MDM - Mobile Data Management
SMG - Secure Mobile Gateway
MDA - Mobile Data Applications
MAM - Mobile Application Management
Scalability, Savings and Speed
Visibility, Performance and Security
Visibility, Savings and Security
Scalability, Simplicity and Savings
Subscription fee per device per month
Subscription fee per device per month plus an annual support fee
Subscription fee per user per month
As a percentage of savings
Alternative Point Network
Application Program Network
Access Pin Number
Access Point Name
It routes the traffic through Wandera Secure Mobile Gateway
It provides notification service and blocks traffic based on policy
It generates end-user reports, provides location data and heartbeat information to the Wandera service
It compresses content to be routed through the Secure Mobile Gateway
The internet stops working completely
The device shuts down
The user can't access the specific site or app
All mobile data is blocked
An App and an APN profile are installed
An APN profile is installed
An App is installed
A VPN profile is installed
It configures a web proxy setting on the device to ensure cellular web data is routed via Wandera's SMG
It installs a web proxy setting to ensure all cellular traffic bypasses the phone carrier network
It creates a VPN connection to the Secure Mobile Gateway
It ensures that all cellular and wifi traffic is routed via Wandera
All cellular web data is blocked (except for the admin-configured whitelist exceptions)
All cellular data is blocked except for email
All web data including wifi is blocked
All traffic including tethering is blocked
The admin contacts the mobile carrier to request a Wandera APN
The users download the APN Profile from Wandera website
Devices can be enrolled in RADAR (individually or in bulk) in which the admin generates an enrolment email or SMS.
Devices can be enrolled by pushing a Managed App Config from a supported EMM solution
Daily and Monthly
The name of the Android and iOS App
It is a cloud-based administration portal where authorised admins can add/manage users, configure compression & policy settings and view data usage and security reports.
The name of the APN Settings in the device
Cost per MB while roaming and the monthly cost for a domestic plan. Cost plans are limited to a single carrier.
Cost per MB while roaming per country and monthly cost for a domestic plan. Cost plans can be set and created for each carrier.
Cost of monthly domestic and roaming plan only.
Data usage of apps
Popularity of apps
Data usage and popularity of apps
Data saved by compression and estimated savings through usage policy
Number of caps multiplied by an estimated saving per cap
Roaming data saved multiplied by an average $1 per MB
Data saved through compression only
Text, Images and Video
Images and YouTube
Images and Video
Conflation, Text, Image and Video compression and Pre-Fetching
Text zipping, Caching and Email compression
Image compression, Email compression and SSL termination proxy
VoIP compression, Audio compression and Caching
WiFi traffic is redirected via Wandera and is optimized
WiFi traffic is redirected via Wandera but isn't optimized
Wifi traffic is not handled by Wandera yet but a wifi deployment option for iOS will be released soon to provide broader security coverage
Email isn't redirected via Wandera
Email traffic passes through the Wandera Secure Mobile Gateway but isn't compressed
Email traffic is compressed by Wandera
VPN traffic is not routed via Wandera SMG but is metered/counted as non-web data
VPN traffic passes through Wandera but isn't compressed
VPN traffic is compressed via the app but isn't routed via Wandera
Tethered traffic is redirected via Wandera through a separate VPN and compressed in real-time
Tethered traffic is redirected via Wandera but isn't optimised
Tethered traffic isn't redirected via the SMG but is metered and can be capped or blocked by Wandera
An regionally optimised mix of public cloud providers and co-location including AWS and Rackspace.
Wandera builds its own data centers
Level 3 and BT
Centralised data center provided by Rackspace
Within 15 minutes, due to caching in the publishing system
At the end of the customer's day, in line with cap rollovers
Hosted in our own datacenters
Secure, View and Extend
View, Optimization and Management
Extend, Mobility and Visibility
Compression, Reporting and Security
HTTP (80) and HTTPS (443) traffic
All TCP traffic
TCP and UDP traffic
All traffic except VoIP
Sites / Apps
Business / Personal
An anti-virus solution for mobile devices
A multi-level security solution designed to prevent mobile threats on mobile devices
An intrusion prevention system for mobile devices
A next-gen personal firewall for mobile devices such as iPhones and Androids
By capturing network traces and device information to identify system-wide risky or malicious behaviour
By wrapping and containerizing apps, thereby protecting corporate data
By controlling logins to enterprise cloud services for corporate data loss prevention and encryption
By installing an agent on the device that locks it down through a policy-based configuration
Because it uses multiple virus scanners and malware databases
Because it uses multiple machine learning technologies
Because it leverages multiple Wandera data centers around the world
Because Wandera collects security related information from multiple sources at different levels
A ranking of the top 10 devices is available in RADAR
A risk score between 0 and 100 indicating the level of risk in RADAR
The admin receives a digest email summarising the high impact threats
Wandera's proprietary threat detection engine
A large database of known malware
An app reputation database
A highly specialised virus scanner for mobile threats
These are mobile data requests that are scanned in real-time at the Wandera Secure Mobile Gateway
Blocked pages which the device attempt to access through the mobile device
Configuration, apps, events and logs collected from the device by the Wandera app
Existing customer can make an in-app purchase to upgrade
New Secure customer can sign up and leverage the same existing Wandera deployment mechanism. No need to install anything.
