Learning Library

← Back to Library

Mobile Threat Defense and MDM Integration

Key Points

  • In today’s mobile‑centric world, personal and work data—including emails, documents, and banking info—are stored on smartphones, making them prime targets for attacks.
  • Common mobile threats include phishing links, rogue Wi‑Fi networks, outdated operating systems, jailbroken devices, and malicious apps that can exfiltrate data.
  • Mobile Threat Defense (MTD) acts as a proactive shield, detecting and blocking attacks while informing users about risks on their devices.
  • Deploying MTD through Mobile Device Management (MDM) enables organizations to enforce policies, assign risk scores, and automatically trigger actions such as selective wipes or application restrictions when a threat is identified.
  • Real‑world scenarios—like a tampered QR code redirecting to a malicious URL—demonstrate how MTD, combined with MDM policies, can block the threat and enforce remediation to keep corporate data secure.

Full Transcript

# Mobile Threat Defense and MDM Integration **Source:** [https://www.youtube.com/watch?v=he86NXufex8](https://www.youtube.com/watch?v=he86NXufex8) **Duration:** 00:03:39 ## Summary - In today’s mobile‑centric world, personal and work data—including emails, documents, and banking info—are stored on smartphones, making them prime targets for attacks. - Common mobile threats include phishing links, rogue Wi‑Fi networks, outdated operating systems, jailbroken devices, and malicious apps that can exfiltrate data. - Mobile Threat Defense (MTD) acts as a proactive shield, detecting and blocking attacks while informing users about risks on their devices. - Deploying MTD through Mobile Device Management (MDM) enables organizations to enforce policies, assign risk scores, and automatically trigger actions such as selective wipes or application restrictions when a threat is identified. - Real‑world scenarios—like a tampered QR code redirecting to a malicious URL—demonstrate how MTD, combined with MDM policies, can block the threat and enforce remediation to keep corporate data secure. ## Sections - [00:00:00](https://www.youtube.com/watch?v=he86NXufex8&t=0s) **Why Mobile Threat Defense Matters** - The speaker explains how our reliance on smartphones for personal and work tasks creates multiple security risks—phishing links, rogue Wi‑Fi, outdated OSes, jailbreaks, and malicious apps—making mobile threat defense essential for organizations. ## Full Transcript
0:00hi my name is Colin I'm a technical 0:02manager for Mass 360 in IBM product 0:05today we'll be talking about mobile 0:06threat defense and why it's important 0:08for you and your 0:10organizations we live in a mobile 0:13Centric 0:14world everything that we do is own our 0:17mobile devices I imagine there's 0:19probably one in your pocket right 0:21now we do everything including our 0:24emails our text messages we take 0:27pictures on our phones even our banking 0:29information is on there everything in 0:31life is on our mobile devices in our 0:35virtual and hybrid work environment even 0:37now our work information is on here that 0:40includes Enterprise apps documents 0:42sensitive email and other information 0:44that's specific for your 0:46organization in this mobile Centric 0:48World it also opens up our mobile 0:50devices for attacks we probably all 0:53received a URL takes you someplace where 0:56maybe a package hasn't been delivered 0:58and you don't remember ordering it 0:59that's a fishing lake it's trying to get 1:01information from you that looks legit 1:03but it's really not or maybe you're at a 1:05coffee shop and try to join a network 1:08it's not actually the real Wi-Fi that's 1:10a risky Network that could be manned by 1:12a man in the middle attack trying to get 1:14your information without you knowing it 1:16other times our os's are out of touch 1:19and we're behind a few versions that 1:21also opens our mobile devices up for 1:23attacks sometimes we get creative with 1:25our devices and jailbreak them that also 1:28opens up attacks 1:30finally the apps sets on our 1:33devices they can be gathering 1:34information and sending them places into 1:37companies countries even that shouldn't 1:39have our information so how do we 1:42remediate this how do we keep our mobile 1:44devices safe that's where mobile threat 1:46defense comes in it creates a shield 1:49around our device it's proactively 1:51looking for those attacks blocking the 1:53attacks and making sure your user 1:55understands what's happening on their 1:56device and protecting it the question is 1:59how do we make sure our users and 2:01organizations keep MTD on their device 2:04the answer MDM or mobile device 2:08management this helps manage our 2:11devices 2:13apps docs and more the most important 2:17thing here is the apps through an MDM we 2:20can deploy an app and in this 2:23case it's the MTD app through this we 2:26can create p alyses 2:30risk scores for those taxs and 2:35compliance 2:38rules these take actions when something 2:41happens kind of then like an if then 2:43kind of situation so let me give you a 2:45real life example let's say you go to a 2:47restaurant and want to 2:48order the menu is on a QR code we've all 2:52been there but somebody put a sticker 2:54over that QR code taking you to a bad 2:58URL mobile threat defense blcks that URL 3:02because of our 3:04policy and then with 3:08compliance it takes an action that 3:11action can be anything from a selective 3:13wipe blocking corporate resources a 3:15complete white or a new policy with 3:18different applications to keep your 3:19mobile device safe with MTD and MDM it 3:23creates a robust secure environment for 3:25your mobile devices 3:27thanks if you enjoyed this video and 3:29want to see more like it please like And 3:31subscribe if you have any questions or 3:33want to share your thoughts about this 3:35topic please leave a comment below