Currently browsing: Mobile Security

Don’t take a knife to a gunfight – the mobile security dilemma

Zimperium is growing with more customers, partners and most recently, more talent! We’re pleased to announce the appointment of John Michelsen to the role of Chief Product Officer, CPO. John will be working closely to manage our development and product roadmap to continue our commitment to excellence for our enterprise […]

Read more

The Real Mobile Threat Landscape

What Is a Mobile Threat? The sophistication and continuous evolution of advanced threats is a serious problem for modern enterprises. Mobile malware, malicious apps, targeted data-stealing attacks on iOS and Android devices are introducing new challenges for IT security. Like viruses and malware that can infect your PC, there are […]

Read more

Cutting through the Weekly Mobile Security Noise

    Introducing Our New Blog Series: Cutting through the Weekly Mobile Security Noise The worlds of mobile and security generate news at a breakneck pace. And when you operate at the intersection of those two markets, like Zimperium, it can be overwhelming to process what’s happening on an hour-to-hour […]

Read more

Legacy Mobile Security Solutions Leave Gaps

Complete Visibility to Traffic is Key to Delivering True Mobile Security Legacy approaches to securing mobile devices only solve pieces of the mobile security problem. Enterprises need to adopt a true security solution optimized for mobile that provides complete visibility and protection against known and unknown threats. Ideally, this solution […]

Read more

Is Your Mobile Device Putting Your Company at Risk?

The Three Ways Your Mobile Device is Putting Your Company at Risk The explosion of mobile devices has changed the way people live and work. Enterprises want to take advantage of the productivity benefits mobile devices present without compromising an organization’s sensitive IP. With more business being conducted on the […]

Read more

Shellshock – Find out if your mobile device is vulnerable

Today a new vulnerability was discovered called “Shellshock,” that targets BASH, a popular software widely used to control the command prompt on many *nix computers. Shellshock has the potential to wreak havoc on websites, web servers, PCs, routers and more because it enables hackers to gain complete control of an […]

Read more

Get started with Zimperium today