As part of IBM’s strategy to deliver comprehensive mobile management and security, the company has released an important new offering for MaaS360. MaaS360 Mobile Threat Management (MTM) focuses on detecting, analyzing and remediating malware. IBM believes this is a vital part of complete enterprise mobility management and any responsible mobile initiative.

From a security perspective, mobile is becoming the perfect storm for cyberattacks. As the use of mobile devices for work grows and extends to new use cases, actors are targeting smartphones and tablets more than ever before. Android is still the primary target for cybercriminals, but threats such as WireLurker and Masque targeted iOS devices in 2014.

How much of a wake-up call do we need? These attacks threaten sensitive corporate data such as financials, credit card accounts, patient records, intellectual property and customer information. With the increasing threat to data on mobile devices, enterprise mobility management solutions are perfectly positioned to provide a central point of policy, security and productivity for businesses.

MaaS360 MTM Capabilities

This is where MaaS360 MTM comes in. It provides a new layer of protection and cybercrime intelligence for adaptive malware prevention. Delivered seamlessly to IBM customers from the MaaS360 console, these new features are powered by technology from IBM Security Trusteer, which is relied upon by hundreds of millions of end users to protect against fraud and data breaches. MaaS360 MTM does not require any complicated hardware or software setup, nor third-party integration. It can be enabled instantly for new and existing customers.

MaaS360 MTM offers the ability to do the following:

  • Detect apps with malware signatures from a constantly updated database;
  • Alert both the user and administrator when malware is detected;
  • Automatically restrict mobile app and device functionality based on detected risks and policy requirements;
  • Immediately restrict access to corporate email, calendar, contacts, apps and content;
  • Remediate in near real time based on an IT-configured compliance rules engine;
  • Protect both Android and iOS devices.

Combating Security Threats

Rooted or jailbroken devices can be more prone to malware and fake applications, which take over critical device functions, steal credentials or mine personal information. MaaS360 MTM provides the ability to quickly discover jailbroken and rooted devices — and the attackers that try to mask their detection with the most up-to-date logic — without the need for any app updates. With MaaS360, IT and employees are aware of the latest risks that compromise the security of smartphones and tablets and hide their vulnerable status to evade detection.

Intelligence and speed are key to combating security threats. MaaS360 delivers a holistic approach to protect against mobile malware. You can gain quick visibility into these mobile risks and remediate the threats before they compromise your enterprise data. With these features, IT can also offer additional valuable service to bring-your-own-device users by protecting personal information on devices.

IBM Security takes an analytics-driven approach and establishes trusted partnerships with its customers, driving a unified security strategy across businesses. It helps customers proactively protect all parts of their organizations — people, data, applications and infrastructure — to defend against the volume and severity of attacks.

The addition of these enhanced mobile security capabilities to MaaS360 further shows why analysts have named IBM Security as a leader in 13 key industry analyst reports.

MaaS360 MTM is available now. To start a free trial, click here.

Watch this on-demand webcast to See MaaS360 MTM in action

More from Endpoint

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…