Techstep Essentials MDM + Pradeo

Techstep Essentials MDM + Pradeo

Your digital bodyguard who never sleeps (and never takes a vacation)


Tomek Sawko
Tomek Sawko
Techstep Essentials MDM + Pradeo
Opublikowane przez Tomek Sawko

Mobile Threat Defense (MTD) is a topic that is still treated as a stepchild in many companies.

Let’s not kid ourselves – most of you, when thinking about smartphone security, picture a PIN code, encryption, and possibly remote data wiping when an employee leaves their phone in a taxi. This is the absolute basics, digital hygiene. But in 2026, this is definitely not enough.

Why? Because thieves and hackers have also moved with the times. Today, no one steals a phone to sell it at a pawn shop for parts (okay, it happens, but it’s marginal). Today, a phone is a gateway to your cloud data, to Microsoft 365, to Salesforce, to banking. And the key to this gateway is no longer a crowbar, but sophisticated phishing, a malicious „flashlight” app that reads SMS messages, or fake Wi-Fi in a hotel lobby.

That’s why today we’ll take a look at a solution we know well – TechStep Essentials MDM (formerly Famoc), but this time paired with Pradeo technology.

What is it, how does it work „under the hood,” and why is it worth your attention? Let’s dive in.

What exactly is Pradeo?

If you’re in the security industry, you’ve probably heard this name. Pradeo is a French company (I emphasize: French, meaning European, which matters – but more on that later), which is one of the world leaders in Mobile Threat Defense (MTD). It’s a company that from day one has focused on one thing: protecting mobile devices and applications. And it does it well enough to be featured in reports by Gartner, Forrester, IDC, and Frost & Sullivan as a leading provider in the MTD category.

So in short: Pradeo is like a very intelligent digital bodyguard that sits inside your phone and analyzes everything that happens. But it doesn’t work like a classic ’90s antivirus that scans files looking for signatures (though it does that too). Pradeo works behaviorally. It looks at the behavior of applications, networks, and the operating system.

Protection is based on three pillars / attack vectors (so-called 360-degree protection):

Trzy filary ochrony Pradeo

Application threats (77% of all mobile threats)

And this is where Pradeo shines brightest. The system analyzes actual application behavior, not just declared permissions. The difference is colossal. Take TikTok (every admin’s favorite…) — in its permission declarations it looks innocent, but behavioral analysis reveals that the app collects geolocation, contacts, messages, call history, and even financial data. Pradeo detects this and classifies it as an invasive application.

The same applies to 0-day malware — malicious software that doesn’t yet have a virus signature in any database. According to Pradeo, as much as 95% of mobile threats are 0-day. Traditional antiviruses don’t see them. Pradeo detects them based on behavioral analysis — it observes what the app actually does (whether it records audio, sends data to suspicious servers, tries to install other apps, modifies system files), rather than looking for it on a blacklist.

At the application level, Pradeo also detects:

  • Known malware with virus signatures
  • Analyzes data processing (audio/video recording, access to files, SMS, contacts)
  • Identifies invasive and vulnerable third-party libraries
  • Detects suspicious behaviors: uninstalling CA certificates, forcing restarts, hiding icons

Network threats (9% of mobile threats)

Here Pradeo detects:

  • Phishing, Smishing, and Quishing (phishing via QR codes) — regardless of channel
  • Man-in-the-Middle (MitM) attacks
  • Rogue Cell Towers
  • Fake Wi-Fi access points and ARP poisoning attacks

A MitM attack on public Wi-Fi is not a theoretical threat. During one of TechStep’s webinars, they cited a case from Germany where soldiers lost confidential data precisely by connecting to public Wi-Fi. Pradeo detects such attacks in real-time and disconnects the device from the dangerous network.

System threats (14% of mobile threats)

That is, everything admins „love” most: root/jailbreak, operating system vulnerabilities, outdated OS versions, host file modifications, debugging and developer mode. From SDK version 1.6.0, hook detection was also added — attempts to hook into running processes.

Game Changer: Integration, or „One to Rule Them All”

Okay, you’ll say: „Tomek, but MTD is nothing new. We have Check Point, Zimperium, Lookout.” Agreed. However, there are three types of solutions operating in the mobile security market, and it’s worth distinguishing them:

MTD with deep behavioral analysis (Pradeo): This is Pradeo’s approach. The AI engine analyzes millions of applications and understands what is normal behavior and what is an anomaly. This allows detection of 0-day threats and invasive applications that technically aren’t malware.

