| 
 Feature Name 
 | 
 Description 
 | 
 Android 
 | 
 iOS 
 | 
|
| 
 Mobile Security
                                 incorporates Trend Micro’s anti-malware
                                 technology to effectively detect threats to prevent attackers from taking advantage
                                 of
                                 vulnerabilities on mobile devices. Mobile Security is
                                 specially designed to scan for mobile threats. 
 | 
 Malware scan 
 | 
![]()  | 
![]()  | 
|
| 
 Privacy scan 
 | 
![]()  | 
|||
| 
 Vulnerability scan 
 | 
![]()  | 
|||
| 
 Modified Apps scan 
 | 
![]()  | 
![]()  | 
||
| 
 USB debugging scan 
 | 
![]()  | 
|||
| 
 Developer options scan 
 | 
![]()  | 
|||
| 
 Rooted mobile device scan 
 | 
![]()  | 
|||
| 
 Jailbroken mobile device scan 
 | 
![]()  | 
|||
| 
 Malicious iOS profiles scan 
 | 
![]()  | 
|||
| 
 Network traffic decryption scan 
 | 
![]()  | 
![]()  | 
||
| 
 Malicious SSL certificate scan 
 | 
![]()  | 
![]()  | 
||
| 
 Unsafe access point (Wi-Fi) scan 
 | 
![]()  | 
|||
| 
 As technology increases for mobile devices, the sophistication of
                                 mobile threats is also increasing. Trend Micro Mobile
                                    Security provides Web Reputation and Parental Controls to protect your
                                 mobile device from unsafe websites and the websites that may contain objectionable
                                 material
                                 for children, teenagers and other family members. You can modify your Web Reputation
                                 and
                                 Parental Controls setting levels as per your desired settings. Mobile Security also
                                 maintains the log of the websites that were blocked by Web Reputation or Parental
                                 Controls
                                 in their specific logs. 
 | 
![]()  | 
|||
| 
 After installing the Mobile Device Agent, the mobile device user need
                                 to provide the authentication information to enroll the mobile devices with the Mobile Security
Management Server. 
 | 
![]()  | 
![]()  | 
||
| 
 To protect against the most current threats, you can either
                                 update Mobile Security manually or configure it to
                                 update automatically. To save cost, you can also set a different update frequency
                                 for the
                                 mobile devices that are in  
roaming. Updates include component updates and Mobile Security program patch updates.  | 
![]()  | 
|||
| 
 Mobile Device Agent Logs 
 | 
 Mobile Device Agent Logs available on Management Server. 
 | 
 Application scan logs 
 | 
![]()  | 
![]()  | 
| 
 Policy violation logs 
 | 
![]()  | 
![]()  | 
||
| 
 Device vulnerability logs 
 | 
![]()  | 
![]()  | 
||
| 
 Network protection logs 
 | 
![]()  | 
![]()  | 
||
| 
 Web threat protection logs 
 | 
![]()  | 
|||
| 
 Mobile Device Agent keeps user logs on the mobile device. 
 | 
 Malware scan history 
 | 
![]()  | 
||
| 
 Vulnerability scan logs 
 | 
![]()  | 
|||
| 
 Modified app scan logs 
 | 
![]()  | 
|||
| 
 Privacy scan history 
 | 
![]()  | 
|||
| 
 Web blocking history 
 | 
![]()  | 
|||
| 
 Call blocking history 
 | 
![]()  | 
|||
| 
 Text blocking history 
 | 
![]()  | 
|||
| 
 Update history 
 | 
![]()  | 
|||
Views: 
				
			
		
					Keywords: Web security,mobile device authentication,security scanning,regular updates
				
				
			
		
