Mobile Applications
Mobile Application Security
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
Mobile Security Solutions by Industry
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
Company
About Us
Blog
Careers
Newsroom
Support
Partners
Partner Network
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
›
Mobile Security Solutions by Industry
›
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
›
Company
›
About Us
Blog
Careers
Newsroom
Support
Partners
›
Partner Network
Become a Partner
Jim Kovach
Mobile Security Specialist, Public Sector
Posts
Q&A with CISA’s Jen Easterly: Every Part Of Our Interconnected Ecosystem Needs Securing, Including Mobile
NCCoE Issues New Guide for Deploying Zero Trust Architectures
Complying with CMMC Configuration Management Requirements: Why Patching Isn’t Enough
NCCoE’s Latest Guidelines for BYOD Security and Privacy
Why Multi-Factor Authentication (MFA) is Not Enough to Meet CMMC Requirements
More Than MDM: Mobile Device Security for CMMC Compliance
How Federal Agencies Should Prioritize and Address the Requirements Set forth by OMB
Keeping Texas Secure: Zimperium Earns Highest Level of TX-RAMP Certification
NCCoE Guide on Zero Trust Architectures: Draft Released
Zimperium Joins NIST Project on Zero Trust Architectures
Mobile Threat Defense for OMB Memorandum M-22-09
NSA Reports Rise in Publicly Known and Active Wi-Fi Attacks
Zimperium Announces Government User Group
The President’s Executive Order on Cybersecurity is a Massive Shift for Security
NIST’s Guidelines to Improving BYOD Mobile Device Security and Privacy
CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough
FBI Warns of Wi-Fi Attacks Targeting Teleworkers at Hotels Due to COVID
How to Leverage MTD Solutions to Comply with NIST 800-124r2 Guidelines
MDMs and MTDs - Different Solutions Addressing Different Problems
Why Mobile Threat Defense is an Absolute Requirement to Protect O365/Teams Users & Zero Trust Efforts
What Truly Matters for Remote Workers Using GFE and BYOD Mobile Devices