Endpoint Security for EMMS

Manage and help protect your data on compatible mobile devices

As connected mobile devices have become a primary productivity tool in the enterprise, mobile enterprise security has evolved past the theory of perimeter security.

Telstra Endpoint Security solutions deliver mobile-specific security outcomes using a ‘mobile-first’ approach to endpoint security. They are designed to work in conjunction with the MDM platform to help protect against the key threat vectors affecting smart devices (including app, device and network), offering enterprises a way to help secure the devices that employees use for both business and personal use.

Jamf Mobile Security

jamf logo

Jamf solutions are designed to help secure mobile devices against cyber threats and enable enterprise IT to apply policy to manage employee usage-based risks. These capabilities are available through three core services: Jamf Threat Defense, Jamf Data Policy and Jamf Private Access.

Jamf Threat Defense

Jamf Threat Defense helps protect against threats to remote user devices, such as malware, rogue or insecure applications, phishing, cryptojacking, data exfiltration and network attacks. Jamf Threat Defense aims to detect threats at the endpoint via the Jamf Trust endpoint application, and can be prevented in the network via Jamf Cloud. As well as helping protect against threats, Jamf helps organisations detect vulnerabilities, flagging potential risks such as outdated OS versions or risky configuration settings. The solution is designed to integrate with leading UEM and SIEM offerings.

Jamf Data Policy

Jamf Data Policy provides web content filtering across all remote user traffic (both cellular and Wi-Fi) and data management features like tethering control, data capping and compression. The solution is easy to deploy, featuring the installation of an endpoint application and remote user traffic routing via the Jamf Cloud. The solution integrates seamlessly with both Jamf management solutions and other leading UEM solutions to further simplify deployment and enable synchronised device lifecycle management. Jamf Data Policy is also available on Windows 10 devices via installation of a tamper-proof client.

Jamf Private Access

Jamf Private Access provides secure remote access to applications using Zero Trust Network Access (ZTNA) principles. The solution integrates seamlessly with IdP solutions such as MSFT AAD, Okta and Ping Identity for modern authentication. Jamf Private Access supports public, private cloud, SaaS and on-prem tunnelling and access can be configured using identity, risk and other context-based policies.

Jamf Threat Defence Features

Advanced machine learning

Helps to identify and prevent threats using advanced machine learning and threat intelligence engine MI:RIAM.

Unrivaled integrations

With multiple UEM and SIEM partnerships — plus the Jamf risk API — maximize existing security investments and take advantage of threat insights.

In-network protection

Helps block zero-day threats like phishing sites and malicious domains in real time and before your devices are impacted.

User privacy

Helps safeguard online privacy with encryption and protection against personal data phishing. Helps ensure regulatory compliance with advanced privacy features.

Real-time insights

Receive real-time insight into risks and configure automated policy actions through the intuitive management portal.

Any device and ownership model

Compatible with all devices and ownership models, whether BYOD, COPE or COBO, empowering users with their preferred model in a way that protects the business.

Lookout mobile endpoint security

Lookout modern endpoint protection is powered by the world's largest mobile security dataset. Security telemetry from nearly 200M mobile devices worldwide, over 120M mobile apps provides your smartphones, tablets, and Chromebooks with the best AI-backed mobile security. In addition, Lookout ingests about 90K new apps every day to ensure its customers are covered by the most up-to-date intel on the market.

Key Features

Lookout logo

Lookout has been a mobile-only security company since its inception, and in that time has amassed the industry’s largest mobile dataset of almost 200M devices and over 120M apps that contribute to its leading modern endpoint protection platform.

Continuous Conditional Access

Dynamically monitor the health of the user’s device whenever it’s connected to corporate resources to ensure no malware is introduced to your corporate infrastructure.

Visibility into mobile incidents

Get real-time visibility into incidents on mobile devices, so you can respond quickly and effectively.

Privacy by design

Ensure your data sovereignty and employee privacy policies are upheld using our privacy controls features.

Measurable reduction of risk

Close a large security gap and measure your risk reduction with Lookout’s analysis and reporting features.

Securely enable mobility

Embrace more flexible mobility programs, including BYOD, to increase employee productivity and stay competitive.

Easy to deploy and maintain

We integrate with any EMM (such as VMware Workspace ONE® UEM, Microsoft Intune, BlackBerry® UEM, IBM MaaS360®, and MobileIron) for simple deployment and management.

Seamless interoperability

Lookout integrates with all SIEM systems via our Mobile Risk API, including Splunk, Windows Defender ATP, Micro Focus, ArcSight, IBM Security and Qradar.

Zimperium mobile security

Zimperium logo

zIPS is a mobile endpoint security application that aims to provide real-time monitoring and protection of the mobile device behaviour against threats detected across the device, network interceptions, phishing and malicious and leaky applications. Mobile operating systems are designed differently to desktop/laptop, where traditional security tools may not work effectively.

zIPS logo

zIPS

Zimperium zIPS leverages patented on-device machine learning technology, acting as an intelligent alarm system on an organisation’s mobile devices with little impact on users’ privacy. When a threat is detected, the user can be alerted with the recommended action. Alternatively, Telstra can configure compliance policy (supports integration with UEM solutions) to take automated action, e.g. remove user's access to email and corporate systems to protect data leakage and threat impacting the organisation.

zConsole logo

zConsole

zConsole is the cloud-based Console which is used to manage the deployment of mobile security, understand devices' risk posture, help maintain security, maintain threat policy, provide real-time visibility into the threat events, dashboarding and reporting. The Console can be hosted both in the public cloud as well as on-premise for specific customers if required.

z3A logo

z3A

z3A is used for advanced app analysis, continuously monitoring and evaluating mobile applications across the device fleet. For each risky mobile app that is identified, the solution provides deep intelligence, including contextual analysis, as well as privacy and security ratings. Z3A also allows organisations to submit apps for security analysis, providing a comprehensive security report detailing the risk profile of the app.

Getting started

Register here with our Enterprise Mobility managed services.