Trend Micro Mobile Security datasheet

datasheet
Trend Micro™
Mobile Security for Enterprises
Gain visibility and control of mobile devices, applications, and data
With the explosion of smartphones in the workplace, employees have recognized and
demanded support for a growing list of new ways to leverage this technology for their work.
Faced with the realities of dealing with an increasingly mobile workplace, organizations
struggle to find the balance between empowering mobile employees so they can be more
productive, and protecting their sensitive information. Ideally, they would like to accomplish
both without incurring the expense and time of deploying multiple new applications.
Trend Micro™ Mobile Security is an essential component of Trend Micro complete user
protection solution that gives you full visibility and control of mobile devices, apps, and
data through a single built-in console. It strikes the right balance between user productivity
and IT risks.
Mobile Security includes:
1. Mobile Device Management (MDM)
2. Mobile Application Management
3. Mobile Application Reputation Services
4. Device Antivirus (Android)
A key part of an overall complete user protection strategy, Trend Micro Mobile Security
greatly reduces complexity and costs compared to standalone mobile security and MDM
solutions that require new management infrastructures.
Protection points
Supports smartphones
and tablets running:
••
••
••
••
iOS
Android
Windows Phone
Blackberry
Threat and Data Protection
••
••
••
••
••
••
••
••
••
Antivirus
Data encryption enforcement
Password enforcement
Remote lock and wipe
Selective wipe
Mobile device management (MDM)
Mobile application management (MAM)
Mobile Application Reputation Service
Web reputation
Unlike other solutions, Trend Micro Mobile Security integrates layers of data protection to
secure your corporate data—no matter where it goes. Encryption enforcement, remote
lock and wipe, password enforcement, and other tools work together with device security
and app management to keep your data safe.
advantages
Lowers Cost and Complexity
Improves Visibility and Control
Balances Risk with Enablement
•• Streamlines management of mobile security,
•• Enables IT to track, monitor, and manage
•• Provides leading antivirus protection and
MDM, app management, and data protection
in a single solution
mobile devices, apps, and data through a
single console
ensures optimal device configurations to
reduce malware risk
•• Simplifies deployment by leveraging the
Trend Micro Cloud Communication Server, an
optional cloud-based service that automates
communications and reduces complexity
of deployment
•• Lowers operational costs with centralized
visibility and control of all endpoint security
•• Increases productivity and flexibility with
broad platform support
Page 1 of 4 • datasheet • mobile security for enterprises
•• Provides data on the number, types,
and configuration of devices accessing
corporate resources, whether they have
enrolled or not
•• Enables centralized policy creation and
enforcement across single or multiple servers
•• Supports a complete user protection
strategy by integrating with the Trend Micro
Control Manager console to centralize
policy and management across other
Trend Micro solutions such as OfficeScan™
endpoint protection
•• Protects corporate data with remote lock
and wipe, and selective wipe
•• Shields private data from unauthorized
access and improper use with password
and policy enforcement
•• Allows IT to block the use of risky mobile
apps based on up-to-the-minute data
from the cloud-based Trend Micro Mobile
Application Reputation Service
key features
Centralized Management
Mobile Application Management
Key Benefits
•• Streamlines administration with Trend Micro
•• Prevents the use of unauthorized, risky
•• Balances employee enablement with
Control Manager, providing central threat
and DLP policy management across layers
of the IT infrastructure
•• Provides a single view of enterprise users
from desktop to mobile device with views
of threats over time—helping to identify
advanced threats that may target users
with multiple vectors
•• Achieves more consistent policy enforcement
with single-click deployment of data protection
policies across endpoint, messaging, and
gateway solutions
•• Streamlines device enrollment with a choice
of a web link, a QR code, or iTunes download
•• Offers instant summary views of compliance,
inventory, protection, and health of all devices,
whether enrolled or not
applications on network-connected devices
with application blacklisting and whitelisting
•• Provides inventory management and
reporting for better visibility of apps used
across devices, groups, and the company
•• Enables IT to manage and even block
specific types of apps based on categories
with new Category App Management
•• Pushes applications to end-user devices
using the Corporate App Store functionality
to accelerate the use of optional and/or
required business apps—with volume purchase
plans integrated into the app store
•• Identifies and blocks apps that pose a
security or privacy risk by correlating
installed app data against the Trend Micro
Mobile Application Reputation Service
•• Provides visibility into the number, types,
•• Enables tracking, management, and
and configuration of devices accessing
corporate resources
deployment of Volume Purchase
Programs on iOS devices
Mobile Device Security
•• Leverages Trend Micro’s leading malware
protection, powered by cloud-based threat
intelligence from the Trend Micro Smart
Protection Network™
•• Detects and blocks malicious applications
and data files
•• Blocks malicious web content and sites
using Web Reputation Services
•• Detects attacks on the device via network
applications, ports, and services, using the
firewall and IDS
•• Monitors, blocks, and logs calls, SMS, and
MMS sent to and from devices based on
user policy
Data Protection
•• Protects corporate data with remote lock
and wipe, selective wipe, or device locate
in case of stolen or lost phone
•• Enforces, data encryption, and compliance
•• Notifies IT of jail broken or unencrypted
devices
•• Empowers IT to lock or permit mobile device
features such as cameras, Bluetooth®, 3G/4G,
and SD card readers
•• Gives IT a view of devices that are not enrolled
but are still accessing the corporate network
•• Allows IT to deploy, manage, and configure
Knox containers on Samsung Knox
compatible devices
Page 2 of 4 • datasheet • mobile security for enterprises
Mobile Device Management
•• Enables IT to remotely enroll, provision and
de-provision devices with corporate network
settings such as VPN, Exchange ActiveSync
and Wi-Fi®
•• Facilitates the deployment of Apple TV and
AirPrint services for iOS users
•• Supports device locate and inventory
management to secure and track companyand employee-owned devices, whether they
have enrolled or not
•• Allows cross-device and group policies for
consistent enforcement of security and
management requirements
•• Enables IT to control authorized devices and
deploy relevant policies via the International
Mobile Equipment Identity or IMEI, Wi-Fi,
and Mac address
•• Allows IT to restrict phone features such
as account modification, roaming, AirDrop,
cellular data control, lock screen, pairing,
Find My Friends, and more
IT control
•• Reduces deployment, IT and operational
costs by integrating MDM, mobile
security, application management,
and data protection in a single solution
•• Secures a wide range of devices with
antimalware, firewall and intrusion
detection system (IDS) powered by
Trend Micro’s global threat intelligence
•• Protects data wherever it goes with
encryption, remote lock and wipe,
and feature lock
•• Improves productivity by setting
employees free to work anytime,
anywhere from their choice of device
Complete User Protection
Trend Micro Mobile Security is part of
Trend Micro Complete User Protection,
a multi-layer solution that provides the
broadest range of interconnected threat
and data protection across endpoints,
email and collaboration, web, and
mobile devices.
