TechDogs-"JumpCloud Introduces Mobile Device Trust To Enhance Employee Productivity Without Compromising Security"

Software Development

JumpCloud Introduces Mobile Device Trust To Enhance Employee Productivity Without Compromising Security

By GlobeNewswire

GlobeNewswire
Overall Rating

LOUISVILLE, Colo., July 25, 2024 (GLOBE NEWSWIRE) -- JumpCloud Inc. has announced the release of Mobile Device Trust. JumpCloud customers can now limit user access to secure corporate-owned devices (COD) and users’ bring your own devices (BYOD). This release optimizes the security posture for the company and productivity for their users.

“Many of our customers have requested Mobile Device Trust, and we are happy to deliver,” said Khanh Tran, chief product officer, JumpCloud. “Organizations need security that protects sensitive resources anywhere an employee accesses them. IT admins want flexible device management from the cloud to their corporate-owned devices. And end users want a mobile experience that is easy to use and doesn’t intrude on their work productivity or personal lives. JumpCloud’s Mobile Device Trust meets all these needs. JumpCloud was founded on the promise of providing secure, easy access.”

Unmanaged mobile devices are among the weakest links in an organization’s security. Mobile Device Trust reinforces mobile security by leveraging JumpCloud Go™, a phishing-resistant credential. Users can install the JumpCloud Protect app on Apple MDM and Android EMM-enrolled devices. Then, they can register their devices with JumpCloud Go and establish device trust. This new feature also removes common pain points for the end user by eliminating the need for passwords. This enhances user experience, secures the organization, and does not hinder employee productivity.

Key features and benefits:

  • Device management conditions. These pre-built policies ensure that JumpCloud has control over a device and verifies that it is trusted. IT admins can enforce password policies. They can also remove corporate data or access if the device is lost, stolen, or when an employee leaves or changes roles.
     
  • Operating system conditions. This policy lets IT admins limit access to resources based on approved operating systems.
     
  • Enhancement to disk encryption conditions. This ensures that the device has the required disk encryption, file-based or metadata.
     
  • Device attestation. Attestation helps protect against the following threats:
     
    • A compromised device that lies about its properties.
    • A compromised device that provides an outdated attestation.
    • A compromised device that sends a different device’s identifiers.
    • Private key extraction for use on a rogue device.
       
  • Device trust readiness dashboard. This dashboard provides visibility into the setup of desktop, iOS, and Android devices to evaluate device trust. Admins can immediately learn the specific policies configured in their organization. It also highlights the Conditional Access policies that leverage the device management conditions.

Mobile Device Trust is now available for all Platform Prime customers. Organizations interested in managing their mobile (Android and iOS/iPadOS) devices from one console can sign up for a free demo today.

About JumpCloud
JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. JumpCloud is IT Simplified.

Learn more: https://www.jumpcloud.com/
Follow us: Blog | Community | X (formerly Twitter) | LinkedIn | YouTube | Resources

Click here to get started with JumpCloud

CONTACT: Contact
for JumpCloud
Josie Judy
press@jumpcloud.com

First published on Fri, Jul 26, 2024

Liked what you read? That’s only the tip of the tech iceberg!

Explore our vast collection of tech articles including introductory guides, product reviews, trends and more, stay up to date with the latest news, relish thought-provoking interviews and the hottest AI blogs, and tickle your funny bone with hilarious tech memes!

Plus, get access to branded insights from industry-leading global brands through informative white papers, engaging case studies, in-depth reports, enlightening videos and exciting events and webinars.

Dive into TechDogs' treasure trove today and Know Your World of technology like never before!

Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs' members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs' Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. While we aim to provide valuable and helpful information, some content on TechDogs' site may not have been thoroughly reviewed for every detail or aspect. We encourage users to verify any information independently where necessary.

Join The Discussion

- Promoted By TechDogs -

IDC MarketScape: Worldwide Modern Endpoint Security for Midsize Businesses 2024 Vendor Assessment

Join Our Newsletter

Get weekly news, engaging articles, and career tips-all free!

By subscribing to our newsletter, you're cool with our terms and conditions and agree to our Privacy Policy.

  • Dark
  • Light