MaaS360 stops malware holding you to ransom

Stop malware and ransomware with MaaS360

MaaS360 Mobile Threat Management


After a weekend of watching malware holding organisations to ransom you might well be left wondering how you can protect your company, for the mobile workforce enter MaaS360 from only £3.40 per user, with active mobile malware detection and remediation.


Do you and your team use your own mobiles and tablets at work? Do you worry about the security risks? Flexibility often goes hand in hand with network security lapses, not to mention the problems caused by lost or stolen devices. It’s a modern-day reality. But from today, thanks to MaaS360, this doesn’t have to be the case for your business.

Working with our partner, IBM, we can offer you a cloud-based Mobile Device Management solution that puts device security in your hands. It’s a simple and comprehensive way of managing all the mobiles, tablets and laptops connecting to your network. Wherever they are. Whoever they belong to.

IBM® MaaS360® Mobile Threat Management allows you to detect, analyse and remediate enterprise malware on mobile devices. It provides advanced jailbreak, root and hider detection with over-the-air updates for security definitions. Administrators can configure compliance policies based on these advanced threats and remediate vulnerabilities—improving the security of bring your own device (BYOD) and corporate-owned devices.

Enter Enterprise Mobility Management (EMM), which encompasses all aspects of mobility that IT must secure and manage. Download this white paper to learn:

  • How the demand for mobile security has changed
  • What organizations of all sizes must do to balance access with security?
  • How to enable BYOD programs and be truly device-agnostic
  • How to manage and secure apps–public and enterprise-developed applications


 MaaS360 Mobile Threat Management delivers:

Mobile malware detection and remediation on iOS and Android devices to help protect your organization against fraud and data breaches.

Supplemental jailbreak and root detection that let you set security policies and compliance rules to automate remediation.

A robust mobile security solution that helps defend your enterprise data from rogue apps and malicious websites.

Mobile malware detection and remediation

  • Detect apps with malware signatures and malicious behaviour from a continually updated database.
  • Set granular policy controls to take appropriate actions.
  • Provide for a near real-time compliance rules engine to automate remediation.
  • Alert users when malware is detected and automatically uninstall infected apps (on select Android devices).
  • View device threat attributes in the console and review audit history.

Supplemental jailbreak and root detection

  • Safely support both BYOD and corporate-owned devices.
  • Detect jailbroken and rooted devices.
  • Discover hiders that try to mask detection of jailbroken and rooted devices.
  • Use detection logic updated over-the-air without app updates to be more responsive to fast moving hackers.

A robust mobile security solution

  • Proactively manages mobile threats in near real-time.
  • Reduces the risk of sensitive data leakage of corporate and personal information.
  • Takes automated actions to remediate mobile security risks.
  • Blocks access; selectively or fully wipes device or removes device control.
  • Restricts use of IBM MaaS360 container solutions.


Ransomware is a type of malicious software that carries out the cryptoviral extortion attack from cryptovirology that blocks access to data until a ransom is paid and displays a message requesting payment to unlock it. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer’s Master File Table (MFT) or the entire hard drive. Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.


LINK to pdf on Maas360

About Cellular

Cellular Solutions are an integrated business communications company, specialising in business software.

Find Out More single-cta