Workspace ONE Mobile Threat Defense

Workspace ONE Mobile Threat Defense provides endpoint security and protection for iOS, Android, and Chrome OS, securing devices against app, device, OS, and network-based threats. Integrating Mobile Threat Defense with Workspace ONE UEM empowers your organization to adopt secure mobility without compromising productivity. It allows the integration of mobile security threat and device events into your security incident and event workflows. Additionally, Mobile Threat Defense allows you to streamline the management of devices and drive enforcement when threats are detected.

Requirements

  • Workspace ONE Mobile Threat Defense.
  • A currently supported version (non EOL) of Workspace ONE UEM, shared SaaS, Managed Hosting, or on-premises.
  • Administrator access to the Workspace ONE UEM Console.
  • All supported devices intended to have Workspace ONE Mobile Threat Defense protection must have one of the following apps installed. For more information about making this selection, see Integrate Workspace ONE Mobile Threat Defense With Workspace ONE UEM.
    • Workspace ONE Intelligent Hub 2204 or later
    • Lookout for Work 6.1.0 or later

Supported Platforms

  • Android 10.0+ for deployments with Lookout for Work app
  • Android 8.0+ for deployments with Workspace ONE Intelligent Hub app
  • Apple iOS 7.0+ for deployments with Lookout for Work app
  • Apple iOS 13.0+ for deployments with Workspace ONE Intelligent Hub app
  • Chrome OS x.x

Note: See the Frequently Asked Questions page to address performance expectations for Mobile Threat Defense.

Privacy

For more information about how VMware handles information collected through our products, see the VMware Privacy Policy at https://www.vmware.com/help/privacy.html.

For more information about what data is collected from your end users’ devices, visit the VMware Workspace ONE Privacy Disclosure page: https://www.vmware.com/help/privacy/uem-privacy-disclosure.html.

For more information about how our Mobile Threat Defense service provider, Lookout, uses data from end user devices for its security research and to improve its ability to detect new threats, visit https://legaldocs.lookout.com/en/enterprise-privacy-policy.pdf.

check-circle-line exclamation-circle-line close-line
Scroll to top icon