New customer can sign up and manually create new proxy profiles on the end user devices
Existing customer will need to uninstall the existing app, and install a new one to activate the service
Wandera securely drops web log data within the standard retention period of 6 months from a secure data center in Ireland (EEA) where this data is replicated for redundancy.
Wandera securely drops web log data within the standard retention period of 12 months from a secure data center in Ireland (EEA) where this data is replicated for redundancy.
Wandera securely drops web log data within the standard retention period of 2 years from a secure data center in Ireland (EEA) where this data is replicated for redundancy.
Wandera securely drops web log data within the standard retention period of 5 years from a secure data center in Ireland (EEA) where this data is replicated for redundancy.
Threats, Device and Raw Security Events
Time based and Threat based reports
User and Event based reports
Only end users. It is a user's responsibility to ensure their device is secure and to protect the company. They will know what to do when a threat is detected.
Only administrators. Administrators set policy and it is there job to enforce it with the end user. The user should not worry about insecure behaviour until an administrator contacts them
Both administrators and end users. Users require education and warning when they are exhibiting insecure behaviour. Administrators need to know so they can follow up on threats and ensure any vulnerabilities are closed.
Warn the user to disconnect from the relevant hotspot via Wandera push notifications.
Reset the device log in credentials. New passwords will prevent this from happening again.
Using Wandera Secure, use the hotspot and certificate information to conduct an investigation.
Wandera alerts the users so they can stop visiting those websites.
Wandera proactively blocks the traffic to those sites and notifies the users.
Wandera notifies the Administrators so they can remediate using an EMM / MDM if available
To help Wandera identify dangerous certificates.
To make sure traffic is blocked based on your corporate policy.
If the customer decrypts secure traffic on it's corporate networks, an administrator can upload any public certificates to make sure no false positives occur.
Ability to get location updates even if Location Services is disabled on the device
Ability to Intelligently disable mobile data to prevent bill shock as a result of tethering
Ability to enforce a Screen Lock Password on the devices
Ability to leverage EMM APIs to catalog the current inventory of applications on the device seeding the Wandera threat correlation engine to detect device and network based threats
Asset Information: to ensure that device information is up to date and any changes are brought into RADAR automatically.
Additional Roaming Status: by retrieving from the EMM the device’s current carrier, which can be used to determine roaming state and ensure data policies for roaming/domestic usage are applied regardless of the app being present on the device. Wandera recommends using both the app and EMM Connect as each provides its own benefits to the service.
App Inventory: by building a catalog of the current inventory of applications on the device which is beneficial for Wandera Secure, seeding the Wandera threat correlation engine to detect device and network based threats.
Application Management policy enforcement which allows an admin to remove applications remotely from Radar
Semi-JB is the process of downgrading your device to an older version of OS allowing hackers to exploit known security bugs.
Semi-JB is the name of a fun and addictive shooting game for IOS that keeps people in your organisation distracted playing against each other.
Semi-Jailbreak is the name of a Hacker Organisation that work from prison.
Semi-JB is a minor version of a Jailbreak vulnerability that enables end users to easily install side-loaded apps, which may contain malware.
Wandera uses multiple data centres from industry leading cloud providers to host its applications and data, providing essential redundancy and availability. The infrastructure is designed to provide a 99.999% availability.
Wandera hosts its applications and data in robust on-site servers in their London offices and maintain several tape backups to provide availability in case of failure.
Wandera have spare computers which are not strictly necessary to functioning, in case of failure in the main servers.
Device Configuration: threats like Jailbreaks and Semi-JBs, Outdated Operating Systems, and Malicious Profiles and Certificates. As a Multilevel solution, Wandera has access to both the data running over the network and the device configuration information enabling us to protect from these vulnerabilities.
Network and Web threats: like Spam, Phishing and other Browser Exploits. By operating an in-line cloud proxy, Wandera can stop these attacks proactively before they affect the device and your corporate environment.
Insecure Apps: Even approved apps leak confidential information and request unnecessary access allowing hackers to craft a whole new world of threats like side-loading apps and private and malicious APIs access among others. Wandera detects, notifies and has the ability to block if private information is being leaked in real time.
Real Time Activity Threats: like Man in the Middle Attacks, Rogue hotspots, Phishing WiFis, etc. These threats are in the rise and consist of attackers setting up rogue hotspots (aka honeypots), mainly for free to intercept all the data coming in and out from the mobile device. These attacks represent a huge risk to your organisation as confidential and private information (like usernames and passwords) is easily captured by the attackers allowing them to create persistent attacks and access individuals' and companies' resources.
Malware Threats: which include viruses, worms and trojans, rootkits and backdoors among other threats.
Spyware Threats: like trackware and adware. These programs may offer a useful service in exchange for being allowed to gather information from or about the user.
Riskware Threats which are considered safe when used by an authorised person in an appropriate situation. If misused, or used by an attacker, the program may be a security risk, for example keyloggers.