MobileIron Threat Defense notification simulated on device
MobileIron Threat Defense notification simulated on device

Protect Against the Latest Mobile and Phishing Threats

MobileIron Threat Defense (MTD) protects and remediates against known and unknown (zero-day) threats that target your organization’s Android and iOS devices. MTD provides the ideal deployment, detection, and remediation solution to defend against attacks that occur at the device, network, application level, and phishing attacks.

 

Protect Against Phishing, the #1 Attack Vector

More Than 90% of Breaches Start with a Phishing Attack1

Mobile devices drive increased productivity by providing instant access to enterprise resources and data, from anywhere, and at any time. However, many organizations fail to make mobile security a top priority, which leaves these devices susceptible to a variety of attacks. Hackers are well aware of these facts and in turn, have set their sights on mobile devices as the primary targets for their attacks. Today, more than 90% of breaches start with a phishing attack, and with more than 60% of emails being read on mobile, mobile phishing is a major issue. Also alarming is the fact that phishing attacks are increasing at approximately 85% per year. MTD can protect and remediate against phishing attacks.
 

  • Machine learning detects even previously unknown or zero-day threats.
  • Cloud lookups inherently have delays associated with traversing networks back and forth. MTD’s real-time, on-device detection can match machine speed and provide more reliable protection.
  • On-device detection can continue providing protection even when disconnected from the network.

1 Verizon Data Breach Investigations Report, 2018

Mobile screen showing warning of potential phishing attack
MobileIron Go - active screen

Easily Deploy with 100% User Adoption

No User Interaction Required to Deploy and Activate Protection

One of the biggest enterprise security challenges is ensuring that mobile security is actually activated and updated on all user devices. Since organizations can’t rely on users to download and activate applications, any mobile threat protection should be automatically activated on the device. This helps ensure users are continuously protected from threats that come from connecting to unsecured Wi-Fi, leaving Bluetooth enabled, downloading an app from a questionable app store, or simply clicking on a link they believe to be harmless.
 

  • MTD is built directly into the MobileIron unified endpoint management (UEM) client to ensure seamless and continuous on-device protection.
  • No user action is required to deploy and activate MTD.
  • Users cannot disable MTD or remove it from their UEM managed devices.

Speed Matters

In the race against hackers, speed matters. Most mobile threat detection solutions rely on a backend cloud service to perform threat detection, inform UEM of a policy violation and then send remediation instructions to the UEM agent. A man-in-the-middle (MITM) attack can easily prevent connection to the cloud service, rendering threat detection capabilities completely useless, and thus failing to trigger the necessary remedial action. MTD uses machine-learning algorithms optimized to continuously detect threats, even when the device is offline. MTD’s unique approach to detection and remediation ensures immediate and ongoing visibility into malicious threats across all Android and iOS mobile devices, as well as detailed analyses of risky apps.
 

  • Get faster, on-device detection and remediation of known and zero-day threats, even without cellular or Wi-Fi connectivity.
  • Machine-learning algorithms provide immediate and ongoing visibility into malicious threats across all protected Android and iOS devices.
  • Gain real-time insight into the apps installed on user devices, and improve decision-making using analytics and detailed reports that provide threat assessment score, explanation of risks, and implications.
Speed comparison for detection and remediation of mobile devices
Administrative view for continuous app visibility and monitoring

Continuous App Visibility and Evaluation

MTD provides the level of visibility you need to continuously review and evaluate the mobile apps that are downloaded and installed on your users’ Android and iOS devices. This enables you to quickly identify those apps that pose security and privacy threats.
 

  • Easily determine the number of users who have risky apps on their devices.
  • Proactively leverage app usage policies to whitelist safe apps and blacklist risky apps.
  • Allow or deny apps based upon app risk scoring, app behaviors, domains, certificates, shared code, and network communications.
  • Upload any app for analysis by using an app store URL or an actual file.

Get Granular Control Over Mobile Configuration

More granular control over your mobile app configuration policy enables you to better maintain your organization’s overall security posture. MTD app analytics provide the ability to easily identify those apps which could potentially access and expose customer and employee data, as well as other intellectual property.
 

  • Quickly uncover those mobile apps that violate your organization’s compliance policies and take necessary corrective actions.
  • Filter mobile apps via a variety of characteristics such as location gathering, SMS reading, and screen recording.
  • Receive notification when newly created apps include characteristics that you have identified as security risks, and blacklist those apps.
  • Leverage a variety of mobile app security and privacy risk summary reports to make faster, more informed decisions to best support your organization’s security posture.
Administrative granular control for app policies
MobileIron Threat Defense compliance configuration

Flexible Compliance Actions Support User Productivity

MTD protects your organization against data loss while driving user productivity. That’s because MTD enables admins to configure automated, incremental compliance actions based upon the perceived severity of the security threat. Non-intrusive actions such as monitoring, can be automatically increased to send an alert, block AppConnect and email, quarantine the device, and perform selective wipe. So rather than automatically block a user’s access to corporate resources simply because they connect to unsecured Wi-Fi in their hotel room, or install a non-compliant social media app, a more gradual series of compliance actions can be taken as deemed necessary by the admin. This provides a much better experience for the users, and allows them to remain productive.
 

  • Admins can choose from a list of granular compliance actions that can be either server-initiated, or initiated at the device level.
  • Create and apply multiple local remediation action configurations to different user groups.
  • Shorten the “kill chain” for attacks by transforming the mobile device into the policy enforcement point to reduce detection time of threats and attacks.

Benefits of MobileIron Threat Defense

Security posture

Improve the security posture of your organization by achieving 100% user activation for MTD on the devices you manage with MobileIron UEM.

unnecessary expenses

Proactively protect your business from unnecessary expenses by reducing the exposure of confidential customer data, potential regulatory fines, and damage to your reputation.

Machine Learning

Machine learning algorithms support your mobile threat defense strategy by providing ongoing threat intelligence with or without Internet connectivity.

Apps

Gain insight into which apps are installed on users’ devices, and leverage threat assessment scores, as well as explanations of risks and implications to determine which compliance actions (if any, and in what order) should be taken.

Threat notifications

Compliance actions and threat notifications performed on the device shorten the “kill chain” and increase your chances for data loss prevention when battling today’s complex attacks on mobile devices.

cloud-based and on-premises

Choose between flexible cloud-based and on-premises deployment options to best meet the needs of your organization.

Recommended Resources

MTD: Detect and remediate against mobile phishing attacks White Paper

WHITE PAPER

MobileIron Threat Defense: Detect and remediate against mobile phishing attacks

Machine Learning-Based Mobile Phishing Detection White Paper

WHITE PAPER

Mobile Threat Detection Through Machine Learning

The Business Case for MobileIron Threat Defense eBook

EBOOK

The Business Case for MobileIron Threat Defense

Discover how MobileIron customers stay secure in a perimeter-less world.