{"id":113217,"date":"2024-07-25T08:00:00","date_gmt":"2024-07-25T12:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=press-release&p=113217"},"modified":"2024-07-23T17:05:51","modified_gmt":"2024-07-23T21:05:51","slug":"jumpcloud-introduces-mobile-device-trust-to-enhance-employee-productivity-without-compromising-security","status":"publish","type":"press-release","link":"https:\/\/jumpcloud.com\/press\/jumpcloud-introduces-mobile-device-trust-to-enhance-employee-productivity-without-compromising-security","title":{"rendered":"JumpCloud Introduces Mobile Device Trust to Enhance Employee Productivity Without Compromising Security"},"content":{"rendered":"\n

LOUISVILLE, Colo. \u2014 July 25, 2024 \u2014<\/strong> JumpCloud Inc.<\/a> has announced the release of Mobile Device Trust<\/a>. JumpCloud customers can now limit user access to secure corporate-owned devices (COD) and users\u2019 bring your own devices (BYOD). This release optimizes the security posture for the company and productivity for their users. <\/p>\n\n\n\n

\u201cMany of our customers have requested Mobile Device Trust, and we are happy to deliver,\u201d said Khanh Tran, chief product officer, JumpCloud. \u201cOrganizations need security that protects sensitive resources anywhere an employee accesses them. IT admins want flexible device management from the cloud to their corporate-owned devices. And end users want a mobile experience that is easy to use and doesn\u2019t intrude on their work productivity or personal lives. JumpCloud\u2019s Mobile Device Trust meets all these needs. JumpCloud was founded on the promise of providing secure, easy access.\u201d<\/p>\n\n\n\n

Unmanaged mobile devices are among the weakest links in an organization\u2019s security. Mobile Device Trust reinforces mobile security by leveraging JumpCloud GoTM<\/sup><\/a>, a phishing-resistant credential. Users can install the JumpCloud ProtectTM<\/sup> app on Apple MDM and Android EMM-enrolled devices. Then, they can register their devices with JumpCloud Go and establish device trust. This new feature also removes common pain points for the end user by eliminating the need for passwords. This enhances user experience, secures the organization, and does not hinder employee productivity. <\/p>\n\n\n\n


Key features and benefits: <\/strong><\/p>\n\n\n\n