Wandera Save and Secure
Wandera Basic and Premium
Wandera Professional and Enterprise
BYOD, CYOD, WOAD
Security Risks, Business & Legal Risks, Financial Risks
Malware, Virus, Botnet
Mobile Email, Mobile Applications, Mobile Browsing
Access Control, OS Restrictions, Data Roaming Blocks
Security, Restrictions and Reporting
Threat Prevention, Compliance and Data Cost Management
Mobile Device Management, Mobile Application Management, Mobile Content Management
Real-time granular visibility and control of mobile data
Restricting personal usage on mobile device and allowing business usage
Adoption of BYOD program
Mobile App on the device
Wandera Cloud Gateway
EMM Connect Integration
Through use of private APN
Through use of carrier specific IP routing
Through installation of profile on the device as part of Wandera app installation process
All web traffic over ports 80 (HTTP) and 443 (HTTPS)
TCP and UDP traffic
All traffic except VoIP
Tethering / Personal hotspot
Encrypted web traffic
Windows Phone 8.x
The admin contacts the mobile carrier to request a Wandera profile
User downloads Wandera profile from Wandera website
Devices are added to Wandera management portal (one at a time or bulk upload) and an invitation email or SMS message is sent to the user with a list of steps to follow to activate Wandera service
By pushing Wandera app along with Managed App Config from a supported EMM solution and requesting users to run the Wandera app to finish activation
Yes, the device is totally locked down and user is prevented from making any changes to system settings
Yes, the Wandera profile installed on the device is PIN locked
Yes, Wandera relies on EMM/MDM tool to deliver tamper proofing
It routes web traffic through Wandera cloud gateway
It provides notification service and blocks traffic based on policy
It generates end-user reports on data usage, provides device location data and heartbeat information to Wandera service
It compresses content to be routed through the Secure Mobile Gateway
Configuration, apps, events and logs collected from the device by the Wandera app
These are mobile data requests that are scanned in real-time at the Wandera cloud gateway
Blocked pages which the device attempt to access through the mobile device
The name of the Wandera app for Android and iOS devices
Cloud-based administration portal
APN setting on the device
Sites / Apps
Data Policy and Security Policy
Device Policy and Network Policy
Local Policy and Remote Policy
No, all users are subject to same policy definitions
Yes, it is possible for administrator to create different policies based on groups of users or individual users
Hourly and Daily
Daily and Monthly
Daily and Weekly
Weekly and Monthly
Within 15 minutes, it takes time for change to permeate to all proxies
At the end of the day via batch upload
User cannot access any web data on the device
User is asked to reboot the device to continue using web data
The user can't access the specific site or app, Wandera block page is displayed in browser
User can override block action
All web data is blocked including WiFi
All cellular data is blocked except for email
All cellular web data is blocked except specific whitelist exceptions defined by the administrator
All traffic including tethering is blocked
Cost per MB while roaming and monthly cost for domestic usage. Plan details are limited to a single carrier.
Cost per MB while roaming on per country basis and monthly cost for domestic usage. Plan details can be defined for multiple carriers.
Cost of monthly domestic usage and roaming usage only.
No it is not possible to configure notifications to be sent out
Yes, user notifications and admin notifications are both sent via emails
Yes, user notification is sent via in-app push notifications and admin notifications are sent via emails
Yes, it is possible to export data from RADAR in CSV format
No, it is not possible to export data
Yes, an external log collection utility is required to export data
Device Threats: Such as Jailbreaks and Semi-Jailbreaks, Outdated Operating Systems, Malicious Profiles and Dangerous Certificates.
Web Threats: Such as Spam, Phishing, Malicious Websites and Websites leaking sensitive information such as userID, password, credit card and location information.
App Threats: Such as Spam, Phishing, Malicious Apps and Apps leaking sensitive information such as userID, password, credit card and location information.
