MOBILE SECURITY

mobile threat defence

by the end of 2020
30% of organisations will have
a Mobile Threat Defence program

-Gartner 2019

Companies adopting MTD to double in 2020

In 2019, less than 15% of organisations have an MTD program in place, but global research consultancy, Gartner, predict this number will double in the space of 12 months.

MTD solutions provide protection by predicting, preventing, detecting and re-mediating attacks.

MobileCorp mobile threat defence managed service

MobileCorp offers a comprehensive threat defence managed service utilising market leading vendor, Wandera, and extending across mobile endpoints, to applications and the network.

MobileCorp offers mobile threat defence management as an add-on module to an MDM|UEM managed service, or as a standalone security solution.

A mobile defence management solution like Wandera will provide:

  • unprecedented visibility into business networks and systems
  • predictive threat intelligence and analytics
  • endpoint, asset, and network monitoring
  • centralised alerts and threat management
  • vulnerability management and reputation protection

MobileCorp also offers a network security managed service suite.

Who needs MTD management?

Organisations of all sizes and across all industry verticals who wish to protect their corporate productivity and reputation would benefit from an MTD program, in addition to MDM|UEM.

High value use cases would include:

  • enterprises in high-security verticals such as defence, government, emergency services
  • enterprises in highly regulated verticals such as finance and healthcare
  • organisations holding consumer data
  • large Android device fleets
  • companies with BYOD mobile fleets

What is the business case for MTD management?

There are several reasons why a company will decide to purchase an MTD solution. The most common business cases are:

  • Risk Management and Compliance. This is a common business case with industry regulation or a security audit requiring an anti-malware solution be present on all endpoints, mobile or otherwise.
  • Sensitive Corporate Data. Data leaks are the unauthorised or unintentional transfer of sensitive information from an enterprise mobile device over the internet. Companies holding identity data are more likely to see the value of MTD. Mobile apps often fail to encrypt data, rendering it more readily available to anyone who utilises the same network as the device with the vulnerable app, usually via a man-in-the-middle attack.
  • Mobile Endpoint Invisibility. Without support for mobile devices, there is a gap left in the endpoint visibility picture. As mobile devices do not provide kernel-level access, the visibility is limited compared to what is available for Windows 10.
  • Unmanaged BYOD Devices. Companies with BYOD mobile fleets are particularly vulnerable especially where Microsoft Outlook app has been deployed as this is often a which is targeted to infect the infrastructure.
unified security management