EDR extended to mobile (CrowdStrike, TrendMicro, MS Defender): They originate from PC. They often don’t understand mobile specifics (containerization, sandboxing).

MTD based on risk analysis (CheckPoint, Zimperium, Lookout): Solid in network, but at the application layer they often limit themselves to known threat databases.

CriterionEDR extended to mobileRisk-based MTDBehavioral MTD (Pradeo)
Technology originDesktop/server protectionNetwork security / consumerDedicated mobile security
Example providersCrowdStrike, TrendMicro, Microsoft DefenderCheckPoint Harmony, Zimperium, LookoutPradeo
Mobile expertiseLimited — PC logic transferred to mobileMedium — focus on network and known signaturesDeep — 10+ years exclusively mobile
0-day malware detectionWeak — based on signatures from PC ecosystemPartial — mainly known patternsYes — AI behavioral analysis
Application behavior analysisNo — checks signatures, not behaviorsPartially — declared permissionsYes — actual behaviors vs declarations
Invasive app detectionNoLimitedYes — TikTok, Temu, Facebook, etc.
Android Enterprise dual-profile protectionLimitedPartialFull — both profiles with privacy maintained
Data processingVendor cloud (often outside EU)Vendor cloudOn-device + European cloud
Knowledge of mobile specifics (sandbox, containerization)LowMediumHigh

What specifically does Pradeo do better?

FeaturePradeoCheckPoint HarmonyZimperiumLookoutCrowdStrike (Falcon Mobile)
0-day malware detection (behavioral)⚠️ Partially⚠️ Partially⚠️ Partially❌ Based on signatures
Actual app behavior analysis⚠️ Limited⚠️ Limited
Invasive app detection (non-malware)⚠️ Partially
Both Android Enterprise profiles protection⚠️ Partially⚠️ Partially⚠️ Partially
Phishing/smishing/quishing⚠️ Limited
Man-in-the-middle detection⚠️
Rogue cell tower detection
Root/jailbreak detection
Hook detection✅ (from SDK 1.6.0)
On-device antivirus scanning✅ (from SDK 1.6.0)
On-device protection (offline)✅ (Core layer)⚠️ Partially⚠️ Partially⚠️ Partially
GDPR compliance report per app
Log export to EMM/UEM
European infrastructure (data in EU)✅ (OVHcloud FR/DE)❌ (Israel/USA)❌ (USA)❌ (USA)❌ (USA)
Government certification (CCN/CIPSTIC)
Native integration with TechStep Essentials✅ (SDK in agent)Via APIVia APIVia APINone
* The above comparison is based on publicly available Pradeo comparison materials and documentation from individual vendors. Each of these products is developing dynamically and features may change from quarter to quarter. Treat this as a snapshot, not a verdict.

In the case of TechStep Essentials MTD, we’re dealing with something that we admins love most: total integration.

Usually, MTD deployment looks like this: you have an MDM agent (for management) and you need to install a second application (for protection). This means:

  • two icons on the desktop
  • two processes draining the battery (users love that, right?)
  • two management consoles (one for policies, another for alerts)
  • synchronization issues

With the TechStep + Pradeo duo, it looks different. Pradeo technology has been embedded directly into the Essentials MDM agent.

AspectMDM only (without MTD)Separate MDM + MTD (two systems)TechStep + Pradeo (integrated)
Malware and threat detection❌ None✅ Yes✅ Yes
Number of agents on device12 (MDM + MTD)1 (shared agent)
Number of management consoles121
Automatic app blocking⚠️ Only manually, after the fact⚠️ Depends on API integration quality✅ Native, real-time
Conditional access based on threats⚠️ Requires connector configuration✅ Native — MTD status synchronized with UEM
MTD deployment timeDays/weeks (separate infrastructure)Hours (toggle in console)
User experienceNeutralWorse — two agents, two sets of notificationsUnchanged — user sees one app
Remediation on Samsung devices (Knox)⚠️ Basic⚠️ Limited without native integration✅ Full — stop activity + removal
Offline protectionDepends on MTD✅ Core layer works without connection
Compliance reporting (NIS2, DORA, GDPR)⚠️ Only device inventory⚠️ Two separate reports✅ One dashboard — threats + management
On-premise deployment modelDepends on MDMUsually impossible for MTD✅ Full support (10+ year commitment)
Data sovereigntyDepends on MDMUsually MTD data outside EU✅ Everything in European infrastructure

How does it work technically?

The SDK (Software Development Kit) mechanism is used here. Pradeo’s code is part of the Essentials application. For the user, it’s transparent. There’s no second application. No additional login.

