MobileIron Threat Defense notification simulated on device
MobileIron Threat Defense notification simulated on device

Mobile Devices Have Become Prime Targets for Hackers. Fight Back with MobileIron!

MobileIron Threat Defense (MTD) protects and remediates against known and unknown (zero-day) threats that target your organization’s Android and iOS devices. MTD provides the ideal deployment, detection, and remediation solution to defend against attacks that occur at the device-, network-, and application-level. Multi-vector anti-phishing enables you to protect your organization against the #1 social attack vector by leveraging complete mobile phishing protection made possible by taking full-advantage of the MobileIron UEM policy engine, MTD on-device machine learning and phishing URL lookup, optional expansion to include cloud-based phishing URL lookup and zero sign-on (ZSO), which eliminates user credentials — the primary target of phishing attacks today.
 

Protect Against Phishing, the #1 Attack Vector

Phishing attacks leverage deception to trick individuals into divulging personal information that can then be leveraged for fraudulent purposes. According to Verizon Data Breach Investigations Report (DBIR) 2020, phishing is the top form of social driven breaches. And while the vast majority of phishing attacks arrived via email, attacks were also carried out via website, phone and SMS. Why are mobile devices increasingly being targeted for phishing attacks? There are several reasons. Small mobile device screens make it difficult for users to access and view key information while being prompted to make fast decisions. And when it comes to text messages, it’s difficult to verify their authenticity. Don’t allow your users take the bait! MobileIron Threat Defense (MTD) protects and remediates against phishing attacks.
 

  • Achieve 100% user adoption for anti-phishing.
  • Deploy multi-vector phishing protection and remediation.
  • Control the balance between security and user privacy.
Mobile screen showing warning of potential phishing attack
MobileIron Go - active screen

Easily Deploy with 100% User Adoption

No User Interaction Required to Deploy and Activate Protection

One of the biggest enterprise security challenges is ensuring that mobile security is actually activated and updated on all user devices. Since organizations can’t rely on users to download and activate applications, any mobile threat protection should be automatically activated on the device. This helps ensure users are continuously protected from threats that come from connecting to unsecured Wi-Fi, leaving Bluetooth enabled, downloading an app from a questionable app store, or simply clicking on a link they believe to be harmless.
 

  • MTD is built directly into the MobileIron unified endpoint management (UEM) client to ensure seamless and continuous on-device protection.
  • No user action is required to deploy and activate MTD.
  • Users cannot disable MTD or remove it from their UEM managed devices.

Speed Matters

In the race against hackers, speed matters. Most mobile threat detection solutions rely on a backend cloud service to perform threat detection, inform UEM of a policy violation and then send remediation instructions to the UEM agent. A man-in-the-middle (MITM) attack can easily prevent connection to the cloud service, rendering threat detection capabilities completely useless, and thus failing to trigger the necessary remedial action. MTD uses machine-learning algorithms optimized to continuously detect threats, even when the device is offline. MTD’s unique approach to detection and remediation ensures immediate and ongoing visibility into malicious threats across all Android and iOS mobile devices, as well as detailed analyses of risky apps.
 

  • Get faster, on-device detection and remediation of known and zero-day threats, even without cellular or Wi-Fi connectivity.
  • Machine-learning algorithms provide immediate and ongoing visibility into malicious threats across all protected Android and iOS devices.
  • Gain real-time insight into the apps installed on user devices, and improve decision-making using analytics and detailed reports that provide threat assessment score, explanation of risks, and implications.
Speed comparison for detection and remediation of mobile devices
Administrative view for continuous app visibility and monitoring

Continuous App Visibility and Evaluation

MTD provides the level of visibility you need to continuously review and evaluate the mobile apps that are downloaded and installed on your users’ Android and iOS devices. This enables you to quickly identify those apps that pose security and privacy threats.
 

  • Easily determine the number of users who have risky apps on their devices.
  • Proactively leverage app usage policies to allow safe apps and disallow risky apps.
  • Allow or deny apps based upon app risk scoring, app behaviors, domains, certificates, shared code, and network communications.
  • Upload any app for analysis by using an app store URL or an actual file.

Get Granular Control Over Mobile Configuration

More granular control over your mobile app configuration policy enables you to better maintain your organization’s overall security posture. MTD app analytics provide the ability to easily identify those apps which could potentially access and expose customer and employee data, as well as other intellectual property.
 

  • Quickly uncover those mobile apps that violate your organization’s compliance policies and take necessary corrective actions.
  • Filter mobile apps via a variety of characteristics such as location gathering, SMS reading, and screen recording.
  • Receive notification when newly created apps include characteristics that you have identified as security risks, and disallow those apps.
  • Leverage a variety of mobile app security and privacy risk summary reports to make faster, more informed decisions to best support your organization’s security posture.
Administrative granular control for app policies
MobileIron Threat Defense compliance configuration

Flexible Compliance Actions Support User Productivity

MTD protects your organization against data loss while driving user productivity. That’s because MTD enables admins to configure automated, incremental compliance actions based upon the perceived severity of the security threat. Non-intrusive actions such as monitoring, can be automatically increased to send an alert, block AppConnect and email, quarantine the device, and perform selective wipe. So rather than automatically block a user’s access to corporate resources simply because they connect to unsecured Wi-Fi in their hotel room, or install a non-compliant social media app, a more gradual series of compliance actions can be taken as deemed necessary by the admin. This provides a much better experience for the users, and allows them to remain productive.
 

  • Admins can choose from a list of granular compliance actions that can be either server-initiated, or initiated at the device level.
  • Create and apply multiple local remediation action configurations to different user groups.
  • Shorten the “kill chain” for attacks by transforming the mobile device into the policy enforcement point to reduce detection time of threats and attacks.

Benefits of MobileIron Threat Defense

Security posture

Improve the security posture of your organization by achieving 100% user activation for MTD on the devices you manage with MobileIron UEM.

unnecessary expenses

Proactively protect your business from unnecessary expenses by reducing the exposure of confidential customer data, potential regulatory fines, and damage to your reputation.

Machine Learning

Machine learning algorithms support your mobile threat defense strategy by providing ongoing threat intelligence with or without Internet connectivity.

Apps

Gain insight into which apps are installed on users’ devices, and leverage threat assessment scores, as well as explanations of risks and implications to determine which compliance actions (if any, and in what order) should be taken.

Threat notifications

Compliance actions and threat notifications performed on the device shorten the “kill chain” and increase your chances for data loss prevention when battling today’s complex attacks on mobile devices.

cloud-based and on-premises

Choose between flexible cloud-based and on-premises deployment options to best meet the needs of your organization.

Recommended Resources

MTD: Detect and remediate against mobile phishing attacks White Paper

WHITE PAPER

MobileIron Threat Defense: Detect and remediate against mobile phishing attacks

Machine Learning-Based Mobile Phishing Detection White Paper

WHITE PAPER

Mobile Threat Detection Through Machine Learning

Complete Mobile Phishing Protection

DATASHEET

Complete Mobile Phishing Protection

Discover how MobileIron customers stay secure in a perimeter-less world.