Skip to content

Enterprise Mobile Security and Management

Pinterest
More Options

Gain visibility and control of mobile devices, apps, and data

Strike the right balance between user productivity and IT risks. With Trend Micro™ Mobile Security, you’ll gain full visibility and control over mobile user activity to protect sensitive data on mobile devices, apps, and data through a single built-in console. Mobile Security combines:

  • Mobile Device Management (MDM)
  • Mobile Application Management
  • Application Reputation Services
  • Device Antivirus (Android)

A key part of an overall complete user protection strategy, Trend Micro Mobile Security reduces complexity and costs compared to standalone mobile security and MDM solutions that require new management infrastructures.

Balance employee enablement with IT control

Enable your users to safely leverage mobile technology for their work. Trend Micro Mobile Security will help you find the balance between empowering mobile employees to be more productive, and protecting their sensitive information. And we’ll help you accomplish both without incurring the expense and time of deploying multiple new applications.

Trend Micro Mobile Security:

  • Allows you to secure, track, monitor, and manage mobile devices, apps, and data
  • Enables IT to configure, manage and monitor threat and data protection through a single console
  • Runs as a standalone solution or integrates with other Trend Micro products via Trend Micro Control Manager
  • Reduces IT costs and complexity by enabling a unified endpoint and mobile security platform
  • Secures the broad range of mobile platforms: iOS, Android, Blackberry, and Windows Phone

Protect users and productivity with comprehensive visibility and control

Mobile Device Management (MDM)

  • Improves visibility and control with instant views of device compliance, inventory, protection, and health
  • Enables IT to remotely enroll, provision, de-provision, and track devices
  • Facilitates the deployment of enterprise settings such as VPN, secure WIFI, and Apple TV and AirPrint services
  • Allows cross-device and group policies for consistent enforcement of security requirements
  • Enables IT to restrict phone features such as account modification, roaming, AirDrop, cellular data control, lock screen, pairing, Find My Friends, and more

Mobile Device Security

  • Detects and blocks malicious applications and data files
  • Blocks malware and malicious websites using leading antimalware and web reputation
  • Detects attacks that enter via network applications, ports and services, using the firewall and IDS
  • Monitors, blocks, and logs calls, SMS and MMS sent to and from devices based on user policy

Mobile Application Management

  • Offers application black listing and white listing to prevent or allow the use of mobile apps
  • Enables IT to manage and block specific types of apps based on categories
  • Identifies and blocks risky Android apps using the Trend Micro Mobile Application Reputation Service, part of the Smart Protection Network
  • Pushes apps to end-user devices through a corporate app store with volume purchase plans to accelerate the use of optional or required business apps
  • Provides inventory management and reporting for better visibility of apps used across devices, groups, company
  • Enables tracking, management and deployment of volume purchase programs on iOS devices

Data Protection

  • Protects data on lost or stolen devices with remote lock and wipe, selective wipe, and device locate capabilities
  • Enforces encryption, and compliance, blocking jail broken or unencrypted devices
  • Empowers IT to lock risky mobile device features such as cameras, Bluetooth®, and SD card readers
  • Allows IT to deploy, manage, and configure Knox containers on Samsung Knox compatible devices

Trend Micro Mobile Security is designed to protect your private corporate data—today’s primary target—no matter where it goes. You can track, monitor, manage, and secure your valuable data on smartphones and tablets.

Prevent data loss

  • Protects corporate data with remote lock and wipe, selective wipe, or device locate in case of threat or loss
  • Enforces data encryption and compliance
  • Notifies IT  of jail broken or unencrypted devices
  • Empowers IT to lock or permit mobile device features such as cameras, Bluetooth®, and SD card readers

Regain critical visibility and control of your mobile devices and data

  • Enables IT to track and manage mobile devices, apps and data through a single console
  • Provides data on the number, types, and configuration of devices accessing corporate resources, whether they are enrolled or not
  • Supports a holistic endpoint security strategy by integrating with the Trend Micro Control Manager console to centralize policy and management across multiple Trend Micro solutions

Reduce operational costs

  • Saves time and money with centralized visibility and control of device management, app management, security and data protection—all within a single solution
  • Simplifies deployment  by leveraging the Trend Micro Cloud Communication Server, an optional cloud-based service that automates communications and reduces deployment complexity
  • Reduces phone acquisition costs by allowing BYOD

Improve productivity and flexibility of your workforce

  • Boosts employee productivity, flexibility, and company competitiveness by allowing users to choose their preferred mobile devices and apps
  • Enables IT to push the most productive applications to all devices and blacklist unproductive apps to ensure employees are best equipped to do the their jobs efficiently

Reduce security risk

  • Minimizes the risk of compromised devices with industry-leading malware and web threat protection, backed by cloud-based threat intelligence from Trend Micro Smart Protection Network™
  • Ensures proper device configurations and security deployment to reduce malware risk
  • Enables IT to block the use of risky applications and allow approved apps

Unified Protection via Control Manager

Trend Micro Mobile Security can be managed through Trend Micro Control Manager, enabling you to centralize threat and policy management for multiple Mobile Security servers that may be spread throughout the world. You can also centrally manage multiple Trend Micro solutions deployed across layers of the IT infrastructure.