From the admin’s perspective:

  1. You enter the Essentials console
  2. Select a policy
  3. Slide the „Enable MTD” toggle (Activate on demand)
  4. Enter the license key
  5. Done

The agent on devices receives the signal, activates the Pradeo module, and starts protecting. This is the famous Zero Touch in practice. You don’t have to ask users: „Please install this antivirus.” You do it for them, remotely, with one click.

Under the Hood: RASP, Core and Advanced – How Does It Work?

Since we’re on technical details, let’s go deeper. The effectiveness of this solution is based on RASP (Runtime Application Self-Protection) technology.

I know, it sounds like gibberish, but in practice it’s a piece of solid engineering. RASP means that protection works inside the application (in this case the MDM agent) in real-time.

Pradeo in this edition works on two tracks:

1. CORE level (local)

This is the first line of defense. It works directly on the device, even offline.

  • Detects known threats (virus signatures)
  • Detects root/jailbreak
  • Checks device configuration (whether debug mode is on, whether encryption works)
  • Responds immediately

2. ADVANCED level (cloud + AI)

This is the „brain” of the operation. If the agent on the phone sees something suspicious that it doesn’t recognize (e.g., an app starts behaving strangely), it sends metadata (not files, only information about behavior!) to Pradeo’s cloud. There, artificial intelligence (Machine Learning) analyzes it in the context of millions of other events. Thanks to this, it detects so-called Zero-Day Threats – threats that are so new they don’t yet have signatures.

Thanks to this division, the solution doesn’t kill the battery. Heavy analytics happen in the cloud, while a lightweight agent runs on the phone checking basics and reporting anomalies.

Below is an illustrative chart showing real-time attack activity at the application layer.

What Does This Protect Us From? Real-Life Examples

Theory is theory, but what does this give in practice?

Intrusive Apps

During one of the webinars organized by Techstep, a great example of TikTok or Temu was given. These aren’t viruses. Google Play allows them. But these apps can extract huge amounts of data (phone book, location, clipboard). Essentials MTD can block such apps on the work profile or completely prevent their installation, not based on „whim,” but on real analysis of what the app does with data.

Network Espionage

Remember the story of German soldiers who connected to hotel Wi-Fi and their conversations leaked? That’s a classic Man-in-the-Middle. Pradeo detects that the SSL certificate of the site you’re connecting to has been replaced, or that the GSM base station you’re connected to is not a real operator station, but a „spy suitcase” (IMSI Catcher).

Quishing (QR Code Phishing)

A new plague. An employee scans a QR code on a parking meter (fake, stuck over the real one), which redirects them to a page phishing for M365 login credentials. Pradeo analyzes the URL before the page loads and blocks access.

Data Sovereignty – Why Does It Matter?

Finally, an argument that for many companies (especially government and financial) may be decisive.

Both TechStep (Norway/Poland) and Pradeo (France) are European companies. Pradeo’s infrastructure is located in Europe (mainly France and Germany). This means full compliance with GDPR and upcoming NIS2 and DORA directives.

In an era when transferring data to the US or China raises (justified) concerns, having a security provider that is subject to EU jurisdiction is a huge advantage. Your threat data doesn’t land on servers overseas.

Summary

The integration of TechStep Essentials MDM with Pradeo is for me one of the most interesting moves on the market recently. We’re turning two separate entities (management and security) into one cohesive organism – this is the first solution I’ve seen where security isn’t glued on with duct tape, but sits inside the MDM agent.

Why is it worth it?

  1. Convenience: one console, one application, one deployment
  2. Automation: threat detection -> automatic MDM response (e.g., device quarantine)
  3. Effectiveness: protection against what antiviruses don’t see (app behaviors, network)
  4. Legal peace of mind: European solution, compliant with regulations

If you already have Essentials MDM, ask your account manager (e.g., at Plus operator, which is a certified Techstep partner) about testing the MTD module. It’s usually a matter of a few clicks, and the security level of your fleet jumps up several levels.

And if you don’t have it – well, maybe it’s a good time to rethink your strategy before someone scans a „fake” QR code in the company parking lot.

Until next time!

Komentarze

Powiązane wpisy

Guides

Conditional Access

Step by step: Configuring Conditional Access in Azure AD and Compliance Policies in Intune Hi! Today we’re tackling a topic that keeps many admins up at night, while...

Opublikowane przez Tomek Sawko
News

PlusINSIDER Webinar

I Tamed Wild Devices on Camera! A long, long time ago, in a studio not so far away… I appeared on the PlusINSIDER program, where together with Przemysław Białkowski we...

Opublikowane przez Tomek Sawko