1. Service overview

Wandera provides unified cloud security for enterprises to protect their remote users. Wandera’s services (“Services”) protect against threats, filter content and enable secure access to cloud applications. The Services are enabled though the Wandera Security Cloud delivered across a global network, and managed through a customer administration console called RADAR.

The two core Services are Mobile Threat Defense and Mobile Data Policy. Our Mobile Security Suite comprises both services.

Wandera Mobile Threat Defense protects against threats to mobile devices, such as malware, rogue or insecure applications, phishing, cryptojacking, data exfiltration and network attacks. Threats are detected at the endpoint via Wandera’s endpoint application, and also prevented in the network via Wandera’s Secure Access Layer or Cloud Gateway. As well as protecting against threats, Wandera helps organizations detect vulnerabilities, flagging potential risks such as outdated OS versions or risky configuration settings. The solution is designed to integrate with leading UEM and SIEM offerings.

Wandera Mobile Data Policy provides web content filtering across all mobile traffic (including WiFi when enabled) and data management features like tethering control, data capping and compression. The solution is easy to deploy, featuring the installation of an endpoint application and mobile traffic routing via Wandera’s Cloud Gateway. The solution integrates seamlessly with leading UEM solutions to further simplify deployment and enable synchronised device lifecycle management. Wandera’s Mobile Data Policy is also available on Windows 10 devices via installation of a tamper-proof client.

Customers with our Mobile Security Suite may optionally add our Broker service which enables seamless secure access to cloud services. The solution uses our Cloud Gateway to provide a trusted network route between a sanctioned device and the cloud services they need access to from any WiFi or cellular network. Broker provides end-to-end security for accessing cloud services. It can be used as a transparent second authentication layer to streamline the user’s authentication process.

2. Architecture, Key Features & Support

The Wandera solution includes an application installed on employee devices and an online portal for admins to configure, analyze and control the solution.


Mobile Threat Defense Mobile Data Policy Mobile Security Suite
RADAR Management Portal
Endpoint Application
MI:RIAM Threat Intelligence
UEM Connector
SIEM Connector Optional
Secure Access Layer
Cloud Gateway (Proxy)
Data Anonymization
App Vetting
Network Threat Detection
Device Vulnerability Management
Malware Detection
UEM Adaptive Access
Data Leak Prevention
Zero-Day Phishing Protection
Content Security Protection
Privacy Protected Browsing
Failsafe Encryption (VPN)
Data Caps & Compression
Tethering Control
Web Content Filtering
Usage Analytics
Data Policy over Wi-Fi Optional
Adaptive Access (SDP, UEM)
Email/Phone/Online Support

2.1 Endpoint Application

The Wandera application is installed on employee smartphones and tablets, and provides active detection of cyber threats, real-time notifications and reports to employees.

2.2 Secure Access Layer (‘SAL’)

Wandera’s SAL prevents threats in the network from reaching mobile endpoints while safeguarding user privacy. Capabilities include zero-day phishing protection and a secure VPN that can be initiated if the device is under attack.

2.3 Cloud Gateway

Wandera’s Cloud Gateway acts as an in-line proxy for web traffic (HTTP & HTTPS), scanning data in real-time to analyze usage and apply policy. Wandera’s gateway is hosted and delivered from secure global data centers.

2.4 MI:RIAM Threat Intelligence

MI:RIAM is our advanced machine learning and threat intelligence engine. Powered by billions of daily inputs from millions of mobile endpoints, MI:RIAM continuously analyzes these vast quantities of real-time data to detect and prevent new threats..

2.5 RADAR Web Console

Device deployment, policies, groups, service settings and reports are all managed through a single administrative portal named RADAR. RADAR supports SSO and MFA for industry leading security.

2.6 UEM Connector

An optional component of the Wandera architecture, this connects with your UEM/EMM/MDM solution to provide seamless deployment and additional security features such as conditional access and integrated compliance policies.

2.7 SIEM Integration

Integrate Wandera’s threat events into your existing SIEM platform via API.

2.8 Data Anonymization

Optionally, you can use pseudonyms instead of personal identifiable information to protect user privacy. Administrator reports are restricted to aggregate data only.

2.9 Device Support

Wandera works across all carriers and is available on almost all mobile devices including iOS, Windows 10 and Android. For a more detailed description of which products we can support, visit the Wandera knowledgebase.