Feature Name
|
Description
|
Android
|
iOS
|
|||
---|---|---|---|---|---|---|
Mobile Security
incorporates Trend Micro’s anti-malware
technology to effectively detect threats to prevent attackers from taking advantage
of
vulnerabilities on mobile devices. Mobile Security is
specially designed to scan for mobile threats.
|
Malware scan
|
![]() |
![]() |
|||
Privacy scan
|
![]() |
|||||
Vulnerability scan
|
![]() |
|||||
Modified Apps scan
|
![]() |
![]() |
||||
USB debugging scan
|
![]() |
|||||
Developer options scan
|
![]() |
|||||
Rooted mobile device scan
|
![]() |
|||||
Jailbroken mobile device scan
|
![]() |
|||||
Malicious iOS profiles scan
|
![]() |
|||||
Network traffic decryption scan
|
![]() |
![]() |
||||
Malicious SSL certificate scan
|
![]() |
![]() |
||||
Unsafe access point (Wi-Fi) scan
|
![]() |
|||||
As technology increases for mobile devices, the sophistication of
mobile threats is also increasing. Trend Micro Mobile
Security provides Web Reputation and Parental Controls to protect your
mobile device from unsafe websites and the websites that may contain objectionable
material
for children, teenagers and other family members. You can modify your Web Reputation
and
Parental Controls setting levels as per your desired settings. Mobile Security also
maintains the log of the websites that were blocked by Web Reputation or Parental
Controls
in their specific logs.
|
![]() |
|||||
Mobile devices often receive unwanted messages or spam through
SMS messaging. To filter unwanted SMS messages into a spam folder, you can specify
the
phone numbers from which all SMS messages will be considered spam or you can specify
a list
of approved phone numbers and configure Mobile Security
to filter all messages from senders that are not in the approved list. You can also
filter
unidentified SMS messages or messages without sender numbers. Your mobile device will
automatically store these messages to the spam folder in your inbox.
|
![]() |
|||||
Mobile Security enables you to
filter incoming or outgoing calls from the server. You can configure Mobile Security to block incoming calls from certain phone
numbers or you can specify a list of approved phone numbers to which the calls may
be made
from the mobile device. Mobile Security also enables
mobile device users to specify their own Blocked or Approved list to filter unwanted
incoming calls.
|
![]() |
|||||
WAP Push is a powerful method of delivering content to mobile devices
automatically. To initiate the delivery of content, special messages called WAP Push
messages are sent to users. These messages typically contain information about the
content
and serve as a method by which users can accept or refuse the content.
Malicious users have been known to send out inaccurate or
uninformative WAP Push messages to trick users into accepting content that can include
unwanted applications, system settings, and even malware. Mobile Security lets you use a list of trusted senders to filter WAP Push messages and
prevent unwanted content from reaching mobile devices.
The WAP Push protection feature is not available on mobile devices
without phone capabilities.
|
![]() |
|||||
After installing the Mobile Device Agent, the mobile device user need
to provide the authentication information to enroll the mobile devices with the Mobile Security
Management Server.
|
![]() |
![]() |
||||
To protect against the most current threats, you can either
update Mobile Security manually or configure it to
update automatically. To save cost, you can also set a different update frequency
for the
mobile devices that are in
roaming. Updates include component updates and Mobile Security program patch updates. |
![]() |
|||||
Mobile Device Agent Logs
|
Mobile Device Agent Logs available on Management Server.
|
Application scan logs
|
![]() |
![]() |
||
Policy violation logs
|
![]() |
![]() |
||||
Device vulnerability logs
|
![]() |
![]() |
||||
Network protection logs
|
![]() |
![]() |
||||
Web threat protection logs
|
![]() |
|||||
Mobile Device Agent keeps user logs on the mobile device.
|
Malware scan history
|
![]() |
||||
Vulnerability scan logs
|
![]() |
|||||
Modified app scan logs
|
![]() |
|||||
Privacy scan history
|
![]() |
|||||
Web blocking history
|
![]() |
|||||
Call blocking history
|
![]() |
|||||
Text blocking history
|
![]() |
|||||
Update history
|
![]() |