logo
  • WHY MOBILEO2
  • PRODUCT
  • PLANS & PRICING
  • COMPANY
  • FREE TRIAL
  • LOGIN
  • Features
  • Use Cases
  • Resources
The Product
MobileO2 is the FIRST device-to-network mobile app security solution that provides ‘Any-App, 360° Protection’ for public, private, native, hybrid apps, cloud access, and mobile threat intelligence. In-the-cloud or On-premise.
FEATURES AT-A-GLANCE
secure

SECURE

Go beyond device management. On-device and on-network threat intelligence and app security for all your enterprise, public appstore and cloud apps built organically or with your favorite app framework . ‘Any-App, 360° Protection’ from MobileO2.
enforce

ENFORCE

Fine-grained app admission control policies that are enforced on-the-device or on-the-network. Inline threat intelligence, including URL, IP and App Reputation to guard against known and unknown mobile threats. Supports direct, WLAN and VPN-connected BYOD devices.
manage

MANAGE

Manage your applications, users, devices, and integration elements from the MobileO2 portal. Add signature and behavior-based policy controls. Manage threat intelligence controls on-the-fly. Real-time mobile risk insights based on policy violations. Multi tenant support included.

FEATURES AT A GLANCE: SECURE

secure1
Enterprise Apps & Content
Any-app security policies can be enforced for native, hybrid and browser apps either on the device, or, on the network with app-level admission control. View Screenshot
secure1
secure2
Public Appstore Apps
Signature-based app admission control for BYOD users connecting via WLAN or VPN based on app or app category tag, risk level and risk characteristic. View Screenshot
secure3
Cloud Access
Internal and Public URLs can be blacklisted/whitelisted and policy enforced on the device or at network entry point. View Screenshot
secure3

FEATURES AT A GLANCE: ENFORCE

enforce1
Multi-tiered Application Security
MobileO2 is like no other solution - security policies can be applied on-the-device and/or on-the-network. Mix and match where policies are enforced to balance IT requirements with BYOD privacy expectations. View Screenshot
enforce2
Fine-grained Admission Control Policies
Get precise with your security policies. 'Who, What, Where' controls can be applied across-the-board or down to a specific user. For just your company apps and URLs, or, entire traffic streams. View Screenshot
enforce2
enforce3
Inline Threat Intelligence
Internal and Public URLs can be blacklisted/whitelisted and policy enforced on the device or at network entry point. View Screenshot

