Enterprise mobility is designed to give collaborators the 24/7 access they need to perform their jobs. In our mobile-first world where corporate data constantly transit between mobile devices, applications, connected objects, etc., striking a balance between mobility and security comes as a challenge for organizations.
of the global workforce is mobile and mostly composed of BYOD devices
Attacks have become people-centric and target corporate data through mobile collaborators
42 million attack attempts on mobile devices were registered globally in 2017
In 2017, 2.5 billion data records were compromised in data breaches
of the global workforce is mobile and mostly composed of BYOD devices
Attacks have become people-centric and target corporate data through mobile collaborators
42 million attack attempts on mobile devices were registered globally in 2017
In 2017, 2.5 billion data records were compromised in data breaches
PRIVACY LAWS & MOBILE DEVICES
More and more data privacy laws (GDPR, FTC ACT, PIPEDA, HIPAA, PSD2...) are being enforced across the world. To comply, organizations need to implement security measures to prevent data theft and exfiltration from mobile devices and applications.
THE MOBILE ATTACK SURFACE
While mobility undeniably helps organizations boost productivity, it also creates a new attack surface in which corporate data are exposed to a wide variety of cyber threats operating at the application, the network and the device-level.
PRADEO SECURITY MOBILE THREAT DEFENSE PROTECTS THE MOBILE WORKFORCE AND ITS DATA
Pradeo developed an advanced Artificial Intelligence proces delivering the most accurate threat detection technology of the market. Through the years, the Pradeo intelligence center has collected 100 billions of mobile security data, implemented 200.000 security rules and detected nearly 1 million severe mobile threats and billions of leaky behaviors.
APPLICATION SECURITY
Most mobile threats do not have viral signatures. In order to detect and prevent zero-day attacks, Pradeo’s mobile application scanning capability accurately identifies all mobile applications behaviors and vulnerabilities. Then, it contextualizes information to avoid false-positive alerts and only blocks applications that represent a real threat.
Key features
  • Unknown, known and advanced threats detection
  • Static and dynamic analysis
  • Zero false positive
  • Automatic blocking of applications
  • Vulnerabilities detection
  • Remediation of risky behaviors
NETWORK SECURITY
As the amount of public hotspots keeps increasing and people tend to connect to several ones a day, Pradeo Security screens in real-time network configuration and parameters. As a result, it prevents network-related attacks such as Man-In-The-Middle.
Key features
  • Man In the Middle detection
  • Network access control
  • SSL certificates check
  • Secure browser
DEVICE SECURITY
A device that is jailbroken, rooted, running on an outdated operating system, etc. is vulnerable to device-related attacks and thus, represents a security flaw in the mobile chain. Pradeo Security monitors device integrity by inspecting all its potentially defective aspects.
Key features
  • OS vulnerabilities detection
  • Root / jailbreak exploitation detection
  • Identification of system takeover
  • Abnormal battery consumption detection
APPLICATION SECURITY
Most mobile threats do not have viral signatures. In order to detect and prevent zero-day attacks, Pradeo’s mobile application scanning capability accurately identifies all mobile applications behaviors and vulnerabilities. Then, it contextualizes information to avoid false-positive alerts and only blocks applications that represent a real threat.
Key features
  • Unknown, known and advanced threats detection
  • Static and dynamic analysis
  • Zero false positive
  • Automatic blocking of applications
  • Vulnerabilities detection
  • Remediation of risky behaviors
NETWORK SECURITY
As the amount of public hotspots keeps increasing and people tend to connect to several ones a day, Pradeo Security screens in real-time network configuration and parameters. As a result, it prevents network-related attacks such as Man-In-The-Middle.
Key features
  • Man In the Middle detection
  • Network access control
  • SSL certificates check
  • Secure browser
DEVICE SECURITY
A device that is jailbroken, rooted, running on an outdated operating system, etc. is vulnerable to device-related attacks and thus, represents a security flaw in the mobile chain. Pradeo Security monitors device integrity by inspecting all its potentially defective aspects.
Key features
  • OS vulnerabilities detection
  • Root / jailbreak exploitation detection
  • Identification of system takeover
  • Abnormal battery consumption detection
When detecting a threat, Pradeo Security Mobile Threat Defense immediately reports the device as non-compliant and takes appropriate protective measures.
A SOLUTION INTEGRATED WITH UEM PLATFORMS
The technology Pradeo Security is integrated with key UEM (Unified Endpoint Management) and EMM (Enterprise Mobility Management) solutions to ensure CISOs and security heads can manage mobility and security from a unified platform.
The first level of integration ensures an automatic update of application lists. The second level ensures a 360° protection of mobile devices and allows to track their compliance directly in the UEM platform.
USE CASE: A MAJOR LOGISTIC ORGANIZATION PROTECTS ITS MOBILE FLEET WITH PRADEO SECURITY
Since 2014, a major French postal organization protects its 100.000 corporate mobile devices with Pradeo Security Mobile Threat Defense.
BENEFITS OF PRADEO SECURITY MOBILE THREAT DEFENSE
FULL COVERAGE
In a recent research, the Pradeo Lab discovered that 77% of mobile threats come from applications, 14% from the device and 9% from the network. To fully ensure mobile device protection, Pradeo’s Mobile Threat Defense secures all of these entry points.
REAL-TIME DETECTION
Wi-Fi connection, application download, OS update… Smartphones and tablets statuses keep switching all day. Pradeo’s real-time device scanning performed from its on-device agent effectively ensures the protection of a mobile fleet.
ACCURACY
Most mobile threats do not have viral signatures like they used to. In order to detect and prevent zero-day attacks, Pradeo security precisely identifies actions performed on mobile devices. Then, to reduce false-positive alerts and ensure a smooth protection, it cross-analyzes all information.
CUSTOMIZATION
Security needs are specific to each organization and to be efficient, a security solution should entirely reflect those needs. Pradeo allows its administrators to entirely personalize their security policies so they can precisely protect the data they value the most.
PRIVACY LAW COMPLIANCE
At a time when data leakage is organizations’ number one threat, Pradeo enforces data privacy regulations’ compliance and strongly ensures corporate and personal data protection.
FLEXIBILITY
Implementing a new solution should never be a burden. Pradeo Security is autonomous, adaptable to all environments (Android, iOS, BYOD, COPE, etc.) and integrates with UEM leading solutions.
HOW TO SELECT A MOBILE THREAT DEFENSE SOLUTION?
When cyber attacks keep making the news and regulations require from organizations to take appropriate measures to secure information, mobile security is becoming a key stone in digital strategies.
This guide aims at addressing the core questions to be asked when setting up mobile security.