Combating Pegasus with Zimperium and ZecOps

Share this blog

In light of the latest leaked data highlighting the Pegasus spyware and its use in targeting thousands of individuals around the world, it is time to address the elephant in the room. Mobile endpoint security is a critical component of our digital lives, both for work and personal. But the actual adoption of mobile security strategies and solutions is often met with a passive response from many phone users.

Mobile endpoints are more than phones. They are full-fledged computers that connect to the same data and programs as traditional endpoints. And yet, here we are looking at the remnants of a multi-year espionage campaign targeting the devices of high-profile members of society as well as everyday Joes and Janes. These mobile endpoints, chock-full of corporate and private data, were targeted and exploited by aggressive mobile spyware designed without any of the victims being aware.

The corporate and private world’s reliance on mobile endpoints continues to grow and it is time for the mobile security mindset to catch up. Just as security and IT administrators adopted advanced security solutions that could scale with the traditional endpoint threats of the day, the mobile device also needs a similar security approach. And legacy mobile security solutions just are not able to keep up with the advanced nature of the modern mobile threat, especially espionage campaigns with technological development like Pegasus.

Zimperium and ZecOps have partnered up to secure enterprise mobile Android and iOS endpoints with the same advanced security technology as traditional endpoints. The two partnered solutions provide security operations teams with:

  • Real-time, on-device protection from Zimperium, and
  • Advanced digital forensics and incident response from ZecOps.

The combination is completely unique and enables organizations to protect and respond to all modern mobile threats, attacks, spyware, and zero-days.

Together, Zimperium and ZecOps provide:

  • Protection against the broadest array of mobile attacks by detecting device, network and application and phishing attacks on-device and in real-time;
  • Highly detailed post-attack forensics showing when and how devices were attacked;
  • Automated investigations, shortening costs and time from months to minutes; and
  • Organization-wide disinfection and stop re-infections.

Enterprises are at risk every day against industrial espionage and other criminal activity, and the Pegasus espionage campaign is just one example of the techniques used by malicious parties against mobile devices and their users. This threat alone highlights the need for advanced security solutions for mobile devices, protecting users and their data from espionage.

Without the necessary visibility, on-device security, and forensic data capabilities, security operation teams are leaving their mobile endpoint users and all the data they have access to at risk. Zimperium and ZecOps provide the only comprehensive mobile detection, forensics, and incident response solution for enterprises of all sizes to confidently secure their iOS and Android mobile devices.

About ZecOps

ZecOps develops the world’s most powerful platform to discover and analyze mobile cyber attacks. Used by world-leading governments, enterprises, and individuals globally, ZecOps Mobile EDR provides a realistic and scalable approach to mobile threat hunting. ZecOps enables automated discovery of 0-day attacks and Advanced Persistent Threats (APTs), delivering anti cyber-espionage capabilities within minutes. Headquartered in San Francisco, ZecOps was co-founded by Zuk Avraham, a security researcher and serial entrepreneur who previously founded Zimperium.

About Zimperium

Zimperium, the global leader in mobile security, offers the only real-time, on-device, machine learning-based protection against Android, iOS, and Chromebook threats. Powered by z9, Zimperium provides protection against device, network, phishing, and malicious app attacks. For more information or to schedule a demo, contact us today.

Avatar photo
Author: JT Keating
Strategic Initiatives. View the author's experience and accomplishments on LinkedIn.

Get started with Zimperium today