top of page

Better MTD Overview

  • Writer: Better Mobile Security Inc.
    Better Mobile Security Inc.
  • Nov 25, 2020
  • 3 min read

Updated: Dec 8, 2020

Better Mobile is a simple solution that turns mobile devices' protection effortless and reduces the frustration associated with it. It offers a complete mobile endpoint security solution that is Secure, Simple, and Powerful. Protects end-user privacy as well as corporate resources from logical threats. To allow organizations to enforce risk-based conditional access on mobile devices, the tool enables visibility into phishing, apps, networks, and device integrity risks.


Why should Enterprises choose Better Mobile?


  • Better Mobile offers accurate ML-based real-time, on-device detection

  • A complete on-prem solution

  • Customize the solution as per customer needs.

  • Proven Effective Solution & Delivers as promised

  • Integrate with a homegrown solution or existing UEBA tools to create a user risk posture

  • Integrate/merge customer threat intelligence with Better Mobile intelligence – through API to detect targeted attacks (Spear Phishing)

  • Strong vendor support and willingness to partner with a customer

  • Offer advanced solutions like Advance MTD, iOS DFIR, eDiscovery, and Forensic Module

  • Better Mobile grants access to their IP, ML threat models to collaborate with customers

    • Deployment options (Customer Azure Tenant Managed Security Service Provider, Customer Data Center)

Use Cases addressed by Better Mobile Threat Defense


Use Case 1 Device-level Protection, MTD tools monitor system parameters, configuration, firmware, and libraries to identify suspicious or malicious activity.

Use Case 2 Network level Protection, MTD tools monitor network traffic and disable suspicious connections to and from mobile devices.


Use Case 3 App-level Protection, MTD tools identify "leaky" apps (meaning apps that can put enterprise data at risk) and malicious apps through reputation scanning and code analysis.


Use Case 4 OS Vulnerabilities and Patch, MTD provides deep visibility into the OS vulnerabilities including CVE number and CWE information; also includes patch level details

Use Case 5 Mobile Phishing, MTD tools detect malicious URLs & IP address entering mobile devices via various mobile communication channels such as SMS, Social Media, etc...


*Use Case 6 Mobile App Reputation Services, Public and Enterprise apps. Includes Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), and Manual Application Security Testing (MAST).

(*) - sold separately as optional services


Key Features of Better Mobile Threat Defense


Protect mobile devices (iOS/Android) from logical threats such as:

  • Application Scan/Risk

  • Behavioral Anomaly

  • Network Protection

  • Device Vulnerability

  • OS Kernel Level Attack

  • OS vulnerability with the CVE ID

  • Android Patch details

  • Mobile Phishing/SMiShing Protection

  • Integration with leading MDM's, SIEM, SAML2.0, Ticketing System Solutions

  • Remediation via Better MTD Console or MDM provided

Better Mobile Threats Detection category


App-Based Threat Protection

  • Malware (Rootkits, Spyware, Ransomware)

  • Repackaged Apps

  • Third-Party Apps

  • Blacklist/Whitelist Apps


Network-Based Threat Protection

  • Man-in-the-Middle Attack

  • SSL Strip

  • Rouge Wi-Fi

  • Pineapple based Attack

  • Port Scanning

  • Content Manipulation

  • Fake Corporate Wi-Fi

  • Unsecured Network


Device-Based Protection

  • Advanced jailbreak/root detection

  • Operating system vulnerabilities

  • Risky Device Configurations (Device Passcode, Device Encryption, Developer Options, USB Debugging)

  • Malicious profiles

  • Malicious or Fake certificates (Unknown Sources, Unknown SSL Certificates)


Web & Content-Based Threat Protection

  • Phishing attacks from any channel

  • Malicious URLs to risky websites


User Onboarding / Experience

  • User-Friendly installation via MDM or Better Mobile Console

  • Automatic Activation

  • Custom policies to define the end-user experience

  • Provides a step-for-step instruction for the user to mitigate detected threats

  • Interrupts/blocks installation of apps which are not accepted by admin's app policy


Management and Support

  • EMM Integration (VMware Workspace ONE UEM, Microsoft Intune, Blackberry® UEM, Citrix and MobileIron)

  • SIEM Integration via Mobile Risk API (Splunk, Windows Defender ATP, Azure Sentinel Syslog, and QRadar)

  • Role-Based Access Control

  • Multifactor Integration via SAML (Azure Active Directory, Ping, and others)

  • Data Privacy Controls


Better Mobile Threat Defense Product Architecture


There are two components

  1. Device Component

  2. Server or Backend Component


ree

What Information Better Mobile Collects from Mobile Devices?



What information is stored on Better Mobile Server from mobile devices?



 
 
 

Comentarios


better_logo.png

Request a demo and see how BETTER Mobile Threat Defense can help your organization

Google Playstore.png
Apple Store.png

Copyright © 2020 BETTER Mobile Security, Inc. All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
bottom of page