07-11-2024 02:13 PM
We are pleased to announce the general availability (GA) of JumpCloud Mobile Device Trust!
JumpCloud Mobile Device Trust prevents unmanaged mobile devices (Android, iOS, iPadOS) from accessing enterprise services through browsers and native applications. It simultaneously enhances organizational mobile security while optimizing the way employees (users) access corporate resources.
This is made possible with JumpCloud Go™, a phishing-resistant credential that creates a more seamless user experience by eliminating reliance on passwords and enabling stronger authentication factors across operating systems.
JumpCloud Mobile Device Trust brings JumpCloud Go™ to mobile devices and enables seamless, secure access to JumpCloud-protected resources on the go. Using the JumpCloud Protect mobile app, users register their device with JumpCloud Go, enabling biometric, passwordless verification when accessing protected resources.
When you create Conditional Access Policies in combination with JumpCloud Go for Mobile, you enforce Device Trust. This protects your company’s resources by ensuring users can access them only on trusted devices. Using a combination of JumpCloud Device Management, JumpCloud Go, JumpCloud Protect, and Conditional Access Policies (CAPs), you can safeguard access to both the JumpCloud User Portal and individual SSO apps.
Mobile devices can be trusted when they are enrolled in JumpCloud Device Management and have the JumpCloud Protect app deployed using Software Management. Users register and secure their identity using JumpCloud Go for Mobile on their device.
Conditional Access Policies:
Device Management Condition: These pre-built conditional access policies ensure that JumpCloud has control over the device and the ability to evaluate and verify that it’s trusted. In addition, IT admins have the ability to enforce password policies and remove corporate data and access in the event of device loss, theft, or employee off-boarding.
Operating System Condition: This policy gives IT admins the ability to limit access to resources based on approved operating systems/platforms.
Enhancement to Disk Encryption Condition: This policy ensures that the device connecting to secured company resources has disk encryption, the required file-based or metadata encryption.
Device Attestation: Attestation helps to protect against the following threats:
A compromised device lying about its properties.
A compromised device providing an outdated attestation.
A compromised device sending a different device’s identifiers.
Private key extraction for use on a rogue device.
Device Trust Readiness Dashboard: Admins can quickly learn the specific policies that are configured in their organization. This dashboard provides visibility into configuration of desktop, iOS, and Android devices to evaluate device trust. It also highlights the Conditional Access Policies that leverage the Device Management conditions.
The Admin Experience
The End User Experience
Learn more about Mobile Device Trust from the following resources:
07-12-2024 01:07 PM
Huge respect and THANK YOU'S from my company, team, and my clients. This is very very very polished and well thought through. Congrats team, keep doing big things!
07-15-2024 10:51 AM
Hey @rjordan - thank you for the kind words!
New to the site? Take a look at these additional resources:
Ready to join us? You can register here.