Mobile Security

Detect and Prevent Mobile Devices from Being Attack Vectors.

Malicious apps compromise mobile security to access private information, such as contact lists and calendar details. They also use mobile device features, such as cameras and microphones, to spy, profile users, or conduct cyber attacks.

FireEye Mobile Threat Prevention (MTP) detects and prevents these mobile threats and provides visibility into mobile security trends across the enterprise. MTP also integrates with industry leading mobile device management (MDM) providers.

a Datasheet: Mobile Threat Prevention

FireEye Mobile Threat Prevention Overview

Learn how the FireEye MTP platform identifies, stops, and assesses mobile threats via purpose-built FireEye threat analysis engines combined with dynamic FireEye Dynamic Threat Intelligence cloud updates. (video - 1:50 min)

“In 2016, more than four million malicious or high-risk Android®; apps existed in the wild, up sharply from the year before. Cyber attackers are scrambling to harness the trove of information mobile devices contain...”


Benefits of Mobile Security

Prevent cyber attacks that use mobile devices

  • Scan and detect corporate-issued or employee-owned Android and iOS mobile devices for malicious apps and activity
  • Block malicious mobile apps from running and alert users and administrators of apps that threaten mobile security as well as ensure apps are only downloaded from authorized sites
  • Correlate activity across apps to detect malicious behavior

Detect mobile security vulnerabilities and trends

  • Enables IT to track user registration, device compliance and threat trends in a powerful virtual dashboard
  • Pre-analyzes App Store applications, developing threat scores and behavioral details for over 9 million apps
  • Dashboard provides easy access to information such as departmental and user mobile threat trends

Respond to incidents faster

  • Integrates with the most popular MDM solutions for a “detect-to-fix” model
  • Delivers FireEye threat intelligence from multiple vectors to detect and stop targeted multi-vector cyber attacks