Skip to content

Mobile Security and App Management for BYOD

Gain visibility and control of mobile devices, apps, and data

Trend Micro™ Mobile Security, puts you in control of BYOD by integrating mobile device management (MDM), mobile security, data protection, and application management—all within one easy-to-manage solution. By integrating with the Trend Micro Control Manager console, it allows you to centralize policy and management across Trend Micro OfficeScan endpoint security and other Trend Micro solutions—for a holistic security strategy.

Mobile Security 9.0
  • Extends protection to mobile devices, apps, and data
  • Enables IT to configure, manage and monitor threat and data protection through a single console
  • Managed as a standalone solution or integrated with other Trend Micro products via Trend Micro Control Manager
  • Reduces IT costs, and complexity by enabling a unified endpoint security platform
  • Secures the broad range of mobile platforms: iOS, Android, Blackberry, Symbian, and Windows Phone

Take control of BYOD with Mobile Security, MDM, and App Management

Secure, track, monitor, and manage your employee’s consumer-grade mobile devices, mobile apps, and company data. Our 4-in-1 solution allows you to balance employee enablement with IT control


Mobile Device Management (MDM)

  • Improves visibility and control with instant views of compliance, inventory, protection, and health of devices
  • Enables IT to remotely enroll, provision, de-provision, and track devices
  • Allows cross-device and group policies for consistent enforcement of security requirements


Mobile Device Security

  • Blocks malware and malicious websites using leading antimalware and web reputation
  • Detects attacks that enter via network applications, ports and services, using the firewall and IDS
  • Monitors, blocks, and logs calls, SMS and MMS sent to and from devices based on user policy
  • Improves visibility and control of iOS devices with a new iOS app for Trend Micro Mobile Security


Mobile Application Management

  • Offers application black listing and white listing to prevent or allow the use of mobile apps
  • Enables IT to manage and block specific types of apps based on categories
  • Identifies and blocks risky Android apps using the Trend Micro Mobile Application Reputation Service, part of the Smart Protection Network
  • Pushes apps to end-user devices to accelerate the use of optional or required business apps
  • Provides inventory management and reporting for better visibility of apps used across devices, groups, company
  • Enables tracking, management and deployment of volume purchase programs on iOS devices


Data Protection

  • Protects data on lost or stolen devices with remote lock and wipe, selective wipe, and device locate capabilities
  • Enforces DLP policies, encryption, and compliance, blocking jail broken or unencrypted devices
  • Empowers IT to lock risky mobile device features such as cameras, Bluetooth®, and SD card readers


How Does Mobile Security Work?

This infographic series shows what our 4-in-1 mobile security solution can do—from jail break detection to centralized policy management, application push, and encryption control.

Trend Micro Mobile Security is designed to protect your private corporate data—today’s primary target—no matter where it goes. With our 4-in-1 solution, you can track, monitor, manage, and secure smartphones, tablets, and most importantly, your valuable data that’s on these devices. We’ve integrated layers of data protection that you won’t find in standalone mobile security and MDM solutions. Even our mobile device security, MDM, and application management capabilities are all designed to keep your data safe from theft and accidental loss.

Prevent data loss

  • Protects corporate data with remote lock and wipe, selective wipe, or device locate in case of threat or lost phone
  • Enforces data loss prevention (DLP) policies, data encryption, and compliance
  • Notifies IT  of jail broken or unencrypted devices
  • Empowers IT to lock or permit mobile device features such as cameras, Bluetooth®, and SD card readers


Regain critical visibility and control of your mobile devices and data

  • Enables IT to track and manage mobile devices, apps and data through a single console
  • Provides data on the number, types, and configuration of devices accessing corporate resources, whether they have enrolled or not
  • Supports a holistic endpoint security strategy by integrating with the Trend Micro Control Manager console to centralize policy and management across multiple Trend Micro solutions


