Trend Micro MMS 2016 | ICS

Mobility Solutions > Mobility Management > Security > Trend Micro

Image

Trend Micro Mobile Security

Strike the right balance between user productivity and IT risks. With Trend Micro™ Mobile Security, you’ll gain full visibility and control over mobile user activity to protect sensitive data on mobile devices, apps, and data through a single built-in console.

Image

Mobile Device
Management (MDM)

Image

Mobile Application
Management

Image

Application Reputation
Services

Image

Device Antivirus (Android)

A key part of an overall complete user protection strategy, Trend Micro Mobile Security reduces complexity and costs compared to standalone mobile security and MDM solutions that require new management infrastructures.

Image

Balance employee enablement with IT control

Enable your users to safely leverage mobile technology for their work. Mobile Security Solutions from Trend Micro will help you find the balance between empowering mobile employees to be more productive, and protecting their sensitive information. And we’ll help you accomplish both without incurring the expense and time of deploying multiple new applications.

Trend Micro Mobile Security:

  • Allows you to secure, track, monitor, and manage mobile devices, apps, and data
  • Enables IT to configure, manage and monitor threat and data protection through a single console
  • Runs as a standalone solution or integrates with other Trend Micro products via Trend Micro Control Manager
  • Reduces IT costs and complexity by enabling a unified endpoint and mobile security platform
  • Secures the broad range of mobile platforms: iOS, Android, Blackberry, and Windows Phone

Protect users and productivity with comprehensive visibility and control

Mobile Device Management (MDM)

  • Improves visibility and control with instant views of device compliance, inventory, protection, and health
  • Enables IT to remotely enroll, provision, de-provision, and track devices
  • Facilitates the deployment of enterprise settings such as VPN, secure WIFI, and Apple TV and AirPrint services
  • Allows cross-device and group policies for consistent enforcement of security requirements
  • Enables IT to restrict phone features such as account modification, roaming, AirDrop, cellular data control, lock screen, pairing, Find My Friends, and more

Mobile Device Security

  • Detects and blocks malicious applications and data files
  • Blocks malware and malicious websites using leading antimalware and web reputation
  • Detects attacks that enter via network applications, ports and services, using the firewall and IDS
  • Monitors, blocks, and logs calls, SMS and MMS sent to and from devices based on user policy

Mobile Application Management

  • Offers application black listing and white listing to prevent or allow the use of mobile apps
  • Enables IT to manage and block specific types of apps based on categories
  • Identifies and blocks risky Android apps using the Trend Micro Mobile Application Reputation Service, part of the Smart Protection Network
  • Pushes apps to end-user devices through a corporate app store with volume purchase plans to accelerate the use of optional or required business apps
  • Provides inventory management and reporting for better visibility of apps used across devices, groups, company
  • Enables tracking, management and deployment of volume purchase programs on iOS devices

Data Protection

  • Protects data on lost or stolen devices with remote lock and wipe, selective wipe, and device locate capabilities
  • Enforces encryption, and compliance, blocking jail broken or unencrypted devices
  • Empowers IT to lock risky mobile device features such as cameras, Bluetooth®, and SD card readers
  • Allows IT to deploy, manage, and configure Knox containers on Samsung Knox compatible devices

Why ICS?

icon-hpvertica-whyics-1

Over 100 certified engineers

icon-hpvertica-whyics-2

Over 38 years of IT experience

icon-hpvertica-whyics-3

Over 100 awards and citations

 

Let Us Know What You Need