Infrastructure Threats: Such as Man-in-the-Middle Attacks, Rogue hotspots, Phishing WiFis and Dangerous Certificates.
Malware Threats: Such as viruses, worms and trojans, rootkits and backdoors among other threats.
Spyware Threats: Such as trackware.
Risk-ware Threats: Considered safe when used by an authorised person in an appropriate situation. If misused, or used by an attacker, the program may be a security risk, for example keyloggers.
Semi-Jailbreak is the process of downgrading your device to an older version of iOS allowing hackers to exploit known security bugs.
Semi-Jailbreak removes all management profiles from the device and therefore makes them unmanageable.
Semi-Jailbreak cannot be identified by any security solution and therefore represents a high risk.
Semi-Jailbreak is a minor version of a Jailbreak vulnerability that enables end users to easily install side-loaded apps, some of which may contain malware.
A ranking of the top 10 devices is available in RADAR
A risk score between 0 and 100 indicating the level of risk in RADAR
The admin receives a digest email summarising the high impact threats
AirWatch, MobileIron, Meraki, Intune
AirWatch, MobileIron, Citrix XenMobile, SAP Afaria
MobileIron, AirWatch, BES12, Intune
MobileIron, AirWatch, Citrix XenMobile, Intune
Asset Information: to ensure that device information is up to date and any changes are brought into RADAR automatically.
Additional Roaming Status: by retrieving device's current carrier from EMM, RADAR can determine roaming state of the device and ensure data policies for roaming/domestic usage are applied regardless of the app being present on the device.
App Inventory: by building a catalog of the app inventory on the device, this information is fed into the Wandera threat correlation engine to assist with device and network based threat detection.
Application Management policy enforcement: allows an admin to remove applications remotely from Radar.
Wandera works on all mobile OS platforms
Wandera can replace existing EMM/MDM tool
Multi-level architecture provides deeper, wider visibility into data usage
Wandera's proprietary threat detection and correlation engine
A large database of known malware
An app reputation database
A highly specialised virus scanner for mobile threats
Yes, Wandera service does not work without Wandera App present on the device.
No, it is possible to run Wandera service without having the App present on the device. However, having App on the device increases visibility and control of mobile data and therefore it is strongly recommended.
Minor OS Version
Man in the Middle
Windows Phone 8
Windows 10 Mobile
A regionally optimised mix of public cloud providers and co-location including AWS and Rackspace.
Wandera builds its own data centers
Level 3 and BT
Centralised data center provided by Rackspace
The data is stored across different data centre locations. Standard mention period is 12 months.
The data is stored in our central data warehouse in Ireland (EEA). Standard retention period is 12 months.
The data is stored in our central data warehouse in Ireland (EEA). Standard retention period is 24 months.
The data is stored in our central data warehouse in Ireland (EEA). Standard retention period is 36 months.
Wandera App on the device
Policies are transferred to the device and the device OS enforces them
Wandera cloud gateway
Wandera uses multiple data centres from industry leading cloud providers to host its applications and data, providing essential redundancy and availability. The infrastructure is designed to provide 99.99% availability.
Wandera hosts its applications and data in robust on-site servers at their London office and maintains several tape backups to provide availability in case of failure.
Wandera have spare server capacity which can be activated in case of failure on main servers.
21-day cool off
30 day trial with one portal and 1-5 devices
Unlimited trial with no limit on duration or number of devices
45 day pilot with 25-100 devices and pre-agreed pilot agreement with defined success criteria
45 day pilot with unlimited number of devices and total flexibility for customer to define their own test plan
Order form for Wandera solution
Formal quotation for Wandera solution
Return Of Investment (ROI) document including details of net savings delivered and security risk assessment
Granular details of savings made through compression
Number of caps multiplied by an estimated saving per cap
Data saved through compression and estimated savings through usage policy such as blocks and caps
Roaming data saved multiplied by an average $1 per MB
Data saved through compression only
Wandera partner portal
Send an email to Wandera partner manager