Skip to content

Mobile Security and App Management for BYOD

Pinterest
More Options

Gain visibility and control of mobile devices, apps, and data

Trend Micro™ Mobile Security is a 4-in-1 solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks. Mobile Security combines:

  • Mobile Device Management (MDM)
  • Mobile Application Management
  • Application Reputation Services
  • Device Antivirus (Android)

A key part of an overall complete user protection strategy, Trend Micro Mobile Security reduces complexity and costs compared to standalone mobile security and MDM solutions that require new management structures.

Mobile Security Allows You to Take Control of BYOD

By integrating with the Trend Micro Control Manager console, Mobile Security allows you to centralize policy and management across Trend Micro OfficeScan™ endpoint security and other Trend Micro solutions—for a holistic security strategy.

Now, you can take control of the “bring-your-own-device” consumerization of your workspace. Secure, track, monitor, and manage your employee’s consumer-grade mobile devices, mobile apps, and company data.

Mobile Security:

  • Extends protection to mobile devices, apps, and data
  • Enables IT to configure, manage and monitor threat and data protection through a single console
  • Allows you to run as a standalone solution or integrate it with other Trend Micro products via Trend Micro Control Manager
  • Reduces IT costs and complexity by enabling a unified endpoint security platform
  • Secures the broad range of mobile platforms: iOS, Android, Blackberry, Symbian, and Windows Phone

Our 4-in-1 solution allows you to balance employee enablement with IT control. It features:

Mobile Device Management (MDM)

  • Improves visibility and control with instant views of compliance, inventory, protection, and health of devices
  • Enables IT to remotely enroll, provision, de-provision, and track devices
  • Allows cross-device and group policies for consistent enforcement of security requirements

Mobile Device Security

  • Blocks malware and malicious websites using leading antimalware and web reputation
  • Detects attacks that enter via network applications, ports and services, using the firewall and IDS
  • Monitors, blocks, and logs calls, SMS and MMS sent to and from devices based on user policy

Mobile Application Management

  • Offers application black listing and white listing to prevent or allow the use of mobile apps
  • Enables IT to manage and block specific types of apps based on categories
  • Identifies and blocks risky Android apps using the Trend Micro Mobile Application Reputation Service, part of the Smart Protection Network
  • Pushes apps to end-user devices through a corporate app store to accelerate the use of optional or required business apps
  • Provides inventory management and reporting for better visibility of apps used across devices, groups, company
  • Enables tracking, management and deployment of volume purchase programs on iOS devices

Data Protection

  • Protects data on lost or stolen devices with remote lock and wipe, selective wipe, and device locate capabilities
  • Enforces encryption, and compliance, blocking jail broken or unencrypted devices
  • Empowers IT to lock risky mobile device features such as cameras, Bluetooth®, and SD card readers. These locks can be applied based on when the device is connected to a specific area.

How Does Mobile Security Work?

This infographic series shows what our 4-in-1 mobile security solution can do—from jail break detection to centralized policy management, application push, and encryption control.

•	Mobile Device Management (MDM)

 

Trend Micro Mobile Security is designed to protect your private corporate data—today’s primary target—no matter where it goes. You can track, monitor, manage, and secure smartphones, tablets, and most importantly, your valuable data that’s on these devices.

Prevent data loss

  • Protects corporate data with remote lock and wipe, selective wipe, or device locate in case of threat or lost device
  • Enforces data encryption and compliance
  • Notifies IT  of jail broken or unencrypted devices
  • Empowers IT to lock or permit mobile device features such as cameras, Bluetooth®, and SD card readers

Regain critical visibility and control of your mobile devices and data

  • Enables IT to track and manage mobile devices, apps and data through a single console
  • Provides data on the number, types, and configuration of devices accessing corporate resources, whether they have enrolled or not
  • Supports a holistic endpoint security strategy by integrating with the Trend Micro Control Manager console to centralize policy and management across multiple Trend Micro solutions

Reduce operational costs

  • Saves time and money with centralized visibility and control of device management, app management, security and data protection—all within a single solution
  • Simplifies deployment  by leveraging the Trend Micro Cloud Communication Server, an optional cloud-based service that automates communications and reduces deployment complexity
  • Reduces phone acquisition costs by allowing BYOD

Improve productivity and flexibility of your workforce

  • Boosts employee productivity, flexibility, and company competitiveness by allowing users to choose the mobile devices and apps they like and know how to use
  • Enables IT to push the most productive applications to all devices, ensuring employees are best equipped to do the their jobs efficiently, while also black listing the unproductive apps

Reduce security risk

  • Minimizes the risk of compromised devices with industry-leading malware and web threat protection, backed by cloud-based threat intelligence from Trend Micro Smart Protection Network™
  • Ensures proper device configurations and security deployment to reduce malware risk
  • Enables IT to block the use of risky applications and allow approved apps

Unified Protection via Control Manager

Trend Micro Mobile Security can be managed through Trend Micro Control Manager, enabling you to centralize threat and policy management for multiple Mobile Security servers that may be spread throughout the world. You can also centrally manage multiple Trend Micro solutions deployed across layers of the IT infrastructure.

