datasheet

Trend Micro™ Mobile Security for Enterprises Gain visibility and control of mobile devices, applications, and data

With the explosion of in the workplace, employees have recognized and Protection points demanded support for a growing list of new ways to leverage this technology for their work. Supports smartphones Faced with the realities of dealing with an increasingly mobile workplace, organizations and tablets running: struggle to find the balance between empowering mobile employees so they can be more •• iOS productive, and protecting their sensitive information. Ideally, they would like to accomplish •• Android both without incurring the expense and time of deploying multiple new applications. •• Windows Phone

Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and Threat and Data Protection data through a single built-in console. It strikes the right balance between user productivity •• Antivirus and IT . •• Data enforcement Mobile Security includes: •• Password enforcement •• Remote lock and wipe 1. (MDM) •• Selective wipe 2. Mobile Application Management •• Mobile device management (MDM) 3. Mobile Application Reputation Services •• Mobile application management (MAM) 4. Device Antivirus (Android) •• Mobile Application Reputation Service A key part of an overall complete user protection strategy, Trend Micro Mobile Security •• Web reputation greatly reduces complexity and costs compared to standalone mobile security and MDM solutions that require new management infrastructures.

Unlike other solutions, Trend Micro Mobile Security integrates layers of data protection to secure your corporate data—no matter where it goes. Encryption enforcement, remote lock and wipe, password enforcement, and other tools work together with device security and app management to keep your data safe.

advantages

Lowers Cost and Complexity Improves Visibility and Control Balances with Enablement •• Streamlines management of mobile security, •• Enables IT to track, monitor, and manage •• Provides leading antivirus protection and MDM, app management, and data protection mobile devices, apps, and data through a ensures optimal device configurations to in a single solution single console reduce risk •• Simplifies deployment by leveraging the •• Provides data on the number, types, •• Protects corporate data with remote lock Trend Micro Cloud Communication Server, an and configuration of devices accessing and wipe, and selective wipe optional cloud-based service that automates corporate resources, whether they have •• Shields private data from unauthorized communications and reduces complexity enrolled or not access and improper use with password of deployment •• Enables centralized policy creation and and policy enforcement •• Lowers operational costs with centralized enforcement across single or multiple servers •• Allows IT to block the use of risky mobile visibility and control of all endpoint security •• Supports a complete user protection apps based on up-to-the-minute data •• Increases productivity and flexibility with strategy by integrating with the Trend Micro from the cloud-based Trend Micro Mobile broad platform support Control Manager console to centralize Application Reputation Service policy and management across other Trend Micro solutions such as OfficeScan™ endpoint protection

Page 1 of 4 • datasheet • mobile security for enterprises key features

Centralized Management Mobile Application Management Key Benefits •• Streamlines administration with Trend Micro •• Prevents the use of unauthorized, risky •• Balances employee enablement with Control Manager, providing central threat applications on network-connected devices IT control and DLP policy management across layers with application blacklisting and whitelisting •• Reduces deployment, IT and operational of the IT infrastructure •• Provides inventory management and costs by integrating MDM, mobile •• Provides a single view of enterprise users reporting for better visibility of apps used security, application management, from desktop to mobile device with views across devices, groups, and the company and data protection in a single solution of threats over time—helping to identify •• Enables IT to manage and even block •• Secures a wide range of devices with advanced threats that may target users specific types of apps based on categories antimalware, and intrusion with multiple vectors with new Category App Management detection system (IDS) powered by •• Achieves more consistent policy enforcement Trend Micro’s global threat intelligence •• Pushes applications to end-user devices with single-click deployment of data protection using the Corporate App Store functionality •• Protects data wherever it goes with policies across endpoint, messaging, and to accelerate the use of optional and/or encryption, remote lock and wipe, gateway solutions required business apps—with volume purchase and feature lock •• Streamlines device enrollment with a choice plans integrated into the •• Improves productivity by setting of a web link, a QR code, or iTunes download •• Identifies and blocks apps that pose a employees free to work anytime, •• Offers instant summary views of compliance, security or privacy risk by correlating anywhere from their choice of device inventory, protection, and health of all devices, installed app data against the Trend Micro whether enrolled or not Mobile Application Reputation Service •• Provides visibility into the number, types, •• Enables tracking, management, and and configuration of devices accessing deployment of Volume Purchase corporate resources Programs on iOS devices

