MobileIron on Wednesday launched another set of technologies designed to meld enterprise mobility management with securing corporate data and documents that wind up in personal cloud repositories such as Dropbox and Google Drive to name a few.
In October, MobileIron launched a strategy to secure the personal cloud, which represents a threat to corporate data leakage. MobileIron launched what it called "phase two" of the strategy, which revolves around its Content Security Service (CSS).
CSS secures the document as well as integrates with the MobileIron mobility management suite. MobileIron's technology separates security from storage and puts work documents in a new repository to enforce IT policies. Documents are secured across multiple repositories including personal cloud services via MobileIron's virtual file management system, which was patented in October 2014.
Key features in MobileIron's CSS include:
- The ability to encrypt work documents when they are stored in a personal cloud.
- Data loss prevention controls that allow wiping as well as document expiration dates.
- Employees can share documents secured by CSS with other employees, but only authorized devices and workers can unencrypt them.
- An activity trail.
- Integration with MobileIron's enterprise mobility management (EMM) platform.
The ability to secure documents is pitched as one of the key features of Microsoft's EMM strategy, but MobileIron is including a broader array of documents and focusing on encryption largely invisible to the user.
Ojas Rege, vice president of strategy at MobileIron, said the company's approach was informed by four years of customer questions about securing corporate data as employees used personal storage clouds. Companies have either tried to exclude personal cloud storage services, but that move only meant that no security controls would be deployed as employees just ran around IT, said Rege.
MobileIron is using encryption and policies to enforce its security across storage clouds. The reason is fairly simple---rights management requires the employee to set requirements. "Rights management has led to an inconsistent use of security technology," said Rege.