MobileIron Core - Fund - MobileIron System Overview Flashcards
(22 cards)
From a high level, how do clients connect to Corporate Network?
Mobile Devices -> MobileIron -> Corporate Network, Cloud Resources
What is the first layer of the MobileIron System?
Security Policy Engine, defines who, what, when and what credentials are able to to access the system.
When is the Security policy set up?
Before device intiation.
What is the second layer of the MobileIron System?
Device Configuration layer
What does the device configuration layer control?
Wifi setup, profile configuration, setup context, specific restrictions and certifications.
What is the third layer of the MobileIron System?
Secure Emails.
What does the Secure Emails layer do?
Works with native email clients, containerised emails for additional security. However, the device needs to be secured properly first.
What is the fourth layer of the MobileIron System?
Secure Applications
What does the Secure Applications layer do?
Secures the Enterprise App Store, User authentication single sign on, Data leakage protection, policy based application control, appconnect partner ecosystem and containerised applications.
What is the fifth layer of the MobileIron System?
Secure Content
What is the Secure Content layer responsible for doing?
Securing the sharepoints, cloud repositories and improve the workflow.
What is the sixth layer of the MobileIron System?
Enforcement layer.
What does the Enforcement layer do?
Enforces policies when they are set in real time, independant of the platform it is running on.
What is the seventh layer of the MobileIron System?
Conditional Access layer.
What does the Conditional Access layer depend on?
Device Posture, Security and Compliance Policies.
What is the eighth layer of the MobileIron System?
Advanced Security.
What two features are there in the Advanced Security layer?
Military Grade security layer and FIPS and SOC 2 type 2 compliant.
Does MobileIron use local or 3rd party CA’s?
Trick question, it uses both and integrates the both of them.
What are the two things that are used for identity?
Single sign on and derived credentials.
Per-App VPN use a ______. And the ______ can either be ____ or ______.
Tunnel, Tunnel, Split and Forced.
How does each app have its own VPN without more certifications on it?
It derives credentials from ther certifications.
What is in a typical deployment phase?
In order:
Require Device Passcodes, Control Access to Exchange (Mail), Blacklist Applications, Reccomend or require applications, build and deliver in-house applications, securely distribute and manage content and allow applications to synchronise with backend services.