Let us help you get started

Maxis Secure Mobile

 


Why should I subscribe to Maxis Secure Mobile?
Mobile devices are now frequently used to share files among employees, gain access to corporate data, and run business operations with corporate apps. The need for anytime, anywhere access to corporate infrastructure presents a security risk because targeted attacks initiated onto mobile devices are much harder to detect. Confidential company information residing on mobile devices can also be infiltrated easily by hackers if it does not have any form of protection. 

In today’s increasingly complex mobile landscape, companies need Secure Mobile which is based on the Mobile Threat Defense (MTD) solution to better manage cyber risks. It provides continuous detection and mitigation on malicious activities that happen on mobile devices, thus preventing attacks before they cause any further damage to you and your company.

 

Why do I need a comprehensive protection for mobile devices?
A mobile device is the window to the personal and corporate data & network as most of your employees have: 

  • Private and sensitive data such as emails, apps, photos, contacts and messages on their devices.
  • Access to your company's email, intranet, customer database, and sensitive documents on their devices.

Also, hackers can compromise a company network or data centre through a mobile device.

 

What are the mobile security threats that Maxis Secure Mobile can protect against?
Network Threats - Rogue Wi-Fi and man-in-the-middle attacks.
Device Threats - 
OS Exploits and malicious profiles.
App Threats - Malware and leaky apps.
Phishing Threats - Fraudulent attempts to obtain sensitive information especially usernames & passwords    

 

What are the possible implications of not having the right mobile protection?

  • Corporate espionage.
  • Leakage of company and customer information.
  • Breach of company network.
  • Damage to brand and reputation.

 

Is Maxis Secure Mobile suitable for BYOD (Bring Your Own Device)?
Yes, Maxis Secure Mobile does not intrude into staff privacy nor impact the user experience. This solution only provides visibility on mobile vulnerabilities, threats, and risk assessment.

 

Why should I subscribe to the solution from Maxis?
We offer professional services to help customers on-board the solution and fine-tune the necessary configurations. We also provide 24x7 helpdesk support and serve as your single point of contact to resolve any support requests and service issues.

Additionally, we provide integration services to leading Enterprise Mobility Management (EMM) solutions, either to Microsoft Intune and VMware Workspace One, or to other solutions like MobileIron or IBM MaaS360.

 

How does Maxis Secure Mobile work?
Maxis Secure Mobile provides an application to be installed on the end user’s mobile device to enable real-time detection and analysis on cyber threats that occurs at device, network and application level. Upon detecting the vulnerabilities or malicious activities, the app will immediately pop up to notify the end users to take remedial action. 

At the same time, it also provides access to a centralised web console which has useful features such as user administration, policy management, threat analysis, detailed reporting, and other useful features to make the life of IT administrators much easier.

 

How will my IT administrator be notified if any of the mobile devices are compromised?
While the end user will receive alerts from the mobile app directly, the IT administrator can also be notified of the attacks through email notifications. We can also provide customised monitoring and notification services based on your needs.


How do I deploy Maxis Secure Mobile?
You can either push the mobile app seamlessly from your existing Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solution or follow our guided process flow to enrol the app through two simple steps.

 

What mobile platform does the Maxis Secure Mobile support?
It supports both Android and iOS mobile operating systems.