Proofpoint Mobile Defense
Advanced mobile protection for iOS and Android devices, apps and networks
Detect and Control Risky Apps
Proofpoint Mobile Defense
The Proofpoint Mobile Defense tool protects your cell phone and smart devices against attacks from grayware, malware, and malicious code.
There are over 4.9 billion mobile users today. That is almost two-thirds of the world’s population.
WOW – that is a lot of users!
What is your company doing to protect your data, your employees, and your environment from rouge, malicious, PuP (Potentially unwanted Programs), Riskware (this is where Apps might not be malicious in nature, however said Apps still pose issues with a compliance policy, the loss of sensitive data, or issues surrounding personal privacy), or other Applications (Apps) installed on mobile phones, smart devices, laptop, and/or tablets?
With Proofpoint Mobile Defense, you can scrutinize and vet existing Apps and then detect malicious Apps that might be on your network. The Bring Your Own Device (BYOD) days are here to stay. Most people access their work emails from their personal cell phone or smart devices. What are you doing to prevent data loss or malicious attacks brought to our organization by these personal devices?
Proofpoint Mobile Defense will find those Apps that have passed so-called reviews and test but now said Apps have added unprotected or even backdoor capabilities through updates and program modifications. Remember, the vetting of Applications is usually done prior to adding it to the store or download site.
There are also issues regarding privacy. Some Apps don’t even have or provide privacy policies to protect those using said App. Often these App vendors are selling data from phone and smart device use, their contacts, their locations, and other data s to third-parties. All of this is being done while actively connecting to your network every day.
With Mobile Defense reporting you are able to see summaries of Apps and the risk they may hold for your organization. The report also provides information about where data is being sent and gives a broad view to the various mobile threats that abound today.
As you learn about bad Apps, Proofpoint Mobile Defense will identify and block those Apps you have selected and those Apps that have risk issues to your network. In addition, Mobile Defense can detect issues regarding Wi-Fi access points, risky configurations, and device exploits.
Proofpoint Mobile Defense really does the work for you by analyzing each mobile application’s code, behavior. An analysis engine checks for over 1,000 malicious and privacy-leaking behaviors. Over 20-million Apps have been analyzed and more being added each day. Checking the publisher, who they are, their application(s), how the App is communicating and with whom, and publisher reputation gives added relief to issues surround BYOD to your organization. Leveraging the Proofpoint data threat intelligence database, a correlation of traffic and traffic history can help flag and then confine Apps that connect to sites known for phishing, botnets, and/or other malicious behaviors.
Get a complete view of how Apps in your environment are behaving—and complete control when they aren’t
Mobile Defense integrates with your MDM and EMM tools to protect your mobile users.
Mobile Device Management (MDM) is the administrative task of deploying, securing, monitoring, integrating, and managing mobile phones, smart devices, tablets, and laptops, in a workplace environment. The intent of MDM is to manage security of mobile devices within your enterprise and protecting your network.
Enterprise Mobility Management (EMM) is an approach to security concerns, as well as enabling smart devices and tablets inside your organization. Strong EMM strategies help employees be more productive by providing them with tools needed to perform work-related tasks on mobile devices.
The Mobile Defense Client App for iOS and Android is a module you might need. When someone connects to a risky or compromised Wi-Fi network, Mobile Defense alerts the user and system administrators. The Mobile Defense Client App for iOS and Android devices looks for anomalies such as abnormal CPU usage, unknown configuration profiles, and file system tampering that can indicate zero-day threats.
Protect your organization from malicious Apps with a complimentary threat assessment report of your mobile environment. Request your Personalized Threat Assessment today.