<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/farhan-saifudin/rss" /><link>https://www.ivanti.com/blog/authors/farhan-saifudin</link><item><guid isPermaLink="false">75e30b1e-7956-4311-ae29-a5ea2a2f0539</guid><link>https://www.ivanti.com/blog/android-16-ios-26-stigs-mobile-threat-defense</link><atom:author><atom:name>Farhan Saifudin</atom:name><atom:uri>https://www.ivanti.com/blog/authors/farhan-saifudin</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Secure the Mobile Edge: Android 16 &amp; iOS 26 STIGs Require MTD</title><description>&lt;p&gt;Whether it’s Warfighters deployed in the field or remote analysts supporting missions across the globe, mobile devices make these operations possible. But, these endpoints (and your data) need serious protection.&lt;/p&gt;

&lt;p&gt;That’s where the Defense Information Systems Agency’s Security Technical Implementation Guides (STIG) come in, setting the baseline for hardened endpoint and application security.&lt;/p&gt;

&lt;p&gt;DISA has released new Android 16 and iOS 26 STIGs, and with each major operating system release, these STIGs are updated to ensure mobile security keeps pace with modern threats and capabilities. One of the most significant requirement changes this cycle is that all managed mobile devices must have a &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;mobile threat defense (MTD) solution&lt;/a&gt; deployed to remain compliant.&lt;/p&gt;

&lt;p&gt;In this post I’ll&amp;nbsp;walk you through the importance of STIGs,&amp;nbsp;why MTD is critical to safeguarding sensitive data and how an MTD solution simplifies compliance across the mobile edge.&lt;/p&gt;

&lt;h2&gt;STIGs: The gold standard for device security&lt;/h2&gt;

&lt;p&gt;Think of STIGs as detailed guidelines that tell you exactly how to configure and lock down technology, software, hardware or entire systems to meet Department of War (DoW) security standards.&lt;/p&gt;

&lt;p&gt;STIGs ultimately help organizations protect Controlled User Information (CUI) and higher levels of data. Each STIG contains specific requirements (or “controls”) that make up the security baseline.&lt;/p&gt;

&lt;p&gt;They (and associated security requirements guides) are linked to security controls defined by &lt;a href="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final" rel="noopener" target="_blank"&gt;National Institute of Standards and Technology (NIST) Special Publication 800-53&lt;/a&gt;, breaking them down into actionable, measurable items.&lt;/p&gt;

&lt;p&gt;For example, a mobile device STIG might stipulate that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Device passcodes must be complex, with at least X characters.&lt;/li&gt;
	&lt;li&gt;The device must encrypt all data.&lt;/li&gt;
	&lt;li&gt;USB debugging must be disabled.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;A mobile threat defense app must be installed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;U.S. military and government agencies rely on STIGs to harden systems that support mission-critical operations. While they’re mandatory for DoW&amp;nbsp;and federal agencies, many defense contractors, healthcare and finance organizations adopt STIGs because they represent proven security best practices.&lt;/p&gt;

&lt;p&gt;STIGs provide a baseline to help these organizations maintain compliance with a variety of requirements and policy mandates, such as Cybersecurity Maturity Model Certification (CMMC), NIST, CIS, HIPAA, etc.&lt;/p&gt;

&lt;h2&gt;Your new mandate: iOS 26 &amp;amp; Android 16 STIGs now require MTD&lt;/h2&gt;

&lt;p&gt;On the Apple side, the iOS 26/iPadOS 26 STIG added an explicit requirement: to remain compliant, an MTD app must be installed and managed on all DoW&amp;nbsp;iPhones and iPads.&lt;/p&gt;

&lt;p&gt;The latest Android 16 STIGs (i.e., Google Android 16 STIG and Samsung Android 16 STIG) introduce a clear mandate as well: a mobile threat defense (MTD) application must be deployed on every managed device. Failure to do so is flagged as a finding during compliance review.&lt;/p&gt;

&lt;p&gt;These controls underscore a pivotal shift: Mobile endpoint risk management is no longer just about configuration and lockdown settings. It now includes actively enforcing real-time mobile threat defense to prevent device, network, application and phishing attack vectors on modern devices.&lt;/p&gt;

