• Ipswich, Suffolk HQ Cybersecurity partner Spear Shield, customer testimonals

    Mobile Threat Defence (MTD)

    Manage Mobile Risk, without invading employee privacy.

BYOD and Corporate Owned Devices

Mobile Threat Defence (MTD)

Privacy-focused Mobile Threat Defence (MTD) that gives you immediate visibility and analysis of mobile threats and compliance status of your employee's BYOD and / or Corporate-Owned Devices - without invading employee privacy.


What types of Mobile Threats are there?

Android and iOS Network Threats

  • Man-in-the-middle attacks
  • Phishing
  • Malicious Proxies
  • Malicious Web Scripts
  • Unsecured WiFi
  • Weak WiFi Security

Android App Threats         

  • Malware Apps
  • Known and Unknown threats
  • Screen Recording
  • Leaky Apps
  • Camera/Microphone Access
  • App-Permission Abuse

Android and iOS 
Device Threats

  • OS Exploits
  • Vulnerable Configuration

Benefits of adopting Mobile Threat Defence (MTD)

Trustd is a privacy-focused mobile threat defence solution that gives you immediate visibility and analysis of mobile threats on employee devices. Designed for both Corporate Owned Devices and BYOD.

AI-powered mobile EDR

Every personal and business-owned mobile device is a gateway to business data and a route to your network. The Trustd Deep Learning engine detects both known and unknown malicious apps and provides you with crucial information for your analysis, investigation and response.

Unparalleled protection

Trustd protects employee devices from application, network and device-based threats including malware, phishing, rogue WiFi, unauthorised screen, camera and microphone access, permissions abuse and device exploits.

Cyber Essentials Compliance

Built in the UK for British businesses, Trustd gives you an easy tool to ensure Cyber Essentials compliance on your mobile devices that access work data or company systems.

For BYOD, COx or a hybrid

Trustd Mobile Threat Defence makes securing BYOD smooth and effective by eliminating barriers to adoption. Or layer on top of your existing MDM for zero-touch deployment/one-touch enrolment – and see the health status of all your mobile devices.

Zero-Trust and policy compliance

The Trustd app protects your mobile devices and the MTD dashboard gives your IT and security teams the tools they need to protect your business, while ensuring every device is compliant with security policies. It can even prevent access to your Microsoft Cloud Apps from untrusted devices.

Spear Shield's portfolio of cybersecurity solutions and services
Trustd Cyber Essentials Compliance Dashboard

MTD or MDM 
Which do you need?

You may already have a Mobile Device Management (MDM) solution in place and are wondering how Mobile Threat Defence (MTD) fits in. Or perhaps you’re part of the 61% of organisations that have no mobile security in place and are researching your options?

How are they different?

Quite simply, MDM is just for managing your organisation’s devices – it can deploy policies wholesale, restrict access to particular apps or services, or act as a VPN. However, it doesn’t have any threat detection, analysis or remediation capabilities. So it can’t block phishing, stop malware, guide users to remove threats, identify permissions abuse on Android, or scan WiFi networks for attacks.


MDM has been around much longer than MTD, and many organisations have recognised the need for basic mobile security and adopted some form of MDM. However, they’ve run into some significant challenges, and that’s led to MTD solutions being developed – to specifically address those challenges and shore up the threat protection aspect of mobile security.

I've already got MDM, do I also need MTD?

If you’ve got Mobile Device Management (MDM) already, you’re already a step ahead of most businesses.

However, MDM only deals with the management side of mobile devices, and can help to put a secure fence around sensitive data. It doesn’t offer any means to stop those threats from entering the perimeter in the first place. Only Mobile Threat Defence (MTD) can currently do that.

Some MDM providers offer some MTD features in their solution, and if you have a unified endpoint solution that covers your desktop security, sometimes the vendor will offer mobile security as an optional paid extra to your license.


The problems with these two options are 1) performance and 2) cost.


MTD providers (like Trustd!) are specialists in mobile threats, and our protection is designed around identifying and stopping those threats – not repackaging desktop threat protection as a mobile solution, which is what many cybersecurity vendors do. Why would you settle for security that only catches some of the attacks?

Here’s an analogy: If MDM is like hiding your valuables from burglars, MTD is like locking the doors and windows beforehand.

No MDM? No problem.

Trustd protects devices and restricts access to company data for untrusted devices whether they are managed by an MDM/MAM or not.


Whether your organisation already has some level of mobile security or management or not, we priced our MTD, Trustd, to ensure that cost wasn’t a barrier. But if you don’t have an existing MDM or MAM in place, that doesn’t matter either, as Trustd can also be deployed as a standalone MTD across your whole organisation, in just a few minutes.

How can I enhance user awareness and mitigate risk?

Mobile Threat Defence

Help protect your mobile users' and keep your sensitive business data and devices secure with Mobile Threat Defence.


Pricing based on number of users

Managed Phishing Simulation Service

Campaign Frequency Options:

Monthly

Bi-Monthly

Quarterly


Pricing based on number of users

Cyber Academy User Training

Tailored 12-month End-User Awareness Training Programme

Delivered as a fully managed service.


Pricing based on number of users

Mobile Threat Intelligence

80%

of phishing sites are designed to run on both desktop and mobile platforms

CFO

Top targeted member of the board with phishing in 2023

600%+

QR Phishing Attacks up 600% in Q4 2023

59%

of organisations had login credentials stolen

Achieving Security Outcomes Together

Spear Shield's portfolio of cybersecurity solutions and services

Contact

The team at Spear Shield have several year's experience working within both the private and public sector, have a very consultative approach and would welcome the opportunity to learn more about your organisation.

