Go to the table of contents Go to the previous page Go to the next page View or print as PDF
TRITON Mobile Security Evaluation Guide > Mobile Device Protection
Mobile Device Protection
Evaluation Guide | Mobile Security Solutions
TRITON Mobile Security protects mobile devices in your organization from malware and data loss by providing security filtering and real-time content classification for all traffic through your mobile devices, protecting users from risky activity, detecting jailbroken devices, and allowing immediate action to be taken when a device is compromised by wiping or locking the device, ensuring your proprietary data is safe.
Threat Protection
Unlike other solutions, Mobile Security protects users from threats targeted at mobile devices through all avenues, web, app, email, and SMS.
Security filtering is always in effect when traffic is routed through the Websense cloud service, and always-on VPN ensures that users and corporate data are always protected by Mobile Security. To enable this feature:
1.
Navigate to General > Policies and select a policy.
2.
3.
4.
Select Use a PAC file to apply your company Web policy.
5.
6.
Data Protection
In the event a mobile device becomes infected, lost, or stolen, you can remotely wipe all information from the device. A remote wipe will return the device to factory settings. To wipe a device, select the device and click Wipe Device on the General > Devices screen.
When employees who have brought their own devices leave the company and no longer need to be protected by Mobile Security, their device can be deleted from the system. The relationship between Mobile Security and the device ends as a result. This triggers a selective wipe, removing all corporate calendars, contacts, and emails from the device and your organization's security policies are no longer enforced. Select a device on the General > Devices screen and click Remove Profile to remove a device from the system.
If a lost device can potentially be recovered, you may choose to simply lock the device. This feature triggers the default locking mechanism for iOS devices and can be unlocked using the device passcode. To lock a device, select the device on the General > Devices screen and click Lock.
In the event users forget their passcode, you can clear the passcode from the device, effectively unlocking the device. The user can then access their device and reset their device passcode. To clear the passcode on a device, select the device on the General > Devices screen and click Clear Passcode.
TRITON Mobile Security allows you to configure device management capabilities to ensure that you are maintaining compliance regulations, and allowing you to minimize the potential loss of data. These settings can be configured in General > Policies > Policy Name > Profile Name > iOS.
Jailbreak Detection
Occasionally users want to remove the limitations imposed on their devices by the iOS operating system. This is known as jailbreaking.
The TRITON Mobile Security system does not allow jailbroken devices to register. In addition, when the system detects that an already registered device is jailbroken, it does several things:
1.
2.
It adds an alert to the General > Alerts page on the Cloud Security portal. On this page, it lists the number of compromised devices and provides a link to a filtered device view.
3.
It logs the incident for reporting purposes. You can view reports to see who has jailbroken their device (General > Reporting > Jailbroken Devices). Once you see which devices have been compromised, you may choose to perform a remote wipe to protect your assets. The system resets devices when they are wiped so they can reregister with the system.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
TRITON Mobile Security Evaluation Guide > Mobile Device Protection
Copyright 2016 Forcepoint LLC. All rights reserved.