&lt;p&gt;Here's the exact language on MTD from the Android 16 STIG:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"In the mobile device management (MDM) console, verify an MTD app is listed as a managed app being deployed to site-managed devices. If an MTD app is not installed on the device, this is a finding."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Translation: No MTD means you're out of compliance. It's that simple. However, deploying an MTD solution and ensuring it’s actively protecting against mobile threat vectors is more complex.&lt;/p&gt;

&lt;h2&gt;Integrating an MDM/MTD approach&lt;/h2&gt;

&lt;p&gt;Having worked with countless federal and enterprise organizations, I’ve seen firsthand what truly works in the field. Installing and managing an MTD agent is not enough to ensure active protection on mobile endpoints.&lt;/p&gt;

&lt;p&gt;Standalone MTD agents often require manual activation after installation and application programming interface (API) integrations with MDM solutions to take action.&amp;nbsp;The most effective approach requires &lt;a href="https://www.ivanti.com/blog/combining-mdm-and-mtd-for-strategic-security"&gt;tight integration between your MTD and MDM platforms&lt;/a&gt;, and an integrated MDM/MTD agent to ensure seamless activation and protection from mobile threats.&lt;/p&gt;

&lt;p&gt;A unified single-agent architecture enables continuous mobile threat protection while automatically enforcing MDM compliance controls, eliminating the complexity and gaps that come with managing separate solutions.&lt;/p&gt;

&lt;p&gt;That's where&amp;nbsp;Ivanti Neurons for Mobile Threat Defense comes into play. With Ivanti Neurons for Mobile Threat Defense integrated in both the SaaS-based Ivanti Neurons for MDM and on-prem-based Ivanti Endpoint Manager for Mobile (EPMM), you get a single-agent architecture that's seamless to users but gives administrators complete control and security visibility.&lt;/p&gt;

&lt;p&gt;This is what it looks like in practice:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Automatic and scalable STIG baseline enforcement for Android and iOS.&lt;/li&gt;
	&lt;li&gt;Users experience a seamless workflow with no additional apps or agents to manage.&lt;/li&gt;
	&lt;li&gt;Risk visibility and policy management live in one unified console.&lt;/li&gt;
	&lt;li&gt;On-device threat protection works even in disconnected, deployed scenarios to protect against device, network, application and phishing attacks.&lt;/li&gt;
	&lt;li&gt;An integrated MDM that manages any modern operating system including iOS, Android, Windows, macOS or ChromeOS.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;MDM &amp;amp; MTD for holistic mobile security&lt;/h2&gt;

&lt;p&gt;Deploying an MTD app is no longer optional. With the Android 16 and iOS 26 STIG both calling for MTD on managed devices via explicit controls, you can’t rely solely on MDM configuration baselines. You need active MTD that gives you holistic security.&lt;/p&gt;

&lt;p&gt;With mobile threat vectors like operating system vulnerabilities, malicious mobile apps, phishing via SMS/MMS and network man-in-the-middle attacks, rising rapidly, you need protection that lives on the device itself — not just in the cloud.&lt;/p&gt;

&lt;p&gt;Compliance, mission assurance and mobile edge security are top priorities for every modern organization. &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; delivers on all three. Providing STIG-aligned protection across Android and iOS devices, integrating seamlessly into your broader device management platform and defending against device, network, application and phishing attacks to keep your organization resilient and compliant.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/lp/security/demos/ivanti-mobile-threat-defense"&gt;Schedule a demo&lt;/a&gt; today to see how Ivanti Mobile Threat Defense can keep your agency’s data safe and your mobile fleet audit-ready. For full STIG references and downloads, consult the &lt;a href="https://www.cyber.mil/stigs/downloads/" rel="noopener" target="_blank"&gt;Defense Information System Agency’s (DISA) STIG library&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 03 Dec 2025 20:06:11 Z</pubDate></item><item><guid isPermaLink="false">b1855665-2822-4233-af33-48e9f89f2199</guid><link>https://www.ivanti.com/blog/ivanti-derived-credentials-a-zero-sign-on-solution-for-smart-card-enabled-organizations</link><atom:author><atom:name>Bill Harrod</atom:name><atom:uri>https://www.ivanti.com/blog/authors/bill-harrod</atom:uri></atom:author><atom:author><atom:name>Farhan Saifudin</atom:name><atom:uri>https://www.ivanti.com/blog/authors/farhan-saifudin</atom:uri></atom:author><category>Security</category><title>Ivanti Derived Credentials: A Zero Sign-On Solution for Smart Card-Enabled Organizations</title><description>&lt;h2&gt;What is a smart card?&lt;/h2&gt;

