January 29, 2015 By Joshua Lambert 2 min read

As part of IBM’s strategy to deliver comprehensive mobile management and security, the company has released an important new offering for MaaS360. MaaS360 Mobile Threat Management (MTM) focuses on detecting, analyzing and remediating malware. IBM believes this is a vital part of complete enterprise mobility management and any responsible mobile initiative.

From a security perspective, mobile is becoming the perfect storm for cyberattacks. As the use of mobile devices for work grows and extends to new use cases, actors are targeting smartphones and tablets more than ever before. Android is still the primary target for cybercriminals, but threats such as WireLurker and Masque targeted iOS devices in 2014.

How much of a wake-up call do we need? These attacks threaten sensitive corporate data such as financials, credit card accounts, patient records, intellectual property and customer information. With the increasing threat to data on mobile devices, enterprise mobility management solutions are perfectly positioned to provide a central point of policy, security and productivity for businesses.

MaaS360 MTM Capabilities

This is where MaaS360 MTM comes in. It provides a new layer of protection and cybercrime intelligence for adaptive malware prevention. Delivered seamlessly to IBM customers from the MaaS360 console, these new features are powered by technology from IBM Security Trusteer, which is relied upon by hundreds of millions of end users to protect against fraud and data breaches. MaaS360 MTM does not require any complicated hardware or software setup, nor third-party integration. It can be enabled instantly for new and existing customers.

MaaS360 MTM offers the ability to do the following:

  • Detect apps with malware signatures from a constantly updated database;
  • Alert both the user and administrator when malware is detected;
  • Automatically restrict mobile app and device functionality based on detected risks and policy requirements;
  • Immediately restrict access to corporate email, calendar, contacts, apps and content;
  • Remediate in near real time based on an IT-configured compliance rules engine;
  • Protect both Android and iOS devices.

Combating Security Threats

Rooted or jailbroken devices can be more prone to malware and fake applications, which take over critical device functions, steal credentials or mine personal information. MaaS360 MTM provides the ability to quickly discover jailbroken and rooted devices — and the attackers that try to mask their detection with the most up-to-date logic — without the need for any app updates. With MaaS360, IT and employees are aware of the latest risks that compromise the security of smartphones and tablets and hide their vulnerable status to evade detection.

Intelligence and speed are key to combating security threats. MaaS360 delivers a holistic approach to protect against mobile malware. You can gain quick visibility into these mobile risks and remediate the threats before they compromise your enterprise data. With these features, IT can also offer additional valuable service to bring-your-own-device users by protecting personal information on devices.

IBM Security takes an analytics-driven approach and establishes trusted partnerships with its customers, driving a unified security strategy across businesses. It helps customers proactively protect all parts of their organizations — people, data, applications and infrastructure — to defend against the volume and severity of attacks.

The addition of these enhanced mobile security capabilities to MaaS360 further shows why analysts have named IBM Security as a leader in 13 key industry analyst reports.

MaaS360 MTM is available now. To start a free trial, click here.

Watch this on-demand webcast to See MaaS360 MTM in action

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today