Better MTD Overview
- Better Mobile Security Inc.
- Nov 25, 2020
- 3 min read
Updated: Dec 8, 2020
Better Mobile is a simple solution that turns mobile devices' protection effortless and reduces the frustration associated with it. It offers a complete mobile endpoint security solution that is Secure, Simple, and Powerful. Protects end-user privacy as well as corporate resources from logical threats. To allow organizations to enforce risk-based conditional access on mobile devices, the tool enables visibility into phishing, apps, networks, and device integrity risks.
Why should Enterprises choose Better Mobile?
Better Mobile offers accurate ML-based real-time, on-device detection
A complete on-prem solution
Customize the solution as per customer needs.
Proven Effective Solution & Delivers as promised
Integrate with a homegrown solution or existing UEBA tools to create a user risk posture
Integrate/merge customer threat intelligence with Better Mobile intelligence – through API to detect targeted attacks (Spear Phishing)
Strong vendor support and willingness to partner with a customer
Offer advanced solutions like Advance MTD, iOS DFIR, eDiscovery, and Forensic Module
Better Mobile grants access to their IP, ML threat models to collaborate with customers
Deployment options (Customer Azure Tenant Managed Security Service Provider, Customer Data Center)
Use Cases addressed by Better Mobile Threat Defense
Use Case 1 Device-level Protection, MTD tools monitor system parameters, configuration, firmware, and libraries to identify suspicious or malicious activity.
Use Case 2 Network level Protection, MTD tools monitor network traffic and disable suspicious connections to and from mobile devices.
Use Case 3 App-level Protection, MTD tools identify "leaky" apps (meaning apps that can put enterprise data at risk) and malicious apps through reputation scanning and code analysis.
Use Case 4 OS Vulnerabilities and Patch, MTD provides deep visibility into the OS vulnerabilities including CVE number and CWE information; also includes patch level details
Use Case 5 Mobile Phishing, MTD tools detect malicious URLs & IP address entering mobile devices via various mobile communication channels such as SMS, Social Media, etc...
*Use Case 6 Mobile App Reputation Services, Public and Enterprise apps. Includes Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), and Manual Application Security Testing (MAST).
(*) - sold separately as optional services
Key Features of Better Mobile Threat Defense
Protect mobile devices (iOS/Android) from logical threats such as:
Application Scan/Risk
Behavioral Anomaly
Network Protection
Device Vulnerability
OS Kernel Level Attack
OS vulnerability with the CVE ID
Android Patch details
Mobile Phishing/SMiShing Protection
Integration with leading MDM's, SIEM, SAML2.0, Ticketing System Solutions
Remediation via Better MTD Console or MDM provided
Better Mobile Threats Detection category
App-Based Threat Protection
Malware (Rootkits, Spyware, Ransomware)
Repackaged Apps
Third-Party Apps
Blacklist/Whitelist Apps
Network-Based Threat Protection
Man-in-the-Middle Attack
SSL Strip
Rouge Wi-Fi
Pineapple based Attack
Port Scanning
Content Manipulation
Fake Corporate Wi-Fi
Unsecured Network
Device-Based Protection
Advanced jailbreak/root detection
Operating system vulnerabilities
Risky Device Configurations (Device Passcode, Device Encryption, Developer Options, USB Debugging)
Malicious profiles
Malicious or Fake certificates (Unknown Sources, Unknown SSL Certificates)
Web & Content-Based Threat Protection
Phishing attacks from any channel
Malicious URLs to risky websites
User Onboarding / Experience
User-Friendly installation via MDM or Better Mobile Console
Automatic Activation
Custom policies to define the end-user experience
Provides a step-for-step instruction for the user to mitigate detected threats
Interrupts/blocks installation of apps which are not accepted by admin's app policy
Management and Support
EMM Integration (VMware Workspace ONE UEM, Microsoft Intune, Blackberry® UEM, Citrix and MobileIron)
SIEM Integration via Mobile Risk API (Splunk, Windows Defender ATP, Azure Sentinel Syslog, and QRadar)
Role-Based Access Control
Multifactor Integration via SAML (Azure Active Directory, Ping, and others)
Data Privacy Controls
Better Mobile Threat Defense Product Architecture
There are two components
Device Component
Server or Backend Component

Comentarios