SailPoint, Identity Team For Mobile Device Security Efforts

MDM integration allows organizations to extend IAM policies and controls to personal mobile devices

October 24, 2013

3 Min Read

PRESS RELEASE

AUSTIN, October 23, 2013 – Usage of mobile devices in the workplace is expanding security and compliance risk as today's workers increasingly perform more of their jobs using devices of their choice. To help organizations better address these bring-your-own-device (BYOD) challenges, SailPoint today announced the integration of its award-winning identity and access management (IAM) solution, IdentityIQ&trade, with mobile device management (MDM) solutions from the industry's top providers, including AirWatch Enterprise Mobile Management, Good Secure Mobility Solution and MobileIron Advanced Mobile Management. The integration will enable companies to gain end-to-end visibility and control of user access across mobile, cloud, and on-premises resources, while realizing significant operational efficiencies in how they govern, enforce policy, and grant, change and remove mobile access.

"There are real benefits to enabling a mobile workforce, but employees can do a lot of damage from mobile devices – whether intentionally or not – if their access privileges to enterprise IT resources are not managed correctly," said Kevin Cunningham, president and founder of SailPoint. "In order to address the security risks of BYOD, organizations must focus on controlling user access to sensitive applications, regardless of where or how those applications are accessed. By integrating MDM with IAM, organizations can now centrally manage user access privileges across datacenter, cloud and mobile applications, ensuring all access conforms to security and compliance policies."

The integration between SailPoint IdentityIQ and leading MDM solutions enables enterprises to seamlessly manage mobile devices in the context of enterprise identity and access processes and controls. MDM solutions enable the remote management of mobile devices, performing tasks such encrypting data on devices, controlling application downloads, ensuring devices are free of malware, and selectively wiping content on devices when needed. By linking MDM capabilities with corporate IAM policies and processes for authentication, user onboarding and offboarding, policy enforcement and compliance and audit reporting, the integrated solution gives security teams the centralized visibility and control they need to better protect corporate assets – no matter where or how the access occurs.

SailPoint's integration with leading MDM solutions allows organizations to extend IAM policies and controls to personal mobile devices, ensuring they are managed according to corporate and regulatory standards. The combined solution enables proactive governance and automates user account provisioning activities by:

•Allowing managers to review workers' mobile applications and access rights as part of regular access certifications;

•Automating detection and remediation of policy violations on mobile devices;

•Automating granting user access to mobile applications based on new employee onboarding policy and workflow;

•Automatically revoking access privileges and wiping corporate applications from mobile devices upon employee termination; and

•Installing and configuring the SailPoint Mobile Application on individual devices to enable single sign-on for native mobile applications.

About SailPoint

As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of the world's largest organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company's innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service). For more information about SailPoint, please visit www.sailpoint.com.

Read more about:

2013
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights