Alain Letecheur

Mobile Security

Ensure optimal mobile security with a Mobile Threat Defense and Mobile Device Management solution.

Author: Michael Renotte
21/04/2023
As smartphones become increasingly essential for productivity, mobile attacks are on the rise and becoming more diverse. Protecting mobile devices is therefore a critical issue that should not be overlooked. Alain Letecheur, Head of the Presales Department at Proximus NXT Luxembourg, explains the risks associated with mobile attacks and how to ensure the protection of our devices.

 

How does Proximus NXT’s MTD solution work? What are its main features and which attacks does it protect against?

Our Mobile Threat Defense (MTD) solution has been available for four years. It defends and protects your mobile device from external attacks around four main axes:

  1. Phishing attacks via email – the MTD can detect and block emails containing suspicious attachments, placing them in the spam folder.
  2. Device protection – the MTD prevents any attempt to steal data through Internet browsing.
  3. Network security – hackers may use software to simulate a public Wi-Fi hotspot. If a user connects, the hacker can access the corporate network by impersonating the user, through attacks like Rogue Access Points (unauthorized wireless access points) or MITM (Man-in-the-Middle) attacks intercepting communications or data transfers.
  4. Malicious applications – the MTD protects users from downloading apps that could exploit device vulnerabilities and access corporate data.

The MTD is an autonomous application, while Mobile Device Management (MDM) triggers push alerts to monitor and guarantee device protection. For MDM installation and configuration, Proximus NXT can provide specialized engineers or delegate the task to the end users, with a detailed enrollment procedure provided.

We have also implemented a subscription service to access our security services. Proximus NXT operates a Security Operation Center (SOC), enabling delegated responsibility for overall security management. Monitored 24/7 throughout the year, our teams can react and immediately correct security vulnerabilities.

 

How does your MTD solution differ from other digital protection agents (antivirus)?

Antivirus software protects against viruses, often delivered via attachments or phishing emails. However, it does not cover the other areas addressed by MTD: Internet, Wi-Fi, and applications.

For instance, an application is executable code, not a virus. Here lies the limit of antivirus software: it cannot detect an attack attempt from a non-virus application. In contrast, MTD analyzes the app code and identifies whether it exploits known security vulnerabilities or similar issues.

 

MTD as-a-Service

Proximus NXT offers an MTD solution as a subscription service, making these protection systems accessible to SMEs.

  • The system runs on the Zimperium engine, continuously updated to keep devices and the as-a-service platform up-to-date.
  • Multiple updates may be applied in the same week for external attacks or iOS/Android versions. Any security risk is immediately addressed.
  • Internally, we use a combined MDM + MTD solution based on Ivanti Neurons (formerly Mobile Iron), also offered to clients.
  • Our expertise extends to Microsoft Intune (MDM + compatible MTD solutions like Microsoft MTD, Sophos, TrendMicro, Checkpoint, Zimperium), allowing us to cater to diverse client needs.

Since 2018, Proximus NXT has developed strong expertise in these solutions, making it a reliable partner for companies of all sizes that aim to protect their data and secure mobile devices for employees.

 

Do MDM and MTD work well together?

MDM and MTD can operate independently, each serving a different role. A company can implement MTD without MDM, or vice versa. However, combining the two provides the most secure and manageable option. Without MDM, your device is protected from attacks, but you won’t be alerted if an application encounters an issue. Unconfigured devices cannot report problems, leaving the mobile device vulnerable.

In a professional context, employees have both corporate and personal data. MDM allows device management and the creation of containers to separate professional and private contexts.

The combination of MDM and MTD we offer provides comprehensive protection for your mobile devices.