Reduce operational costs

  • Saves time and money with centralized visibility and control of device management, app management, security and data protection—all within a single solution
  • Simplifies deployment  by leveraging the Trend Micro Cloud Communication Server, an optional cloud-based service that automates communications and reduces deployment complexity
  • Reduces phone acquisition costs by allowing BYOD


Improve productivity and flexibility of your workforce

  • Boosts employee productivity, flexibility, and company competitiveness by allowing users to choose the mobile devices they like and know how to use
  • Enables IT to push the most productive applications to all devices, ensuring employees are best equipped to do the their jobs efficiently, while also black listing the unproductive apps


Reduce security risk

  • Minimizes the risk of compromised devices with industry-leading malware and web threat protection, backed by cloud-based threat intelligence from Trend Micro Smart Protection Network
  • Ensures proper device configurations and security deployment to reduce malware risk
  • Enables IT to block the use of risky applications and allow approved apps

Unified Protection via Control Manager

Trend Micro Mobile Security can be managed through Trend Micro Control Manager, enabling you to centralize threat and DLP policy management for multiple Mobile Security servers that may be spread throughout the world. You can also centrally manage multiple Trend Micro solutions deployed across layers of the IT infrastructure.

When deployed with Trend Micro OfficeScan endpoint security, you’ll benefit from a unified endpoint security platform that enables centralized management and visibility of all end user activity through a single console. In addition to reducing management time and operational costs, it improves security since our endpoint and mobile security work together to eliminate risk, block threats, and protect your data.

Businesses like yours are securing the wide range of employee- and company-owned mobile devices with Trend Micro Mobile Security.  Download the full stories to see what your peers have to say.


AlertBoot, Data Security Services, Las Vegas, Nevada, U.S. (PDF)

Trend Micro Mobile Security is by far the best solution for us—the feature set, maturity of the product, and the overall support of the product make it a stand out from the competition.”

- Timothy Maliyil, Founder & CEO, AlertBoot


Large Global Manufacturer, Anonymous, U.S. (PDF)

Trend Micro Mobile Security supports our broad range of devices—iOS, Android, and Windows Mobile devices. We have had to learn a lot about mobile device management, but with the Trend Micro solution, we have the familiar console.”

- Manager, Desktop Security

System Requirements and Support

Trend Micro Mobile Security supports the following platforms:

  • Apple iOS (must have Apple APN service)
  • Android
  • RIM BlackBerry (with BES server  installed)
  • Windows Mobile
  • Symbian


Management Server and Communication Server Microsoft™ Windows™ OS
  • 2003 Server Family (32 / 64 bit)  
  • 2003 R2 Server Family (32 / 64 bit)  
  • 2008 Server Family (32 / 64 bit)  
  • 2008 R2 Server Family (32 / 64 bit)  
  • Windows Server 2012  

Web Server IIS 6.0, 7.0, 7.5, or 8.0  

SQL Server SQL Server
  • Microsoft SQL Server™ 2005, 2005 Express Edition, 2008, 2008 Express Edition, 2008 R2, 2008 R2 Express Edition, 2012, 2012 Express Edition  
SQL Authentication Mode Windows Authentication
  • Mixed Mode - Windows Authentication  
  • Mixed Mode - SQL Server Authentication
Web Browser for Admin Console

Microsoft Internet Explorer™ 8 or 9

Google™ Chrome™ 17 and above  
Mozilla™ Firefox™ 14 and above  

Apple™ Safari™ 6 or Safari on New iPad

Mobile Operating System Google™ Android™ OS
  • Android 2.1 Éclair  
  • Android 2.2.x Froyo  
  • Android 2.3.x Gingerbread  
  • Android 3.x Honeycomb  
  • Android 4.0.x Ice Cream Sandwich  
  • Android 4.1 Jelly Bean  
  • Android 4.2 Jelly Bean

Apple iOS™ 4.x, 5.x, or 6.x  

Microsoft Windows Mobile 5, 6, 6.1, or 6.5

Nokia™ Symbian™ Series 60 5th Edition or 3rd Edition  

RIM BlackBerry™ Enterprise Server 5.0  

Social Media

Connect with us on