  • Provides a single view of enterprise users from desktop to mobile device with views of threats over time—helping to identify advanced threats that may target users with multiple vectors.
  • Ensures consistent policy enforcement with single-click deployment of data protection policies across endpoint, messaging, and gateway solutions
  • Streamlines device enrollment with a choice of a web link, a QR code, or an iTunes download
  • Offers instant summary views of compliance, inventory, protection, and health of all devices, whether enrolled or not
  • Provides visibility into the number, types, and configuration of devices accessing corporate resources

When deployed with other Trend Micro end user security products, you’ll benefit from a unified endpoint security platform that enables centralized management and visibility of all user activity through a single console. In addition to reducing management time and operational costs, it improves security since our endpoint and mobile security work together to eliminate risk, block threats, and protect your data.



Businesses like yours are securing the wide range of employee- and company-owned mobile devices with Trend Micro Mobile Security.  Download the full stories to see what your peers have to say.

 

AlertBoot, Data Security Services, Las Vegas, Nevada, U.S.

“Trend Micro Mobile Security is by far the best solution for us—the feature set, maturity of the product, and the overall support of the product make it a stand out from the competition.”

- Timothy Maliyil, Founder & CEO, AlertBoot

 

Large Global Manufacturer, Anonymous, U.S.

“[Trend Micro] Mobile Security supports our broad range of devices—iOS, Android, and Windows Mobile devices. We have had to learn a lot about mobile device management, but with the Trend Micro solution, we have the familiar console.”

- Manager, Desktop Security


System Requirements and Support

Trend Micro Mobile Security supports the following platforms:

  • Apple iOS (must have Apple APN service)
  • Android
  • Windows Phone
  • RIM BlackBerry (with BES server  installed)
COMPONENT REQUIREMENTS
iOS Mobile Devices
  • iOS 4.3 and above
  • 3 MB storage minimum
  • 4MB memory recommended
Android Mobile Devices
  • Android 2.1 or above
  • 8 MB storage minimum
  • 10 MB memory
Windows Phone Mobile
  • Windows Phone 8.0
  • Windows Phone 8.1
Mobile Security Management Server Hardware
  • 1-GHz Intel™ Pentium™ processor or equivalent
  • At least 1-GB of RAM
  • At least 400-MB of available disk space
  • A monitor that supports 800x600 resolution at 256 colors or higher

Platform
  • Microsoft Windows 2003 Server Family
  • Microsoft Windows 2003 R2 Server Family
  • Microsoft Windows 2008 Server Family
  • Microsoft Windows 2008 R2 Server Family
  • Microsoft Windows 2012 Server Family
  • Microsoft Windows 2012 R2 Server Family

Recommended Platform
  • Windows Server 2003 R2 Enterprise Edition
  • Windows Server 2003 Enterprise Edition
  • Windows Server 2008 R2 Enterprise Edition
  • Windows Server 2008 Enterprise Edition SP1
  • Windows Server 2008 Standard Edition
  • Windows Web Server 2008 Edition SP1
Mobile Security Communication Server Hardware
  • 1-GHz Intel™ Pentium™ processor or equivalent
  • At least 1-GB of RAM
  • At least 40-MB of available disk space
  • A monitor that supports 800x600 resolution at 256 colors or higher

Platform
  • Microsoft Windows 2003 Server Family
  • Microsoft Windows 2003 R2 Server Family
  • Microsoft Windows 2008 Server Family
  • Microsoft Windows 2008 R2 Server Family
  • Microsoft Windows 2012 Server Family
  • Microsoft Windows 2012 R2 Server Family

Recommended Platform
  • Windows Server 2003 R2 Enterprise Edition
  • Windows Server 2003 Enterprise Edition
  • Windows Server 2008 R2 Enterprise Edition
  • Windows Server 2008 Enterprise Edition SP1
  • Windows Server 2008 Standard Edition
  • Windows Web Server 2008 Edition SP1
Mobile Security Exchange Connector Hardware
  • 1-GHz Intel™ Pentium™ processor or equivalent
  • At least 1-GB of RAM
  • At least 200-MB of available disk space

Platform
  • Microsoft Windows 2008 R2 (64-bit)
SMS Sender Android Operating system 2.1 and above
Web Server for Communication Server Microsoft Internet Information Server (IIS) 6.0/7.0/7.5
SQL Server Microsoft SQL Server 2005/2008/2008 R2/2012/2005 Express/2008 Express/2008 R2 Express/2012 Express
Blackberry Enterprise Server BES 5.x

 


Connect with us on