Mobile Threat Defense and MDM Integration
Key Points
- In today’s mobile‑centric world, personal and work data—including emails, documents, and banking info—are stored on smartphones, making them prime targets for attacks.
- Common mobile threats include phishing links, rogue Wi‑Fi networks, outdated operating systems, jailbroken devices, and malicious apps that can exfiltrate data.
- Mobile Threat Defense (MTD) acts as a proactive shield, detecting and blocking attacks while informing users about risks on their devices.
- Deploying MTD through Mobile Device Management (MDM) enables organizations to enforce policies, assign risk scores, and automatically trigger actions such as selective wipes or application restrictions when a threat is identified.
- Real‑world scenarios—like a tampered QR code redirecting to a malicious URL—demonstrate how MTD, combined with MDM policies, can block the threat and enforce remediation to keep corporate data secure.
Full Transcript
# Mobile Threat Defense and MDM Integration **Source:** [https://www.youtube.com/watch?v=he86NXufex8](https://www.youtube.com/watch?v=he86NXufex8) **Duration:** 00:03:39 ## Summary - In today’s mobile‑centric world, personal and work data—including emails, documents, and banking info—are stored on smartphones, making them prime targets for attacks. - Common mobile threats include phishing links, rogue Wi‑Fi networks, outdated operating systems, jailbroken devices, and malicious apps that can exfiltrate data. - Mobile Threat Defense (MTD) acts as a proactive shield, detecting and blocking attacks while informing users about risks on their devices. - Deploying MTD through Mobile Device Management (MDM) enables organizations to enforce policies, assign risk scores, and automatically trigger actions such as selective wipes or application restrictions when a threat is identified. - Real‑world scenarios—like a tampered QR code redirecting to a malicious URL—demonstrate how MTD, combined with MDM policies, can block the threat and enforce remediation to keep corporate data secure. ## Sections - [00:00:00](https://www.youtube.com/watch?v=he86NXufex8&t=0s) **Why Mobile Threat Defense Matters** - The speaker explains how our reliance on smartphones for personal and work tasks creates multiple security risks—phishing links, rogue Wi‑Fi, outdated OSes, jailbreaks, and malicious apps—making mobile threat defense essential for organizations. ## Full Transcript
hi my name is Colin I'm a technical
manager for Mass 360 in IBM product
today we'll be talking about mobile
threat defense and why it's important
for you and your
organizations we live in a mobile
Centric
world everything that we do is own our
mobile devices I imagine there's
probably one in your pocket right
now we do everything including our
emails our text messages we take
pictures on our phones even our banking
information is on there everything in
life is on our mobile devices in our
virtual and hybrid work environment even
now our work information is on here that
includes Enterprise apps documents
sensitive email and other information
that's specific for your
organization in this mobile Centric
World it also opens up our mobile
devices for attacks we probably all
received a URL takes you someplace where
maybe a package hasn't been delivered
and you don't remember ordering it
that's a fishing lake it's trying to get
information from you that looks legit
but it's really not or maybe you're at a
coffee shop and try to join a network
it's not actually the real Wi-Fi that's
a risky Network that could be manned by
a man in the middle attack trying to get
your information without you knowing it
other times our os's are out of touch
and we're behind a few versions that
also opens our mobile devices up for
attacks sometimes we get creative with
our devices and jailbreak them that also
opens up attacks
finally the apps sets on our
devices they can be gathering
information and sending them places into
companies countries even that shouldn't
have our information so how do we
remediate this how do we keep our mobile
devices safe that's where mobile threat
defense comes in it creates a shield
around our device it's proactively
looking for those attacks blocking the
attacks and making sure your user
understands what's happening on their
device and protecting it the question is
how do we make sure our users and
organizations keep MTD on their device
the answer MDM or mobile device
management this helps manage our
devices
apps docs and more the most important
thing here is the apps through an MDM we
can deploy an app and in this
case it's the MTD app through this we
can create p alyses
risk scores for those taxs and
compliance
rules these take actions when something
happens kind of then like an if then
kind of situation so let me give you a
real life example let's say you go to a
restaurant and want to
order the menu is on a QR code we've all
been there but somebody put a sticker
over that QR code taking you to a bad
URL mobile threat defense blcks that URL
because of our
policy and then with
compliance it takes an action that
action can be anything from a selective
wipe blocking corporate resources a
complete white or a new policy with
different applications to keep your
mobile device safe with MTD and MDM it
creates a robust secure environment for
your mobile devices
thanks if you enjoyed this video and
want to see more like it please like And
subscribe if you have any questions or
want to share your thoughts about this
topic please leave a comment below