February 17, 2016 By John Harrington Jr. 2 min read

The rise of bring-your-own-device (BYOD) policies and the adoption of Apple iOS and Google Android devices in the enterprise have continued to please forward-thinking, productivity-first organizations. When employees are given the keys to work on their own terms and from their own devices, they will deliver better business results.

Clearly, the battle for total enterprise mobility adoption has been won. Loaded with productivity apps, enterprise applications and corporate email, smartphones and tablets are the gold standard for out-of-pocket productivity.

Still, workers face hurdles in gaining the same type of mobile enterprise app access and connectivity on the go as they’re accustomed to receiving within their cubicles. Far too many organizations have struggled to identify a safe and reliable way to provide this access, and thus, they are reluctant to open the gates.

Lowering the Data Center Drawbridge

By way of their established technology alliance, IBM MaaS360 and F5 BIG-IP Access Policy Manager have integrated their enterprise mobility management (EMM) and access policy management (APM) technologies to provide IT with the tools and capabilities needed to grant their mobile enterprise user base with secure, on-the-go access to behind-the-firewall resources.

The combined solution assesses a mobile user’s device posture information to determine whether the smartphone or tablet should be allowed to receive secure access to enterprise resources. Access is granted based on mobile device management (MDM) enrollment status, compliance with corporate-mandated policies and proper authentication.

Organizations seeking a quick and seamless mechanism for granting full Secure Sockets Layer virtual private network (SSL VPN) access to corporate resources such as Exchange ActiveSync, Office 365, SharePoint and Active Directory need look no further. For ease of use, this integrated solution allows users the ability to access resources on demand, with access prompts configured and delivered directly from the EMM console.

Users can also establish VPN connections on a per-app basis via any of their MaaS360 managed apps. Avoiding the inconvenient need to re-enter credentials, the Kerberos network authentication protocol offers users single-sign on (SSO) capabilities, as well.

To learn more about the newly announced integration, the informational webinar, titled Empower Mobile Users With Secure Corporate Access Using APM and EMM, provides an excellent starting point. The official solution brief dives into a more thorough breakdown of the integration, and in-depth insights of the deployment use cases are also available via F5.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today