Endpoint Security for EMMS
Manage and help protect your data on compatible mobile devices
Telstra Endpoint Security solutions deliver mobile-specific security outcomes using a ‘mobile-first’ approach to endpoint security. They are designed to work in conjunction with the MDM platform to help protect against the key threat vectors affecting smart devices (including app, device and network), offering enterprises a way to help secure the devices that employees use for both business and personal use.
Jamf Mobile Security
Jamf solutions are designed to help secure mobile devices against cyber threats and enable enterprise IT to apply policy to manage employee usage-based risks. These capabilities are available through three core services: Jamf Threat Defense, Jamf Data Policy and Jamf Private Access.
Jamf Threat Defense
Jamf Threat Defense helps protect against threats to remote user devices, such as malware, rogue or insecure applications, phishing, cryptojacking, data exfiltration and network attacks. Jamf Threat Defense aims to detect threats at the endpoint via the Jamf Trust endpoint application, and can be prevented in the network via Jamf Cloud. As well as helping protect against threats, Jamf helps organisations detect vulnerabilities, flagging potential risks such as outdated OS versions or risky configuration settings. The solution is designed to integrate with leading UEM and SIEM offerings.
Jamf Data Policy
Jamf Data Policy provides web content filtering across all remote user traffic (both cellular and Wi-Fi) and data management features like tethering control, data capping and compression. The solution is easy to deploy, featuring the installation of an endpoint application and remote user traffic routing via the Jamf Cloud. The solution integrates seamlessly with both Jamf management solutions and other leading UEM solutions to further simplify deployment and enable synchronised device lifecycle management. Jamf Data Policy is also available on Windows 10 devices via installation of a tamper-proof client.
Jamf Private Access
Jamf Private Access provides secure remote access to applications using Zero Trust Network Access (ZTNA) principles. The solution integrates seamlessly with IdP solutions such as MSFT AAD, Okta and Ping Identity for modern authentication. Jamf Private Access supports public, private cloud, SaaS and on-prem tunnelling and access can be configured using identity, risk and other context-based policies.
Jamf Threat Defence Features
Advanced machine learning
Helps to identify and prevent threats using advanced machine learning and threat intelligence engine MI:RIAM.
With multiple UEM and SIEM partnerships — plus the Jamf risk API — maximize existing security investments and take advantage of threat insights.
Helps block zero-day threats like phishing sites and malicious domains in real time and before your devices are impacted.
Helps safeguard online privacy with encryption and protection against personal data phishing. Helps ensure regulatory compliance with advanced privacy features.
Receive real-time insight into risks and configure automated policy actions through the intuitive management portal.
Any device and ownership model
Compatible with all devices and ownership models, whether BYOD, COPE or COBO, empowering users with their preferred model in a way that protects the business.
Lookout mobile endpoint security
Lookout modern endpoint protection is powered by the world's largest mobile security dataset. Security telemetry from nearly 200M mobile devices worldwide, over 120M mobile apps provides your smartphones, tablets, and Chromebooks with the best AI-backed mobile security. In addition, Lookout ingests about 90K new apps every day to ensure its customers are covered by the most up-to-date intel on the market.
Lookout has been a mobile-only security company since its inception, and in that time has amassed the industry’s largest mobile dataset of almost 200M devices and over 120M apps that contribute to its leading modern endpoint protection platform.
Continuous Conditional Access
Dynamically monitor the health of the user’s device whenever it’s connected to corporate resources to ensure no malware is introduced to your corporate infrastructure.
Visibility into mobile incidents
Get real-time visibility into incidents on mobile devices, so you can respond quickly and effectively.
Privacy by design
Ensure your data sovereignty and employee privacy policies are upheld using our privacy controls features.
Measurable reduction of risk
Close a large security gap and measure your risk reduction with Lookout’s analysis and reporting features.
Securely enable mobility
Embrace more flexible mobility programs, including BYOD, to increase employee productivity and stay competitive.
Easy to deploy and maintain
We integrate with any EMM (such as VMware Workspace ONE® UEM, Microsoft Intune, BlackBerry® UEM, IBM MaaS360®, and MobileIron) for simple deployment and management.
Lookout integrates with all SIEM systems via our Mobile Risk API, including Splunk, Windows Defender ATP, Micro Focus, ArcSight, IBM Security and Qradar.
Zimperium mobile security
zIPS is a mobile endpoint security application that aims to provide real-time monitoring and protection of the mobile device behaviour against threats detected across the device, network interceptions, phishing and malicious and leaky applications. Mobile operating systems are designed differently to desktop/laptop, where traditional security tools may not work effectively.
Zimperium zIPS leverages patented on-device machine learning technology, acting as an intelligent alarm system on an organisation’s mobile devices with little impact on users’ privacy. When a threat is detected, the user can be alerted with the recommended action. Alternatively, Telstra can configure compliance policy (supports integration with UEM solutions) to take automated action, e.g. remove user's access to email and corporate systems to protect data leakage and threat impacting the organisation.
zConsole is the cloud-based Console which is used to manage the deployment of mobile security, understand devices' risk posture, help maintain security, maintain threat policy, provide real-time visibility into the threat events, dashboarding and reporting. The Console can be hosted both in the public cloud as well as on-premise for specific customers if required.
z3A is used for advanced app analysis, continuously monitoring and evaluating mobile applications across the device fleet. For each risky mobile app that is identified, the solution provides deep intelligence, including contextual analysis, as well as privacy and security ratings. Z3A also allows organisations to submit apps for security analysis, providing a comprehensive security report detailing the risk profile of the app.