. This standalone app provides a secure workspace into which other enterprise apps can be installed and therefore protected from unauthorized access. However, this cannot be done without modification to the app itself. MobileIron AppConnect containerizes apps to protect corporate data-at-rest without touching personal data. The result is that each app becomes a secure container whose data is encrypted, protected from unauthorized access, and removable. By extending MobileIron AppConnect to the Android for Work app, developers will be able to deploy any AppConnect-enabled app in the secure workspace of the Android for Work App. Because AppConnect already has an extensive ecosystem of third-party and in-house apps using the framework, this expansion can dramatically increase the number of apps that can be secured through Android for Work on existing Android devices. 12

Google and MobileIron will make Android for Work the security baseline for not only devices running Android V5.0, but also the millions running older versions. said Bob Tinker, CEO, MobileIron. This announcement charts the path to an integrated, consistent app security strategy across Android using MobileIron. Preview of MobileIron for Windows 10 Launches Today www.mobileiron.com SAN FRANCISCO June 10, 2015 During today s keynote with Microsoft at the Mobile First Conference, MobileIron (NASDAQ: MOBL) announced the launch of the Preview of MobileIron for Windows 10. Gartner has published* the following Strategic Planning Assumption: By 2020, smartphone security and management architectures will dominate the endpoint computing environment, while traditional PC image management will decline except on dedicated appliance-style devices. Traditionally, corporations have used group policy objects (GPO) to manage their Windows devices. The model is only effective when all devices are connected to a high-bandwidth network, but it does not work with mobile devices that are only intermittently connected to the corporate network. As a result, enterprise mobility management (EMM) platforms like MobileIron are becoming a leading security and management model because they enable business users to securely access enterprise data from any device, on any network, without compromising data security. Windows 10 is the first modern operating system to unify all form factors and MobileIron will play a central role for security and management, said Bob Tinker, CEO, MobileIron. We are very pleased to be working with Microsoft to launch our MobileIron Preview for Windows 10. MobileIron plans to be the policy engine for the new security and apps model of Windows 10: Data separation and protection: Windows 10 Enterprise Data Protection (EDP) provides personal and corporate data separation and containment to prevent unauthorized access and leakage of corporate data. This gives IT the ability to ensure that corporate data is only accessible by trusted apps and that corporate content cannot leak to unauthorized apps or services (e.g., web sites). An EMM platform can set and enforce EDP policies. 13

Unified application security and management: In Windows 10, programmers can develop universal apps that are written once with a single set of business logic and with a user experience that can run on any Windows 10 device. This gives employees a consistent experience across all Windows 10 devices. Through an EMM platform, IT can create and enforce shared policies that apply across smartphones, tablets, laptops, and PCs. The Windows Store for Business (www.microsoft.com/business) provides a single destination for IT administrators to get the apps they need. An EMM platform can also give IT the controls and configurations to effectively secure and distribute both modern Windows apps and older Win32 apps. ios 9: Making a Great Enterprise User Experience Even Better www.mobileiron.com Apple's annual Worldwide Developer Conference (WWDC) brings together app developers from around the world to learn what new things Apple will be adding to ios and OS X. With the addition of watchos, app developers can now plan and develop their apps with three platforms. The combining of Apple's developer programs into a single developer program underscores Apple's desire to have single place to develop, manage, and distribute apps. By promising "a better experience with every touch," the release of ios 9 is clearly designed to enhance the platform s most commonly used features. For instance, Siri is being bolstered with proactive suggestions, and new ipad multitasking features will help users be even more productive on their devices. With additional upgrades that improve system performance, extend battery life, introduce "thinner" apps and strengthen mobile security, Apple has done an excellent job of refining an already advanced mobile operating system. Here s a sneak preview of some of the new device enrollment, application management, and per-app VPN capabilities that Apple is planning to include with ios 9: Removing the Apple ID requirement: With ios 9, Apple announced that EMM providers can now distribute a Volume Purchase Program (VPP) app to individual devices instead of assigning the app to an Apple ID. Eliminating the Apple ID requirement on every device greatly simplifies fleet- deployments where often there isn t an individual Apple ID assigned to a device. This is also great news for application developers because each device will require a separate app license. 14

Distribute apps without the App Store: For corporate-deployed ios 9 devices, enterprises will have the ability to disable the App Store yet still be able to deploy apps through the App Store. This feature will allow mobile administrators to better maintain a standard deployment blueprint and not worry about end users installing personal apps on corporate devices. Convert unmanaged apps to managed apps: With ios 9, an EMM vendor like Mobileiron can now transition a user-installed app to a corporate-liable app. Prior to ios 9, this process required an end user to manually delete the app and then reinstall the same app via an EMM's enterprise app store. Hold in ios Setup Assistant: For institutions that use Apple's Device Enrollment Program (DEP) to mass configure and deploy ios devices, ios 9 includes a feature that allows an EMM vendor to hold the ios device inside the ios Setup Assistant until all configurations and policies have been deployed. This ensures that the ios device is completely configured and ready for the end user. Trust UI: New for ios 9 is the inclusion of an interface that allows end users to trust the certificate used to digitally sign in-house developed apps. This change allows end users to definitively identify the source of any in-house app prior to installation. EMM vendors will also have the ability to prohibit end users from trusting any external sources while still retaining the ability to distribute their own in-house apps. Per-app VPN changes: Apple announced three changes for per-app VPN. First, UDP traffic will now be supported with the current per-app VPN implementation. This is a big win for apps that require UDP in order to stream audio or video. Second, a per-app VPN connection can be established at layer 3. This is key for managing the actual data traffic that enterprises want their per app VPN connection to traverse. Third, the builtin IPSec clients (IKEv1 and IKEv2) can be used to manage per-app VPN connections. By introducing these and other exciting new features for both the enterprise and end users, Apple is once again taking the mobile user experience and enterprise security to a whole new level. With the release of ios 9, Apple is clearly committed to reinforcing its position as the leading mobile operating system in the enterprise. Gartner Positions MobileIron as a Leader and Furthest on Completeness of Vision Axis in 2015 Magic Quadrant for Enterprise Mobility Management Suites https://www.morningstar.com 15

MobileIron named a Leader for the fifth consecutive year MOUNTAIN VIEW, Calif., June 11, 2015 /PRNewswire/ -- MobileIron (NASDAQ: MOBL), the leader in mobile enterprise security, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the "Magic Quadrant for Enterprise Mobility Management Suites."* This is the fifth consecutive year that MobileIron has been positioned in the Leaders Quadrant and the second consecutive year that MobileIron has been positioned furthest on the Completeness of Vision axis. Download the full report here: https://www.mobileiron.com/en/analyst-report/gartner- 2015-report-magic-quadrant-enterprise-mobility-management-suites "Companies around the world are using mobile technology to transform their businesses and we believe our ongoing recognition as a Leader in the Magic Quadrant is the result of our focus on this new Mobile First world," said Bob Tinker, CEO, MobileIron. "The move to mobile is the most disruptive shift faced by enterprise IT in the last 20 years. Modern end-user computing is moving to the mobile model for security and management and our global customers trust MobileIron to deliver on the vision for mobile computing by delivering innovation and security at scale." MobileIron secures enterprise information wherever it lives, in the app, in the network, and in the cloud. 16