{
	"id": "65b0aa27-6234-4c5e-9acb-643aa2103eeb",
	"created_at": "2026-04-06T00:17:40.089079Z",
	"updated_at": "2026-04-10T03:21:59.75642Z",
	"deleted_at": null,
	"sha1_hash": "c0c1f2f6a015721fa177fd70e8899127f1f0d47f",
	"title": "MobileIron: A Leader in UEM \u0026 Zero Trust Security",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 237601,
	"plain_text": "MobileIron: A Leader in UEM \u0026 Zero Trust Security\r\nArchived: 2026-04-05 23:02:32 UTC\r\nSkip to content\r\nPlatform\r\nProducts\r\nAutonomous Endpoint Management\r\nExposure Management\r\nNetwork Security\r\nSupply Chain\r\nIvanti Neurons Platform\r\nAll products\r\nSolutions\r\nAutonomous Endpoint Management\r\nExposure Management\r\nNetwork Security\r\nSupply Chain\r\nIndustries\r\nAll Solutions\r\nAll Use Cases\r\nSupport\r\nResources\r\nPartners\r\nCompany\r\nThe first mobile‑centric security platform\r\nhttps://www.mobileiron.com/en/smartwork-blog/ios-url-scheme-hijacking-xara-attack-analysis-and-countermeasures\r\nPage 1 of 3\n\nMobileIron was founded in 2007 by Ajay Mishra and Suresh Batchu as the industry’s first mobile-centric, zero\r\ntrust platform built on a unified endpoint management (UEM) foundation. MobileIron’s mobile-centric, zero trust\r\napproach ensured that only authorized users, devices, apps and services could access business resources. The\r\ncompany went public in 2014, trading under the ticker symbol MOBL.\r\nMobileIron was acquired by Ivanti on December 1, 2020.\r\nMobileIron Products\r\nThe MobileIron platform was built to secure and manage corporate data in a world where people access cloud data\r\nusing mobile devices and modern endpoints.\r\nStill your partner after the sale\r\nWe don’t trumpet our technology only to fall silent on support\r\nOur technical representatives stand ready to help you keep your end-users productive and deliver information that\r\nprovides easy-to-find answers to common questions.\r\nLog a support issue via self-service, contact your local support team for personalized assistance, collaborate with\r\nexperts, search knowledge base articles, and participate in discussion forums.\r\nLinks to Helpful Information\r\nhttps://www.mobileiron.com/en/smartwork-blog/ios-url-scheme-hijacking-xara-attack-analysis-and-countermeasures\r\nPage 2 of 3\n\nSource: https://www.mobileiron.com/en/smartwork-blog/ios-url-scheme-hijacking-xara-attack-analysis-and-countermeasures\r\nhttps://www.mobileiron.com/en/smartwork-blog/ios-url-scheme-hijacking-xara-attack-analysis-and-countermeasures\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.mobileiron.com/en/smartwork-blog/ios-url-scheme-hijacking-xara-attack-analysis-and-countermeasures"
	],
	"report_names": [
		"ios-url-scheme-hijacking-xara-attack-analysis-and-countermeasures"
	],
	"threat_actors": [],
	"ts_created_at": 1775434660,
	"ts_updated_at": 1775791319,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/c0c1f2f6a015721fa177fd70e8899127f1f0d47f.pdf",
		"text": "https://archive.orkl.eu/c0c1f2f6a015721fa177fd70e8899127f1f0d47f.txt",
		"img": "https://archive.orkl.eu/c0c1f2f6a015721fa177fd70e8899127f1f0d47f.jpg"
	}
}