HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
A mobile device management platform for financial advisors that provides threat management, identity and access management, and data protection. Features include secure containers for financial apps, document encryption, jailbreak/root detection, secure browser for client portals, and compliance reporting for financial regulations.
Tablets and smartphones with enhanced security features allowing advisors to access client information and financial planning tools while meeting with clients outside the office.
More Secure Mobile Devices
More Wealth Management ...
Multi-Factor Authentication (MFA) Requires users to provide multiple forms of identification before granting access. |
IBM MaaS360 supports multiple forms of authentication, including multi-factor authentication options. | |
Biometric Authentication Supports authentication via fingerprint, facial recognition, or iris scanning. |
Biometric authentication is available through IBM MaaS360 app policies and OS-level enforcement. | |
Single Sign-On (SSO) Allows users to use one set of login credentials across multiple related systems. |
Supports SSO through SAML, OAuth integrations, as per IBM documentation. | |
Role-Based Access Control (RBAC) Grants access based on user roles, limiting exposure to sensitive features and data. |
Role-based access control is a standard feature of IBM MaaS360 for user/device management. | |
Time-based Access Restrictions Restricts platform access to set periods for added security and oversight. |
Time-based access restrictions are configurable within MaaS360 policies. | |
Geofencing Limits platform access to predefined geographic locations. |
Geofencing is offered for policy enforcement based on location. | |
Session Timeout Automatically logs out users after a period of inactivity. |
No information available | |
Device Registration Allows only registered and approved devices to access sensitive information. |
Device registration and approval workflows are core to device onboarding in MaaS360. | |
Jailbreak/Root Detection Detects devices with compromised operating systems and restricts access. |
Jailbreak/root detection is advertised as a core security feature. | |
Remote Lock/Wipe Ability to lock or erase device data remotely if lost or stolen. |
Remote lock and wipe available if a device is lost or stolen. | |
Customizable Password Policies Enforces complexity and frequency rules for password creation and updates. |
Password policy enforcement (complexity, history, frequency) is configurable. | |
User Activity Logging Tracks user actions on the platform for accountability and investigation. |
User activity logging is included for device and policy actions. | |
Access Approval Workflow Requires admin approval before granting user or device access. |
Access approval workflows exist for device registration and privilege escalation. |
End-to-End Encryption Encrypts data at rest and in transit between devices and servers. |
End-to-end encryption for device-server communications; relies on platform support for at-rest data. | |
On-Device Data Encryption Secures stored data locally on the mobile device using encryption. |
Containerization and on-device encryption are core MaaS360 features. | |
Secure Backup Backs up data securely in compliance with privacy standards. |
Secure backup is supported and aligns with industry privacy standards. | |
Encrypted Communications Ensures all messaging, calls, and file transfers are encrypted. |
Encrypted communications, e.g., email and browser via secured containers/browsers. | |
Secure Key Management Safeguards encryption keys with restricted access and best practices. |
Secure key management is a foundation for MaaS360's encrypted container. | |
Data Masking Masks sensitive financial data displayed on screens to prevent exposure. |
Data masking for sensitive information is implemented in secure apps/containers. | |
Granular Encryption Levels Allows different levels of encryption for different data types. |
Granular encryption configurable by policy and container type. | |
Privacy Policy Transparency Displays clear information about data collection, use, and sharing. |
Privacy policy is transparent, with user and admin communication about data usage. | |
Compliance with GDPR/CCPA Adheres to data privacy regulations such as GDPR or CCPA. |
IBM advertises GDPR and CCPA compliance for MaaS360. | |
Audit Logging Maintains logs of all access and changes to client data for auditing. |
Audit logging is included for device, user, and admin actions. | |
Secure Cache Management Automatically clears or encrypts application cache to prevent data leaks. |
Cache management is provided at the app level via secure containers. |
MDM Integration Offers compatibility with leading MDM solutions for device oversight. |
MDM integration is the core function of MaaS360. | |
Device Inventory Tracking Tracks all approved devices accessing financial systems. |
Device inventory tracking is provided in the administrative dashboard. | |
App Whitelisting/Blacklisting Prevents installation or use of non-approved applications. |
App whitelisting/blacklisting is configurable by device policy. | |
Mobile Threat Detection Continuously monitors for malware, phishing, or other threats. |
Mobile threat detection via continuous monitoring is a core touted feature. | |
Patch & Update Management Ensures devices and apps are running the latest secure versions. |
Patch and update management can be automated and monitored. | |
VPN Enforcement Requires VPN connections for external or remote access. |
VPN enforcement is supported using conditional access policies. | |
