When it comes to security, mobile device management (MDM) and unified endpoint management (UEM) solutions can only go so far.

By pairing these device management solutions with mobile threat detection (MTD) defenses, enterprises are quickly able to assess cyber threat areas pertaining to the device, network or application, and take defensive action to prevent and remediate cyber attacks.

Mobility presents some clear management risks and challenges for IT and business leaders, such as:

  • Legacy tools that can’t adequately support remote users and mobile workforces. For organizations burdened with cumbersome, time-consuming, and manual processes, this management gap raises costs and increases security risks. An organization must be able to keep all endpoints up to date and compliant with corporate policies while minimizing IT involvement.
  • Siloed management and tools across the range of mobile, desktop, and rugged or purpose-built devices. Many companies have mobile, desktop, and line of business teams, while tasking IT with developing alternatives to aspects of their various desktop platforms. This environment can lead to higher costs and inconsistent security across the platforms. Replacing disparate tools and processes with a unified toolset allows consistent management of all enterprise mobile and other endpoints.
  • Lack of visibility. A common complaint among companies with a complex infrastructure is poor visibility into performance and capacity. This limited visibility leads to reactive management and ineffective security. With single-pane management and user access, a company can leverage the latest mobile management capabilities for real-time operations and compliance status, regardless of device location.
  • Locked-down devices. Traditional approaches to addressing the explosion in the number and variety of devices and operating systems involve locking down devices and restricting access. That can result in poor user experience and inflated IT support costs. And as an enterprise gets increasingly restrictive, employees are more likely to work behind IT’s back to find their own solutions, thwarting attempts at effective management and security.

How MTD Helps

MTD solutions reinforce a company’s defenses by detecting and preventing threats against mobile platforms by leveraging AI, machine learning, and behavioral analysis based on mobile threat intelligence. They accomplish this by collecting and analyzing a wide range of potential indicators of compromise, identifying suspicious behavior, and countering the threats.

What maximizes the effectiveness of MTD solutions is that they gather their threat intelligence both from the devices they are supporting and from external sources. They intelligently compare the behavior of healthy devices to the behavior of devices known to be under attack, and learn how to more quickly recognize suspicious activity.

Supplementing MDM and UEM solutions, Mobile Threat Detection closely monitors all the vital indicators in the devices, the applications, and the network. They scrutinize, for example, the device operating system and security update versions, configurations, library modifications, and much more. With sophisticated techniques, they can identify malware and other threats via code analysts and by limiting the environments in which certain code can execute.

They also monitor all forms of wireless network traffic for questionable behavior and defend against phishing attempts on mobile devices, protecting users from malicious links sent via email, text, or apps.

Integrating MTD solutions

As the analyst firm Gartner notes, enterprises adopting MTD solutions are most often looking to integrate them with MDM or UEM solutions in order to expand their security capabilities and strengthen the security posture of mobile devices. But, Gartner added, organizations are increasingly using MTD on unmanaged devices in lieu of a management solution in order to protect the infrastructure from malicious threats coming from the mobile devices1.

Gartner points to two specific areas where MTD can provide immediate value. Those are device vulnerability assessments, in which MTD solutions can identify unpatched and vulnerable devices and rank them in terms of severity, and the reduction of app risk, by identifying apps that may conflict with an enterprise’s security and privacy policies, even when these applications may not be malicious.

Intelligent MTD solutions such as Sprint Secure Mobile AI build on the protections and security that MDM and UEM solutions already provide.

With its immediate risk assessments and threat alerts, the on-device Sprint Secure Mobile AI offers broad protection against known and unknown threats, thanks to its use of machine learning. When it spots a threat, it can react either automatically, by alerting the user, or via a separate third-party Mobile Device Management or Unified Endpoint Management solution, such as Workspace ONE TM or Workspace ONE ExpressTM.

Sprint Secure Mobile AI can also integrate with one or more MDM or UEM solutions in a single console for enhanced threat remediation abilities.

1Gartner Hype Cycle for Endpoint Security, 2019