Bradford Networks (News - Alert) has entered into a strategic partnership agreement with MobileIron in an effort to offer a fully integrated network access control and mobile device management solution.
In a press statement, Tom Murphy, CMO of Bradford Networks, said: "MobileIron's deep expertise and experience with enterprise mobility management make them an integral component to a successful BYOD program. We're excited to expand our roster of leading BYOD ecosystem technology partners with the addition of MobileIron, and to deliver comprehensive security solutions for BYOD."
By combining device-level security with network access security, the integrated solution provides organizations with a foundation for a secure, comprehensive bring-your-own-device strategy.
Image via Shutterstock
Based on user, device, location and time of day, Bradford Networks' Network Access Control solution offers safe, role-based network access. The Advanced Mobile Management solution of MobileIron, meanwhile, creates a virtual perimeter that helps secure mobile delivery of business data and applications. At the same time, it preserves the excellent user experience of employee-owned smartphones and tablets.
The Bradford Networks/MobileIron integration is designed to allow customers to ensure that both devices and users have appropriate network access. Users will also be able to isolate non-compliant devices and provide self-remediation through a web portal, dynamically adjusting a device's access rights based on status inputs from MobileIron.
The integrated solution harnesses Bradford Networks' Network Sentry SmartEdge Platform, an open API designed to help security, mobility management, and wired/wireless vendors easily integrate with Network Sentry and make holistic solutions for secure BYOD initiatives.
"The influx of personal devices on corporate networks can create security risks and management headaches," said Ojas Rege, VP Strategy, MobileIron. "The integration of our MobileIron platform with Bradford Networks' NAC solution gives organizations the critical security they need at both the device and network access levels. The result is a stronger, more secure BYOD environment."
Edited by Blaise McNamee