Mobile Security to Protect Research
& Private Data | Pharmaceuticals
Pharma Teams Need Mobile Security
“We replaced a competitive solution with Zimperium because it was more enterprise ready and provided the best protection for our intellectual property and other confidential information. We were especially impressed by Zimperium’s on-device, proactive threat detection, its 360 degree coverage of all major risks and compliance issues and for the solution’s administrative advantages like support for multiple MDMs in a single tenant.”
– Head of Information Security, Multinational Pharmaceutical Company
Zimperium Secures Connected Apps for Leading Medical Device Manufacturer
For this leading medical device manufacturer, when a mobile app is compromised the consequences can be dire: life can be lost, FDA approval can be withdrawn making it impossible for the product to be sold, or proprietary IP can be stolen. Thanks to Zimperium’s zKeyBox and zShield, their mobile applications are more resilient to inspection, tampering, and IP theft.
Pharmaceutical Employees Devices at Risk
The proprietary intellectual property, patient data and legal documents flowing through a pharma company have very high potential value for cybercriminals and industrial spies. Trade secrets in this arena can impact multi-million dollar revenue streams.
Researchers, executives and business reps of pharma companies are increasingly relying on mobile devices for both work and personal use, and employees may be accessing company data outside the office to stay productive. Even if corporate IT tries to lock down device usage, security in a world of connected smartphones, tablets and IoT devices, in labs and in the field, cannot be entirely assured by conventional methods.
Protecting employee devices
Employees who are using company-issued devices, or their own devices in a bring-your-own-device (BYOD) scenario, may not keep their devices updated or be aware of high- risk behaviors such as attaching to unknown Wi-Fi networks, downloading malware by clicking on an unknown link or site, or something as simple as letting a child download apps or play on the phone while traveling.
Mobile devices have some security features built-in, but new “DNA attack” vulnerabilities are discovered every day, and new Android, iOS and Chromebook updates are constantly posted. There are also privacy policies and regulations on security management and legal documentation on how much control a corporation can have over an employee’s device and the data on it.
Rogue networks and spy devices
Securing the company’s corporate and laboratory networks may not be enough to prevent new forms of network attacks. Hackers can set up a fake “Free Wi-Fi” access point to lure employees and visitors to connect, then act as a Man-in-the-Middle (MITM) to capture private data, compromise devices or take control of devices to operate them remotely.
Apps need security too
Pharma companies are starting to find promising results by using mobile apps to better serve patients and physicians. These apps can offer prescriptive advice, medication reminders and other health management tools, as well as facilitating real-time interaction and feedback in clinical trials.