Compliance Reporting Generates reports on device compliance with security policies. |
Compliance reporting is a major selling point, especially for regulated industries. | |
Remote Configuration Centrally manages security settings and configurations across devices. |
Remote configuration is provided for apps and device settings across the fleet. | |
Lost Device Tracking Allows real-time location and status tracking of lost devices. |
Lost device tracking is available through location services. | |
Security Incident Alerts Automatically notifies administrators of security breaches or risks. |
Security incident alerts are integrated in the admin dashboard and via notifications. | |
Usage Analytics Provides analytics on device engagement and usage by advisors. |
Usage analytics is available for device and application use. |
Intuitive Navigation Easy-to-use interface for advisors and clients. |
IBM MaaS360 emphasizes ease of use, with modern UI principles. | |
Customizable Dashboard Allows users to personalize information and shortcuts. |
Admin dashboards can be customized for summary and device data. | |
Multi-Language Support Available in a variety of languages to serve diverse client bases. |
No information available | |
Accessibility Features Supports screen readers, high contrast mode, and large text. |
No information available | |
Offline Mode Limited functionality without network connection for emergencies. |
Limited offline mode when network is unavailable for some policies. | |
In-App Notifications Provides timely alerts and updates to users inside the app. |
Supports in-app notifications to users and admins. | |
Seamless Document Upload/Download Secure and easy handling of financial documents. |
Enables secure document upload/download in the secure container apps. | |
Dedicated Client/Advisor Portal Separate portal areas for advisors and clients with tailored functions. |
No information available | |
Voice Assistant Integration Integrates with voice assistants for hands-free operation. |
No information available | |
Search Functionality Advanced search tools for transactions, documents, and contacts. |
No information available | |
Responsive Design Adapts interface for phones, tablets, and different screen sizes. |
Web-based dashboard and apps are responsive to different device screens. |
Transaction Approvals Requires one or more approvals before large or sensitive transactions proceed. |
No information available | |
Real-Time Transaction Monitoring Monitors and flags potentially suspicious activity as it happens. |
Real-time transaction and device activity monitoring for suspicious behavior. | |
Limits on Transaction Amounts Configurable maximums for transactions approved via mobile. |
No information available | |
Automated Fraud Detection AI-based detection and prevention of fraudulent transactions. |
Automated threat/fraud detection against device compromise; not financial transaction-specific. | |
Transaction Notifications Instant alerts for every transaction initiated or completed. |
Transaction notifications possible via system and in-app notifications for device actions. | |
Dual Authorization Two users must independently authorize critical transactions. |
No information available | |
Audit Trail of Transactions Comprehensive log of all transaction details and authorizations. |
Audit trail of device/transaction activities is included for compliance reasons. | |
Regulatory Compliance Checks Automated screening of transactions for regulatory compliance. |
Regulatory compliance checks and reports are key features for financial sectors. | |
Transaction Reversal Tools Ability to reverse incorrect or fraudulent transactions swiftly. |
No information available | |
User Permissions for Transaction Types Administrator control to restrict types of transactions by user. |
User and group permissions can restrict types of transactions that can be performed on managed devices. |
API Access Robust, secure API for integrating with other platforms and services. |
API access available for integration with other platforms and security tools. | |
Data Import/Export Allows seamless transfer of financial information to and from other systems. |
Supports data import/export for device inventory and settings. | |
CRM Integration Integrates with Client Relationship Management software. |
Integrates with CRM systems using MaaS360 Marketplace connectors. | |
Portfolio Management Integration Works with third-party portfolio management and analytics tools. |
No information available | |
Bank Connection Aggregation Aggregates holdings and balances from multiple banks and custodians. |
Bank connection aggregation possible through secure container apps. | |
Document Management Integration Connects with document storage and e-signature platforms. |
Supports integration with third-party document management and storage/e-signature platforms. | |
Secure Open Banking Support Supports open banking APIs with OAuth2 and PSD2 compliance. |
No information available | |
Alerting System Integrations Can send alerts to external monitoring and support systems. |
IBM MaaS360 can send alerts to monitoring and support system integrations. | |
App Marketplace Compatibility Supports plug-ins and third-party apps from curated marketplaces. |
Supports plug-ins and curated marketplace apps/extensions through the IBM Security App Exchange. | |
Single Data Format Standardization Uses open standards for financial data for easier interoperability. |
No information available |
Regulatory Audit Trail Captures full audit logs for all data and actions, meeting compliance obligations. |
Provides regulatory audit trail for device and data actions. | |
