As part of IBM’s strategy to deliver comprehensive mobile management and security, the company has released an important new offering for MaaS360. MaaS360 Mobile Threat Management (MTM) focuses on detecting, analyzing and remediating malware. IBM believes this is a vital part of complete enterprise mobility management and any responsible mobile initiative.

From a security perspective, mobile is becoming the perfect storm for cyberattacks. As the use of mobile devices for work grows and extends to new use cases, actors are targeting smartphones and tablets more than ever before. Android is still the primary target for cybercriminals, but threats such as WireLurker and Masque targeted iOS devices in 2014.

How much of a wake-up call do we need? These attacks threaten sensitive corporate data such as financials, credit card accounts, patient records, intellectual property and customer information. With the increasing threat to data on mobile devices, enterprise mobility management solutions are perfectly positioned to provide a central point of policy, security and productivity for businesses.

MaaS360 MTM Capabilities

This is where MaaS360 MTM comes in. It provides a new layer of protection and cybercrime intelligence for adaptive malware prevention. Delivered seamlessly to IBM customers from the MaaS360 console, these new features are powered by technology from IBM Security Trusteer, which is relied upon by hundreds of millions of end users to protect against fraud and data breaches. MaaS360 MTM does not require any complicated hardware or software setup, nor third-party integration. It can be enabled instantly for new and existing customers.

MaaS360 MTM offers the ability to do the following:

  • Detect apps with malware signatures from a constantly updated database;
  • Alert both the user and administrator when malware is detected;
  • Automatically restrict mobile app and device functionality based on detected risks and policy requirements;
  • Immediately restrict access to corporate email, calendar, contacts, apps and content;
  • Remediate in near real time based on an IT-configured compliance rules engine;
  • Protect both Android and iOS devices.

Combating Security Threats

Rooted or jailbroken devices can be more prone to malware and fake applications, which take over critical device functions, steal credentials or mine personal information. MaaS360 MTM provides the ability to quickly discover jailbroken and rooted devices — and the attackers that try to mask their detection with the most up-to-date logic — without the need for any app updates. With MaaS360, IT and employees are aware of the latest risks that compromise the security of smartphones and tablets and hide their vulnerable status to evade detection.

Intelligence and speed are key to combating security threats. MaaS360 delivers a holistic approach to protect against mobile malware. You can gain quick visibility into these mobile risks and remediate the threats before they compromise your enterprise data. With these features, IT can also offer additional valuable service to bring-your-own-device users by protecting personal information on devices.

IBM Security takes an analytics-driven approach and establishes trusted partnerships with its customers, driving a unified security strategy across businesses. It helps customers proactively protect all parts of their organizations — people, data, applications and infrastructure — to defend against the volume and severity of attacks.

The addition of these enhanced mobile security capabilities to MaaS360 further shows why analysts have named IBM Security as a leader in 13 key industry analyst reports.

MaaS360 MTM is available now. To start a free trial, click here.

Watch this on-demand webcast to See MaaS360 MTM in action

More from Endpoint

Combining EPP and EDR tools can boost your endpoint security

6 min read - Endpoint protection platform (EPP) and endpoint detection and response (EDR) tools are two security products commonly used to protect endpoint systems from threats. EPP is a comprehensive security solution that provides a range of features to detect and prevent threats to endpoint devices. At the same time, EDR is specifically designed to monitor, detect and respond to endpoint threats in real-time. EPP and EDR have some similarities, as they both aim to protect endpoints from threats, but they also have…

The needs of a modernized SOC for hybrid cloud

5 min read - Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing the emergence of technologies such as attack surface management (ASM), which are starting to help organisations get more proactive and focus their efforts for maximum…

X-Force identifies vulnerability in IoT platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

X-Force prevents zero day from going anywhere

8 min read - This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…