When deployed with Trend Micro OfficeScan™ endpoint security, you’ll benefit from a unified endpoint security platform that enables centralized management and visibility of all end user activity through a single console. In addition to reducing management time and operational costs, it improves security since our endpoint and mobile security work together to eliminate risk, block threats, and protect your data.

Complete End User Protection

Mobile Security is also part of Trend Micro™ Enterprise Data Protection. This solution secures your data from gateway to mobile devices by integrating a full set of data security products across the multiple layers of security in Trend Micro’s enterprise security suites. Enterprise Data Protection is available as an add on to Trend Micro’s or as part of the comprehensive enterprise security suite: Trend Micro Enterprise Security and Data Protection.



Businesses like yours are securing the wide range of employee- and company-owned mobile devices with Trend Micro Mobile Security.  Download the full stories to see what your peers have to say.

 

AlertBoot, Data Security Services, Las Vegas, Nevada, U.S.

“Trend Micro Mobile Security is by far the best solution for us—the feature set, maturity of the product, and the overall support of the product make it a stand out from the competition.”

- Timothy Maliyil, Founder & CEO, AlertBoot

 

Large Global Manufacturer, Anonymous, U.S.

“[Trend Micro] Mobile Security supports our broad range of devices—iOS, Android, and Windows Mobile devices. We have had to learn a lot about mobile device management, but with the Trend Micro solution, we have the familiar console.”

- Manager, Desktop Security


System Requirements and Support

Trend Micro Mobile Security supports the following platforms:

  • Apple iOS (must have Apple APN service)
  • Android
  • RIM BlackBerry (with BES server  installed)
  • Windows Mobile
  • Symbian
COMPONENT REQUIREMENTS
Mobile Security Management Server Hardware
  • 1-GHz Intel™ Pentium™ processor or equivalent
  • At least 1-GB of RAM
  • At least 300-MB of available disk space
  • A monitor that supports 800x600 resolution at 256 colors or higher

Platform
  • Microsoft Windows 2003 Server Family
  • Microsoft Windows 2003 R2 Server Family
  • Microsoft Windows 2008 Server Family
  • Microsoft Windows 2008 R2 Server Family
  • Microsoft Windows 2012 Server Family
  • Microsoft Windows 2012 R2 Server Family

Recommended Platform
  • Windows Server 2003 R2 Enterprise Edition
  • Windows Server 2003 Enterprise Edition
  • Windows Server 2008 R2 Enterprise Edition
  • Windows Server 2008 Enterprise Edition SP1
  • Windows Server 2008 Standard Edition
  • Windows Web Server 2008 Edition SP1
Mobile Security Communication Server Hardware
  • 1-GHz Intel™ Pentium™ processor or equivalent
  • At least 1-GB of RAM
  • At least 40-MB of available disk space
  • A monitor that supports 800x600 resolution at 256 colors or higher

Platform
  • Microsoft Windows 2003 Server Family
  • Microsoft Windows 2003 R2 Server Family
  • Microsoft Windows 2008 Server Family
  • Microsoft Windows 2008 R2 Server Family
  • Microsoft Windows 2012 Server Family
  • Microsoft Windows 2012 R2 Server Family

Recommended Platform
  • Windows Server 2003 R2 Enterprise Edition
  • Windows Server 2003 Enterprise Edition
  • Windows Server 2008 R2 Enterprise Edition
  • Windows Server 2008 Enterprise Edition SP1
  • Windows Server 2008 Standard Edition
  • Windows Web Server 2008 Edition SP1
Mobile Security Exchange Connector Hardware
  • 1-GHz Intel™ Pentium™ processor or equivalent
  • At least 1-GB of RAM
  • At least 200-MB of available disk space

Platform
  • Microsoft Windows 2008 R2 (64-bit)
SMS Sender Android Operating system 2.1 and above
Web Server for Communication Server Microsoft Internet Information Server (IIS) 6.0/7.0/7.5
SQL Server Microsoft SQL Server 2005/2008/2008 R2/2012/2005 Express/2008 Express/2008 R2 Express/2012 Express
Blackberry Enterprise Server BES 5.x
iOS Mobile Devices
  • iOS 4.3 and above
  • 3 MB storage minimum
  • 4MB memory recommended
Android Mobile Devices
  • Android 2.1 or above
  • 8 MB storage minimum
  • 10 MB memory

Connect with us on