Real-Time Compliance Alerts Instantly flags actions or transactions that may breach compliance rules. |
Real-time compliance alerts for device and policy violations. | |
Scheduled Compliance Reporting Automatically generates and distributes compliance reports. |
Scheduled compliance reports are available via reports and dashboards. | |
Role-Based Compliance Controls Compliance checks vary based on user roles and access. |
Role-based compliance controls available for differentiated policy enforcement. | |
e-Discovery Support Facilitates discovery of electronic records for legal/audit review. |
No information available | |
Customizable Policy Engine Policy rules can be tailored to organizational and regulatory needs. |
Customizable policy engine for security and compliance enforcement. | |
Conflict of Interest Monitoring Detects and reports potential advisor conflicts. |
No information available | |
Transaction Reporting Standards Supports formats (e.g., SWIFT, FIX) required for external reporting. |
No information available | |
Automated Record Retention Automatically applies record retention/destruction based on policy. |
Automated record retention/destruction configurable for compliance. | |
Data Residency Awareness Ensures data is stored in approved jurisdictions. |
Admins can select data residency for cloud services, with regional compliance. |
Secure In-App Messaging Enables end-to-end encrypted communication between users. |
No information available | |
Document Sharing and Signatures Securely share, collaborate and sign important documents. |
Document sharing and workflows with e-signature available via supported partner apps. | |
Client Scheduling Tools Integrates calendars and scheduling for advisor-client meetings. |
No information available | |
Group Chat Capability Supports group discussions among teams or family members. |
No information available | |
Push Notification Channel Provides immediate client/advisor updates and reminders. |
Push notification channel supported for advisor, admin, and device alerts. | |
Voice and Video Communication Enables secure audio and video calls through the app. |
No information available | |
Audit Logging of Communications Maintains logs for all advisor-client communications for compliance. |
No information available | |
Conversation Archival and Search Archives all chat and call transcripts and allows keyword searching. |
No information available | |
Automated Meeting Summaries Records and summarizes client meetings for audit and convenience. |
No information available | |
Integration with Email/Other Channels Can synchronize communications with email, SMS, or third-party chat. |
Communications integration available with email and some third-party channels. |
99.99% Uptime SLA Guaranteed uptime or availability level for the application. |
No information available | |
Real-Time Performance Monitoring Tracks system performance metrics for rapid issue detection. |
Real-time performance monitoring for device fleet and management portal. | |
Scalability Supports growing users or device numbers without service degradation. |
Highly scalable SaaS-based platform. | |
Load Balancing Balances traffic across servers for optimal responsiveness. |
Load balancing is implemented for cloud service stability. | |
Disaster Recovery Plan Comprehensive plan and backup for service continuity after outage. |
Disaster recovery plans in place for IBM Cloud services. | |
Auto Failover Seamlessly switches users to backup systems in case of primary failure. |
Auto-failover is offered for critical backend services. | |
Response Time Average time for screen or transaction to load/process. |
No information available | |
Regular Maintenance Scheduling Planned maintenance that does not interrupt critical user activity. |
Maintenance windows scheduled to avoid critical operations; info provided in status page. | |
Bug Reporting & Resolution SLA Defined timelines for responding to and fixing reported bugs. |
No information available | |
User Feedback Loop Allows real users to report issues and suggest improvements. |
Feedback loop supported via portal, plus IBM support channels. |
Guided Onboarding Step-by-step instructions for initial setup for users and administrators. |
Guided onboarding for admins and users in the portal and documentation. | |
In-App Tutorials & Help Embedded resources to assist new or returning users. |
In-app tutorials and help included in both admin and client apps. | |
24/7 Help Desk Support Continuous support by phone, chat, or web. |
Standard 24/7 support via chat, phone, or web. | |
Knowledge Base Online repository of FAQs, guides and troubleshooting tips. |
Knowledge base available online for clients and admins. | |
Dedicated Account Manager Assigned specialist for organizational needs and issue escalation. |
Dedicated account manager available for enterprise contracts. | |
Flexible Deployment Options Supports cloud, on-premises, or hybrid deployment models. |
Cloud, on-premises, and hybrid deployment models supported. | |
User Role Training Programs Custom training by user function (advisor, admin, client). |
User role-based training resources provided in documentation and via IBM services. | |
API Documentation Complete documentation for developers integrating the platform. |
API documentation provided for integration and automation. | |
Test/Sandbox Environment Safe environment for testing new features/configurations. |
Test/sandbox environments offered for policy testing and rollout. | |
Feedback & Feature Request System Enables users to submit suggestions and requests for enhancements. |
Feature request and user feedback submission enabled via support portal. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.