&lt;p&gt;Government agencies and some regulated industries have adopted standards (such as &lt;a href="https://csrc.nist.gov/news/2014/approved-sp-800-157,-guidelines-for-derived-piv-c" target="_blank" rel="noopener"&gt;NIST SP 800-157&lt;/a&gt;) for issuing smart cards, based on the user’s validated and confirmed identity. The smart cards have digital certificates such as an authentication certification, a signing certificate, and an encryption private key (certificate).&amp;nbsp; Often the smart cards also act as human recognizable identity validation cards and contain the user’s picture (for a guard to validate at a door or gate). The cards also may have a proximity chip for entrance to a facility, and they may contain biometrics as well.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The smart cards are then used for access to secure buildings and to log in to traditional enterprise workstations like laptops, desktops, and enterprise web services. Typically, an employee inserts their smart card into a reader on a workstation and enters a pin to access the authentication certificate, allowing the user to log in to the device or enterprise applications including cloud-based and web applications. This authentication method replaces usernames and passwords and provides two-factor authentication. That’s because the smart card is a physical entity that the user has, and the pin is something only they know – so neither the card nor the pin are sufficient, individually. These rules are described in the FIPS 201-2 definition of multifactor authentication and NIST SP 800-63-3.&lt;/p&gt;

&lt;h2&gt;What is a derived credential?&lt;/h2&gt;

&lt;p&gt;The difficulty of requiring smart cards for two-factor authentication is that as workers move from traditional workstations to more modern and mobile devices, smartcard readers are not practical. Therefore, a process is defined to securely create and provision digital certificates on mobile devices directly, based on the smart card. These certificates are derived from the initially assigned certificates and therefore are referred to as derived certificates or credentials. Derived credentials allow organizations that are using smart cards for authentication to easily extend this technology to mobile devices, providing strong, passwordless authentication to the most sensitive of resources. The end user securely authenticates to a portal using their physical smart card on an enterprise workstation. Then, using the information on the smart card, a mobile-friendly soft token is created and stored in a secure enclave on the mobile device as a digital certificate. The derived digital certificate is tied to a certificate on the smart card for revocation and validity. These certificates can be used for secure authentication to enterprise and web applications and resources, to sign emails and documents, and to encrypt messages on mobile devices.&lt;/p&gt;

&lt;h2&gt;What kinds of smart cards are out there?&lt;/h2&gt;

&lt;p&gt;U.S. civilian government agencies have standardized on smart cards called Personal Identity Verification (PIV) (based on a Homeland Security Presidential Directive HSPD-12), while the U.S. Military and Defense agencies have standardized on the Common Access Card (CAC). These smart cards and underlying technologies differ slightly, but both can be used for derived credentials.&lt;/p&gt;

&lt;p&gt;&lt;img alt="credentials id card" src="https://static.ivanti.com/sites/marketing/media/images/blog/derived-credentials-card.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Ivanti’s solution&lt;/h2&gt;

&lt;p&gt;The Ivanti team recognized the challenge our customers faced when complying with smart card and derived credential regulations in a mobile environment and have a solution to make the deployment of derived credentials easy. Working with trusted certificate and smartcard solutions like Entrust, DISA Purebred, Xtec and Intercede, we leverage derived credentials to enable organizations to extend their existing security investments in smart cards to their mobile infrastructure.&lt;/p&gt;