Mobile Device Security Mobile Device Management Complete User Protection Trend Micro Mobile Security is part of •• Leverages Trend Micro’s leading malware •• Enables IT to remotely enroll, provision and protection, powered by cloud-based threat de-provision devices with corporate network Trend Micro Complete User Protection, intelligence from the Trend Micro Smart settings such as VPN, Exchange ActiveSync a multi-layer solution that provides the Protection Network™ and Wi-Fi® broadest range of interconnected threat and data protection across endpoints, •• Detects and blocks malicious applications •• Facilitates the deployment of Apple TV and and data files AirPrint services for iOS users and collaboration, web, and mobile devices. •• Blocks malicious web content and sites •• Supports device locate and inventory using Web Reputation Services management to secure and track company- and employee-owned devices, whether they •• Detects attacks on the device via network have enrolled or not USER LICENSING applications, ports, and services, using the Trend Micro Mobile Security is licensed firewall and IDS •• Allows cross-device and group policies for on a per user basis so a user can have consistent enforcement of security and •• Monitors, blocks, and logs calls, SMS, and multiple devices that only count as one management requirements MMS sent to and from devices based on license. Other mobile device management user policy •• Enables IT to control authorized devices and vendors license on a per device basis, which deploy relevant policies via the International burdens IT with inventory management Mobile Equipment Identity or IMEI, Wi-Fi, Data Protection and forecasting employee device and Mac address •• Protects corporate data with remote lock acquisition. •• Allows IT to restrict phone features such and wipe, selective wipe, or device locate as account modification, , AirDrop, in case of stolen or lost phone cellular data control, , pairing, •• Enforces, data encryption, and compliance Find My Friends, and more •• Notifies IT of jail broken or unencrypted devices •• Empowers IT to lock or permit mobile device features such as cameras, ®, /, and SD card readers •• Gives IT a view of devices that are not enrolled but are still accessing the corporate network •• Allows IT to deploy, manage, and configure Knox containers on Samsung Knox compatible devices

Page 2 of 4 • datasheet • mobile security for enterprises System Requirements and Support

Component Requirements Hardware •• 1 GHz Intel™ Pentium™ processor or equivalent •• At least 1 GB of RAM •• At least 400 MB of available disk space •• A monitor that supports 800x600 resolution at 256 colors or higher Platform •• Windows 2008 Server Family Mobile Security •• 2008 R2 Server Family Management Server •• Microsoft Windows 2012 Server Family •• Microsoft Windows 2012 R2 Server Family Recommended Platform •• Windows Server 2008 R2 Enterprise Edition •• Windows Server 2008 Enterprise Edition SP1 •• Windows Server 2008 Standard Edition •• Windows Web Server 2008 Edition SP1 Hardware •• 1 GHz Intel™ Pentium™ processor or equivalent •• At least 1 GB of RAM •• At least 40 MB of available disk space •• A monitor that supports 800x600 resolution at 256 colors or higher Platform •• Microsoft Windows 2008 Server Family Mobile Security •• Microsoft Windows 2008 R2 Server Family communication Server •• Microsoft Windows 2012 Server Family •• Microsoft Windows 2012 R2 Server Family Recommended Platform •• Windows Server 2008 R2 Enterprise Edition •• Windows Server 2008 Enterprise Edition SP1 •• Windows Server 2008 Standard Edition •• Windows Web Server 2008 Edition SP1 Hardware •• 1 GHz Intel™ Pentium™ processor or equivalent •• At least 1 GB of RAM •• At least 200 MB of available disk space

Mobile Security Other Exchange Connector •• Microsoft .Net FrameWork 3.5 SP1 Platform •• Windows 2008 R2 (64-bit) •• Windows 2012 (64-bit) •• Windows Server 2012 R2 (64-bit) SMS Sender •• Android 2.3 and above Web Server for local •• Microsoft Information Server (IIS) 6.0/7.0/7.5/8.0 Communication Server •• Microsoft Internet Information Server (IIS) 6.0/7.0/7.5/8.0 Web Server for Note: When using IIS 7.0 or above for Management Server, keep the default settings, Management Server and enable and install CGI and ISAPI Extensions in Application Development, HTTP Redirection in Common HTTP Features, and IIS6 management compatibility in Management Tools.

Page 3 of 4 • datasheet • mobile security for enterprises System Requirements and Support (continues)

Component Requirements •• Microsoft SQL Server 2005/2008/2008 R2/2012/2008 Express/ SQL Server 2008 R2 Express/2012 Express •• iOS 4.3 ~iOS 8.2 •• 3 MB storage minimum iOS Mobile Devices •• 4 MB memory recommended •• Internet Connection •• Android 2.3 ~Android 5.1 •• 8 MB storage minimum Android Mobile Devices •• 10 MB memory

•• Internet connection

•• Windows Phone 8.0 Windows PhoneDevice •• Windows Phone 8.1 ”

For our customers, mobile device management is a major requirement within many bigger opportunities. Trend Micro Mobile Security enables a device security service that is flexible and stable—this is core to our philosophy. Plus, it makes it easy.

Timothy Maliyil ” Founder and CEO, AlertBoot

Securing Your Journey to the Cloud

©2015 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS10_TMMS_150415US]

Page 4 of 4 • datasheet • mobile security for enterprises