USER LICENSING
Trend Micro Mobile Security is licensed
on a per user basis so a user can have
multiple devices that only count as one
license. Other mobile device management
vendors license on a per device basis, which
burdens IT with inventory management
and forecasting employee device
acquisition.
System Requirements and Support for Version 9.0 SP2
Component
Requirements
iOS Mobile Devices
•• iOS 4.3 and above
•• 3 MB storage minimum
•• 4 MB memory recommended
Android Mobile Devices
•• Android 2.1 or above
•• 8 MB storage minimum
•• 10 MB memory
Windows Phone
Mobile Device
•• Windows Phone 8.0
•• Windows Phone 8.1
Hardware
••
••
••
••
1 GHz Intel™ Pentium™ processor or equivalent
At least 1 GB of RAM
At least 400 MB of available disk space
A monitor that supports 800x600 resolution at 256 colors or higher
Platform
Mobile Security
Management Server
••
••
••
••
••
••
Microsoft Windows 2003 Server Family
Microsoft Windows 2003 R2 Server Family
Microsoft Windows 2008 Server Family
Microsoft Windows 2008 R2 Server Family
Microsoft Windows 2012 Server Family
Microsoft Windows 2012 R2 Server Family
Recommended Platform
••
••
••
••
••
••
Windows Server 2003 R2 Enterprise Edition
Windows Server 2003 Enterprise Edition
Windows Server 2008 R2 Enterprise Edition
Windows Server 2008 Enterprise Edition SP1
Windows Server 2008 Standard Edition
Windows Web Server 2008 Edition SP1
Hardware
••
••
••
••
1-GHz Intel™ Pentium™ processor or equivalent
At least 1 GB of RAM
At least 40 MB of available disk space
A monitor that supports 800x600 resolution at 256 colors or higher
Platform
Mobile Security
communication Server
••
••
••
••
••
••
Microsoft Windows 2003 Server Family
Microsoft Windows 2003 R2 Server Family
Microsoft Windows 2008 Server Family
Microsoft Windows 2008 R2 Server Family
Microsoft Windows 2012 Server Family
Microsoft Windows 2012 R2 Server Family
Recommended Platform
••
••
••
••
••
••
Windows Server 2008 R2 Enterprise Edition
Windows Server 2008 Enterprise Edition SP1
Windows Server 2003 R2 Enterprise Edition
Windows Server 2003 Enterprise Edition
Windows Server 2008 Standard Edition
Windows Web Server 2008 Edition SP1
Page 3 of 4 • datasheet • mobile security for enterprises
System Requirements and Support (continues)
Component
Mobile Security
Exchange Connector
Requirements
Platform
•• Windows 2008 R2 (64-bit)
•• Windows 2012 (64-bit)
•• Windows Server 2012 R2 (64-bit)
Hardware
•• 1-GHz Intel™ Pentium™ processor or equivalent
•• At least 1 GB of RAM
•• At least 200 MB of available disk space
SMS Sender
•• Android Operating system 2.1 and above
Web Server for
Communication Server
•• Microsoft Internet Information Server (IIS) 6.0/7.0/7.5
SQL Server
Blackberry
Enterprise Server
•• Microsoft SQL Server 2005/2008/2008 R2/2012/2005 Express/
2008 Express/2008 R2 Express/2012 Express
•• BES 5.x
”
For our customers, mobile device management
is a major requirement within many bigger
opportunities. Trend Micro Mobile Security
enables a device security service that is flexible
and stable—this is core to our philosophy. Plus,
it makes it easy.
Timothy Maliyil
”
Founder and CEO, AlertBoot
Securing Your Journey to the Cloud
©2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, and
the Trend Micro t-ball logo are trademarks or registered trademarks of
Trend Micro Incorporated. All other company and/or product names may
be trademarks or registered trademarks of their owners. Information
contained in this document is subject to change without notice.
[DS09_TMMS_141022US]
Page 4 of 4 • datasheet • mobile security for enterprises
Download PDF
Similar pages