FEATURES AT A GLANCE: MANAGE

manage1
Policy Management
MobileO2’s cloud portal is the place to define and deploy Any-App application security policies at group, user, and device levels. Connect with your enterprise directories, WLAN and VPN. Multi-tenant management for service providers.
View Screenshot
manage1
manage2
Define Signatures
Our extensible approach to signatures (used for policy enforcement) means you can create a public or private app signature from scratch, from the log file stream, or, leverage our pre-built signatures and reputation databases. View Screenshot
manage3
Real-time Risk Insights
Real-time Activity and Policy Violation reports with drill-downs and filters for org, time, and application type. down to the user level. application category. Identify violation patterns to define new signatures and define auto-remediation rules. View Screenshot
manage3
HOW IT WORKS
macs
howitworks1
BYOD User Connects..
Connects directly, or, into the corporate WiFi or via VPN
howitworks1
pipe1
howitworks2
Policy is Enforced…
MobileO2 goes to work enforcing on-the-device and/or on-the-network controls by inspecting and mapping user’s mobile traffic streams to the policy in real-time.
pipe2
howitworks3
Closing the Loop…
Device and network violations are logged for drill-down analytics available via the MobileO2 portal
howitworks3
USE CASES
The MobileO2 360° Any-App Mobile Security Solution is purpose-built to protect all your mobile constituents - End users, Mobile administrators, and Network Infrastructure managers.
End users
get BYOD Freedom, Assured Privacy, Secure Browser, and optional enterprise store for application and content discovery
Mobile Administrators
can leverage MobileO2 app-nostic any -app security controls that operate independent of application development framework and MDM or app management solution.
Infrastructure Managers
have the ability to enforce MobileO2’s multi-tiered mobile controls and inline threat intelligence for direct, WLAN, and VPN- connected devices. And, as a complement to your WLAN, IAM, and NAC solutions.
Use Case: Any-App Security for the BYOD World
Firehose of BYOD Apps (Private, Public & Cloud Apps) enter your enterprise network. How can you get better visibility, control and manageability?
usecase1
Direct-connected devices…
Define a signature for your enterprise and public URLs. Grant explicit permission for internal URLs and web access.
WLAN and VPN users
MobileO2 supports public cloud access controls for WLAN and VPN users traversing the enterprise - blacklist and whitelist controls and reputation databases for threat intelligence.
Enforced only when users connect to the network…
MobileO2 is a multi-tiered solution so our cloud access controls are enforced ONLY when users connect to the network. And, not when BYOD users are on their own.
MobileO2 is the FIRST device-to-network mobile app security solution that provides ‘Any-App, 360° Protection’ for public, private, native, hybrid apps, cloud access, and mobile threat intelligence. In-the-cloud or On-premise.
Use Case: Controlling Public App Use On Your WLAN
Mobile guests and partners on-boarded to your WLAN have unfettered access to their BYOD public apps - apps that may violate your ‘fair-use’ corporate policies. How can you provide ‘allow-all access’ but restrict access to certain apps and public app categories?
usecase2
Redirect Mobile Traffic from your WLAN…
Simply send us the mobile traffic for your on-boarded users and we can apply our any-app network admission controls.
Inspect & Enforce Application Security Policy…
By default, BYOD users have complete access to their apps. MobileO2’s app-specific controls restrict access to a particular app or app category. And, these policies can be for a specific user, across the entire enterprise, and everything in between. All with a few clicks.
Real-time Insights
Monitor app usage in real-time and take remedial action. Let’s say you spot certain apps are slowing down your WLAN, or, guest workers are using inappropriate apps…change your policy and and deploy it immediately.
Precise Network-based Admission Control for all your mobile apps.
Use Case: Protecting Yourself Against Mobile Attacks
Millions of mobile apps = Increased exposure to known and unknown threats. What’s your real-time mobile risk mitigation solution?
usecase3
Leverage Reputation Datasources
Leverage real-time Reputation datasources for URLs, IP, and Apps from the world community of security experts. Inline threat prevention controls are built into MobileO2 and happen automatically when users enter the network
Define Custom Signatures…
See a new threat - no problem. Define a custom signature from your logs with a simple ‘point & click’ operation. And, this applies to native, hybrid and web apps.
Real-time Insights = Immediate Remediation
Real-time violation logging means you can spot patterns of abnormal activity and take corrective action to block apps, users, and devices.
Protect yourself against known and unknown mobile threats. Extensible and future-proofed.
Use Case: Cloud Access Controls
Native apps are only part of the mobile security challenge - users access public and private browser apps either directly, or, when they join your WLAN. What’s your solution beyond on-device MDM?
usecase4
Direct-connected devices…
Define a signature for your enterprise and public URLs. Grant explicit permission for internal URLs and web access.
WLAN and VPN users
MobileO2 supports public cloud access controls for WLAN and VPN users traversing the enterprise - blacklist and whitelist controls and reputation databases for threat intelligence.
Enforced only when users connect to the network…
MobileO2 is a multi-tiered solution so our controls cloud access controls are enforced ONLY when users connect to the network. And, not when BYOD users are on their own.
MobileO2 is the FIRST device-to-network mobile app security solution that provides ‘Any-App, 360° Protection’ for public, private, native, hybrid apps, cloud access, and mobile threat intelligence. In-the-cloud or On-premise.
RESOURCES

Want to know more about MobileO2 and the technology behind it? Feel free to download white papers.

Datasheet
Mobile Application & Content Security (MACS)
Checklist
10-Point Mobile Application Security Checklist
Technical Brief
MobileO2 - Mobile Security Policy Controls
U.S. Issued Patent 8,578,443
Real-time Mobile Application Management
Videos
The Future of Mobile App Security
Datasheet
Mobile Application & Content Security (MACS)
Checklist
10-Point Mobile Application Security Checklist
Technical Brief
MobileO2 - Mobile Security Policy Controls
U.S. Issued Patent 8,578,443
Real-time Mobile Application Management
Videos
The Future of Mobile App Security

MobileO2 Resources

To access MobileO2 whitepapers please enter your details below.

Please enter your name
Please provide a valid email address
Please Wait...
Thank you for your interest in our white paper.
Something went wrong. Please try after some time.

About MobileO2

MobileO2 is the FIRST device-to-network mobile security solution that provides 360° Any-App Protection’ for public, private, native, hybrid apps, cloud access, and mobile threat intelligence. In-the-cloud or On-premise.Protect your mobile apps wherever they come from…wherever they go. (Learn More)
  • WHY MOBILEO2?
  • PRODUCT
  • FAQs
  • PLANS & PRICING
  • PARTNERS
  • COMPANY
  • MEDIA
  • PRIVACY POLICY
  • SECURITY
  • CONTACT US
  •  
  •  
  •  
© MobileASaP Inc.
All Rights Reserved.
MobileO2 & MACS are trademarks of MobileASaP Inc.