&lt;p&gt;The Ivanti PIV-D manager solution integrates with Public Key Infrastructure (PKI) systems to seamlessly deploy derived credentials and manage the lifecycle of the credentials in any mobile enterprise or government organization. Ivanti PIV-D Manager stores the derived credentials securely in our encrypted Ivanti AppConnect framework, which is FIPS 140-2 enabled. The credentials can then be seamlessly shared with other secure AppConnect apps such as Email+, Docs@Work, Web@Work and native mobile OS apps for secure single sign-on, and S/MIME use on iOS and Android devices.&lt;/p&gt;

&lt;p&gt;Prior to its acquisition by Ivanti, MobileIron assisted government agencies such as the Federal Emergency Management Agency (FEMA) and the DoD’s Defense Information Systems Agency (DISA) to deploy derived credentials seamlessly. These agencies now have tens of thousands of devices leveraging derived credentials, enabling their end users to access enterprise resources securely from mobile devices using their device.&lt;/p&gt;

&lt;h2&gt;The next level: Zero Sign-On&lt;/h2&gt;

&lt;p&gt;While derived credentials provide a strong authentication mechanism backed by PKI, Zero Sign-On enables derived credentials in conjunction with a comprehensive set of attributes, to be validated before granting access to enterprise resources. Ivanti’s approach to end-to-end, zero trust security significantly reduces risk by giving organizations complete control over enterprise data as it flows across devices, apps, networks and cloud services. This is essential as the world adjusts to a permanent shift to the Everywhere Workplace.&lt;/p&gt;

&lt;p&gt;If you want to learn more about Ivanti’s world-class derived credential solution, please &lt;a href="https://www.ivanti.com/company/contacts"&gt;contact us.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Tue, 14 Sep 2021 22:44:48 Z</pubDate></item><item><guid isPermaLink="false">4080442c-51cc-4f12-9df6-2b1715791713</guid><link>https://www.ivanti.com/blog/mobileiron-derived-credentials-a-zero-sign-on-solution-for-smart-card-enabled-organizations</link><atom:author><atom:name>Farhan Saifudin</atom:name><atom:uri>https://www.ivanti.com/blog/authors/farhan-saifudin</atom:uri></atom:author><category>Security</category><title>MobileIron Derived Credentials: A Zero Sign-on Solution for Smart Card Enabled Organizations</title><description>&lt;p&gt;&lt;strong&gt;*This post originally appeared on the MobileIron blog prior to the acquisition in December 2020, when MobileIron became part of Ivanti.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;MobileIron has been an innovator in the modern identity and mobile device management space since we shipped our first product in 2009. Since that time, MobileIron has worked with government agencies, the &lt;a href="https://www.nccoe.nist.gov/sites/default/files/legacy-files/derived-piv-nist-sp1800-12-v2.pdf" target="_blank" rel="noopener"&gt;National Institute of Standards and Technology (NIST)&lt;/a&gt;, and industry partners to pioneer derived credentials on mobile devices, allowing government entities and regulated industry customers to evolve traditional desktop security models to mobile.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is a derived credential?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you aren't in the government space or a highly regulated industry you’ve probably never heard of derived credentials. Many government agencies and regulated industries have standardized on using smart cards to log into traditional enterprise workstations like laptops, desktops, and enterprise web services. An employee inserts their smart card into a reader embedded on a workstation and enters a pin to log into the device and enterprise web services. This authentication method replaces username and passwords and provides a second factor of authentication, because the smart card is something the user has and the pin is something only they know (these rules are described in the &lt;a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.201-2.pdf" target="_blank" rel="noopener"&gt;FIPS 201-2&lt;/a&gt; definition of multifactor authentication).&lt;/p&gt;

&lt;p&gt;Derived credentials allow organizations that are using smart cards for authentication to easily extend this technology to mobile devices, providing strong, password-less authentication to the most sensitive of resources. Derived credentials are a mobile-focused evolution of smart card identity because the credentials are created or “derived” from the physical smart card. The end user securely authenticates to a portal using their physical smart card on an enterprise workstation. Then, using the information on the smart card, a mobile-friendly soft token is created and stored in a secure enclave on the mobile device as a digital certificate. The derived digital certificate is tied to a certificate on the smart card for revocation and validity. These certificates can be used for secure authentication to enterprise web services, to sign emails and documents, and to encrypt messages on mobile devices.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What kind of smart cards are out there?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt="us government id tag" src="https://static.ivanti.com/sites/marketing/media/images/blog/what-kind-of-smart.jpg"&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;U.S. civilian government agencies have standardized on smart cards called Personal Identity Verification (PIV) while the U.S. Military and Defense agencies have standardized on the Common Access Card (CAC). These types of smart cards and underlying technologies differ slightly, but both can be used with derived credentials.&lt;/p&gt;