Why customers Secure with Spear Shield

Over 20+ Year's Experience

Working within the private sector, public sector and large enterprise to help organisations solve complex and advanced cybersecurity challenges.

Strategic Portfolio

The team at Spear Shield have done the hard work evaluating the market, understanding the pro's, con's of each solution and what's going to provide the best security outcomes and value for investment so you don't have to.

In-House Technical Expertise

Our customer's benefit from Spear Shield's in-house technical expertise for both pre and post-sales support

In-House Technical Expertise

Cyber criminals collaborate... so why shouldn't the good guys too? Spear Shield customers benefit from our regularly hosted Security Social.exe free to attend cybersecurity social and networking events. 

Let's crush the bad guys together!

Spear Shield has an award winning portfolio of cybersecurity solutions and services that can help keep your network, people and data secure.

Access to the best Commercials

Spear Shield's relationships and technical investment with our partners enables us to provide our customer's with the most competitive commercials available. 

FAQ's

Everything you need to know about Spear Shield.

Do I have to be a customer to attend a Security Social.exe event?

No you don't! Whilst we'd of course hope that one day you might be... Our Security Social events are to provide people with a platform to network. We've built a community of local based IT professionals in East Anglia and Edinburgh so far where people can come together to share cybersecurity challenges and advice for best practice with one another.

Does Spear Shield offer term-based licensing or MSP?

Here at Spear Shield, we can offer both! Consider us a hybrid MSP and VAR (Value added reseller). We are set-up with our vendors to offer our customers all options to ensure we can align our cybersecurity solutions and services with your preferred budget type. Please speak with the team for details.

Can Spear Shield supply public sector organisations through a procurement framework?

Yes! Spear Shield has routes to market including G-Cloud to be able to supply our public sector customers with our cybersecurity solutions and services. Please speak with the team for details.

Can Spear Shield work with Large Enterprise?

Yes! and we do. Our Team has many, many combined years experience working with some of the largest private sector enterprises across the country to help tackle and solve cyber risk. All of Spear Shield's cybersecurity solutions and services are scalable and enterprise-grade.

Does Spear Shield offer not-for-profit discount?

Yes, the Spear Shield Team will always ensure any eligible not-for-profit and public sector discounts are applied to any quotes for our cybersecurity solutions and services.

What are some of the top cybersecurity threats for 2023?

Here are some of the top cybersecurity threats organisations are facing in 2023. 

Social Engineering
Any network is hackable if an employee can be duped into sharing access.


Third-Party Exposure
Vendors, clients, and app integrations with poor security can provide access to an otherwise well-protected network.


Configuration Mistakes
Your cybersecurity investments are only as strong as they are configured correctly.


Human Activated Risk
User education and visibility for IT is essential to ensure those with network access and those handling sensitive data are maintaining cyber best practices.


Ransomware

Hackers are targeting back-ups and using extortion more and more to push receiving the ransom payment from their victims.


Mobile Devices

Every mobile device is a gateway to your network and sensitive business data.


Lack of resource and expertise

Human-led cyber attacks require human-led threat hunting. Unfortunately, skilled threat hunters are few and far between. 


Internet of Things (IoT)
Smart technology users may not realise that any IoT device can be hacked to obtain network access. Securing your network starts with understanding what's on it.

Is there any obligation when opting for a free cybersecurity service by Spear Shield?

No there isn't! The team will just use that as an opportunity for us to work together on a project and prove the value we can provide you as a future strategic partner.

How can I reduce my employees click-rate?

This is an area where the cybersecurity experts at Spear Shield thrive! We've worked with organisations to help reduce employee click rates from 70+% to 0% without the need for any end-user awareness training.

Online training content doesn't work.


Classroom based training gets forgotten.


Static email banners get ignored.


Speak with the team about real-time end-user awareness training to help mitigate the risk of a phishing attack in your organisation.

Why Spear Shield for Managed Detection Response Services?

The team at Spear Shield are an Award Winning Sophos Partner and have a combined 20+ years experience working with Sophos. Our relationship and technical investment, enables Spear Shield to offer our customers the most competitive commercials available. Sophos is one of the largest providers of MDR across the globe with over 17,000 + organisations using the MDR service and is what powers the Spear Shield 24/7 Managed Detection Response Service.

Why Spear Shield for a Managed Phishing Simulation Service?

Spear Shield's Managed Phishing Simulation Service provides our customers with managed phishing simulations and security awareness training for their users delivered as a fully managed services. Customers benefit from the tailored spear phishing examples that the Spear Shield team can tailor to your organisation and also base our templates on real-world phish that we see that are able to evade detection from 3rd party secure email gateways and Microsoft 365. After each campaign, customers benefit from receiving an executive ready report with all of the information and data required to be able to confidently articulate risk back to the business.

What's included in Spear Shield's Managed Phishing Simulation Service reports?

The cybersecurity experts at Spear Shield will provide you with executive ready reporting with all of the intelligence you require to provide cyber-assurance to your organisation.

Includes:
- Engagement Overview
- % Click Rate
- No. of Credentials Harvested
- Individual Campaign Performance
- Device Breakdown
- Caught-User Breakdown
- User Behaviours Insights

- Industry Benchmarking
- Consultative Recommendations