Trend Micro™ for Enterprises Gain visibility and control over mobile devices, applications, and data

Companies that allow bring-your-own-device (BYOD) can boost productivity, PROTECTION POINTS and reduce overall IT and support costs—but there are risks involved. To reap Supports and tablets running: the advantages of BYOD, you need mobile security that can protect the wide • iOS range of mobile devices and applications, in addition to protection against • Android threats and corporate data loss. • Blackberry Trend Micro Mobile Security is a power-packed 4-in-1 solution that provides • Windows Mobile full visibility and control of mobile devices, apps, and data. As a plug-in for • Symbian Trend Micro™ OfficeScan™, our extensible endpoint security framework, Mobile THREAT AND DATA PROTECTION Security extends end-user protection beyond servers and PCs to tablets, smartphones, and mobile apps. Moreover, with centralized management • Antivirus through the OfficeScan console, it greatly reduces complexity and costs • Data encryption compared to standalone mobile security and MDM solutions that require new • Data loss prevention (DLP) management infrastructures. • Password enforcement • Remote lock and wipe Unlike other solutions, Trend Micro Mobile Security integrates layers of data • Selective wipe protection to secure your corporate data—no matter where it goes. Encryption, • management (MDM) DLP, remote lock and wipe, password enforcement, and other tools work • Mobile application management together with device security and app management to keep your data safe.

As a 4-in-1 solution, Mobile Security includes: • Mobile Device Management (MDM) • Mobile Device Security • Mobile Application Management • Data Protection

ADVANTAGES

Lowers cost and complexity Improves visibility and control Minimizes risk • Streamlines management • Enables IT to track, monitor and • Provides leading antivirus of mobile security, MDM, manage mobile devices, apps and protection and ensures optimal app management, and data data through a single console device configurations to reduce protection in a single solution • Provides data on the number, malware risk • Simplifies deployment as an types, and configuration of devices • Protects corporate data with OfficeScan plug-in, eliminating accessing corporate resources endpoint encryption, Data Loss the need for standalone mobile • Gives administrators the power to Prevention (DLP), remote lock security and MDM solutions set and enforce polices for better and wipe, and selective wipe that require new management control of employee devices • Shields private data from infrastructures • Supports a holistic endpoint unauthorized access and • Lowers operational costs with security strategy built on the improper use with password and centralized visibility and control OfficeScan plug-in architecture policy enforcement of all endpoint security • Allows IT to block use of risky • Increases productivity and flexibility mobile apps with broad platform support

Page 1 of 3 • DATASHEET • MOBILE SECURITY FOR ENTERPRISES KEY FEATURES Centralized Management Mobile Application Management KEY BENEFITS • Streamlines administration with • Prevents the use of • Provides visibility and control over a proven and scalable central company and employee-owned unauthorized, risky applications mobile devices, apps and data management framework built on on network-connected devices • Reduces deployment, IT and the OfficeScan™ platform with application blacklisting operational costs by integrating • Simplifies device enrollment with • Fosters end-user productivity MDM, mobile security, application a web link that takes end-users management, and data protection in with application whitelisting, a single solution to a quick sign-up process granting permission to use • Allows you to save on MDM costs • Offers instant summary views of approved applications via integration with the OfficeScan compliant, inventory, protection, • Pushes applications to end-users management infrastructure and health of devices to accelerate the use of optional • Secures the wide range of devices • Provides with critical visibility and/or required business apps with leading anti-malware, firewall and IDS powered by global threat into the number, types, and • Provides inventory management intelligence configuration of devices accessing and reporting for better visibility • Protects data wherever it goes with corporate resources of apps used across devices, encryption, DLP, remote lock and groups, and the company wipe, and feature lock Mobile Device Security • Improves productivity by setting • Leverages industry-leading Mobile Device Management employees free to work anytime, malware protection, powered by • Enables IT to remotely enroll, anywhere from their choice of device cloud-based threat intelligence provision and de-provision from Trend Micro™ Smart devices with corporate network Protection Network™ settings, such as VPN, Exchange IOS APP BOOSTS SECURITY • Detects and blocks malicious ActiveSync and Wi-Fi® • Improves visibility and control over iOS devices with a new applications and data files • Supports device locate and iOS app for Trend Micro™ • Blocks malicious web content and inventory management to Mobile Security sites using Web Reputation Services secure and track company- and • Notifies IT of security compliance violations on • Detects attacks on the device via employee-owned devices devices with the iOS client network applications, ports and • Allows cross-device and installed services using the firewall and IDS group policies for consistent • Detects jailbroken iOS devices enforcement of security and • Provides critical visibility into • Monitors, blocks, and logs calls, devices and status, including SMS and MMS sent to and from management requirements encryption and password • Enables IT to control authorized configuration for iPads and devices based on user policy iPhones devices and deploy relevant • Enables IT administrators to Data Protection policies via the International take proactive control and • Protects corporate data with Mobile Equipment Identity (IMEI), reduce the cost of support remote lock and wipe, selective Wi-Fi, and Mac address wipe, or device locate in case of stolen or lost phone • Enforces data loss prevention (DLP) policies, data encryption, and compliance • Notifies IT of jail broken or unencrypted devices • Empowers IT to lock or permit mobile device features, such as cameras, Bluetooth®, and SD card readers

Page 2 of 3 • DATASHEET • MOBILE SECURITY FOR ENTERPRISES IMUM SYSTEM REQUIREMENTS ” MINIMUM SYSTEM REQUIREMENTS COMPONENT REQUIREMENTS Management Server OfficeScan server 10.5/ 10.0 SP1/ 10.0 with Plug-in Manager 1.0 (build 3163) For our customers, mobile device management is a OfficeScan server 10.6/ 10.5 with Plug-in Manager 2.0 (build 1188) major requirement within many bigger opportunities. Communication Server Server Platform Trend Micro Mobile • Windows 2008 Server Family Security enables a device • Windows 2008 R2 Server Family security service that is Recommended Server Platform flexible and stable—this is core to our philosophy. • Windows Server 2008 R2 Enterprise Edition Plus, it makes it easy. • Windows Server 2008 Enterprise Edition Web Server Timothy Maliyil Microsoft Internet Information Server (IIS) 6.0/7.0/7.5 Founder & CEO ” Hardware AlertBoot • 1-GHz Intel™ Pentium™ processor or equivalent • At least 1-GB of RAM • At least 40-MB of available disk space • A monitor with 800 x 600 resolution at 256 color SMS Sender • Windows Mobile 5 Pocket PC Phone • Windows Mobile 5 • Windows Mobile 6 Standard • Windows Mobile 6 Professional SQL Server • Microsoft SQL Server 2005 Workgroup/ Express Edition • Microsoft SQL Server 2008 Enterprise/ Standard/ Express Edition • Microsoft SQL Server 2008 R2 Enterprise/ Standard/ Express Edition Web Browser for Admin Console Internet Explorer 7.0+ Mobile Client Platform • Android 2.1 - 4.0 • iOS 4 – 6.0 ©2012 by Trend Micro, Incorporated. All rights reserved. Trend • BB that Blackberry Enterprise 5.0+ supports Micro, the Trend Micro t-ball logo and OfficeScan are trademarks or • Symbian S60 3rd, 5th registered trademarks of Trend Micro, Incorporated. All other product • Windows Mobile 5 - 6.5 or com¬pany names may be trademarks or registered trademarks of their owners. [DS07_TMMS8SP1_121108] www.trendmicro.com

Page 3 of 3 • DATASHEET • MOBILE SECURITY FOR ENTERPRISES