&lt;p&gt;While smart cards work well in traditional desktop and laptop environments, they aren't well adapted for mobile devices. Many government desktops and laptops have built in smart card readers, or if they don’t, users can plug in a USB smart card reader. This doesn’t work well on mobile devices. Although, smart card readers exist for mobile devices, the user experience is poor, readers are expensive, and they aren't exactly easy to carry around.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;MobileIron to the rescue&lt;/h3&gt;

&lt;p&gt;MobileIron recognized the challenge our customers faced when complying with smart card and derived credential regulations in a mobile environment and created a solution to make the deployment of derived credentials easy. Working with trusted certificate and smartcard solutions like Entrust, DISA Purebred, Xtec, and Intercede, we created a derived credential solution that enables organizations to extend their existing security investments in smart cards to their mobile infrastructure. The solution supports government regulations and security standards such as Homeland Security Presidential Directive-12 (&lt;a href="https://www.dhs.gov/homeland-security-presidential-directive-12" target="_blank" rel="noopener"&gt;HSPD-12&lt;/a&gt;), OMB ICAM initiatives, FIPS 201, and NIST SP:800-157.&lt;/p&gt;

&lt;p&gt;The MobileIron PIV-D manager solution integrates with Public Key Infrastructure (PKI) systems to seamlessly deploy derived credentials and manage the lifecycle of the credentials in any mobile enterprise or government organization. MobileIron PIV-D Manager stores the derived credentials securely in our encrypted MobileIron AppConnect framework, which is FIPS 140-2 enabled. The credentials can then be seamlessly shared with other secure AppConnect apps such as Email+, Docs@Work, Web@Work, and native mobile OS apps for secure single sign-on, and S/MIME use on iOS and Android devices.&lt;/p&gt;

&lt;p&gt;MobileIron assisted government agencies such as the &lt;a href="https://gcn.com/articles/2017/10/05/dig-it-cyber-derived-piv-credentials.aspx" target="_blank" rel="noopener"&gt;Federal Emergency Management Agency (FEMA)&lt;/a&gt; and the DoD’s &lt;a href="https://executivegov.com/2019/04/disa-passes-100k-mark-for-purebred-device-credential-issuance-system/" target="_blank" rel="noopener"&gt;Defense Information Systems Agency (DISA)&lt;/a&gt; to deploy derived credentials seamlessly. These agencies now have tens of thousands of devices leveraging derived credentials, enabling their end users to access enterprise resources securely from mobile devices using their device as their identity.&lt;/p&gt;

&lt;p&gt;FEMA implemented derived credentials agency wide with the MobileIron PIV-D manager solution, enabling access to enterprise services and email from their mobile devices. FEMA disaster recovery personnel now use derived credentials on their mobile devices to seamlessly login into mission critical apps while eliminating usernames and passwords along the way.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="543256111"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;h3&gt;What’s next?&lt;/h3&gt;

&lt;p&gt;While derived credentials provide a strong authentication mechanism backed by PKI, &lt;a href="https://www.ivanti.com/products/passwordless-authentication" target="_blank"&gt;Zero Sign-On&lt;/a&gt; enables derived credentials for use with a comprehensive set of attributes before granting access to enterprise resources. MobileIron’s approach to mobile-centric, zero trust security significantly reduces risk by giving organizations complete control over enterprise data as it flows across devices, apps, networks, and cloud services.&lt;/p&gt;

&lt;p&gt;If you want to learn more about MobileIron’s world class derived credential solution please &lt;a href="https://www.dhs.gov/homeland-security-presidential-directive-12" target="_blank" rel="noopener"&gt;contact us.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Wed, 29 May 2019 18:57:59 Z</pubDate></item></channel></rss>