Mobile Threat Defense (MTD) & Cyber Security for Mobile Devices
What is Mobile Threat Defense?
Mobile threat defense (MTD) solutions are aimed at protecting organizations from threats on iOS, Android and Chrome devices by preventing, detecting and remediating attacks.
Why Mobile Devices Need to be Protected
Let’s think about this.
- There are over 3.5 billion smartphone users globally;
- Smartphones increase productivity by 34%;
- 60% of the enterprise endpoints are mobile;
- Employees use 5 to 10 business app daily on their mobile phones; and
- Mobile devices are becoming digital IDs to access enterprise services and data.
It’s no wonder mobile devices have become the most appealing attack surface for today’s cybercriminals. The number of reported cyber-attacks targeting mobile devices has more than doubled every 6 months for the last three years. Attack vectors such as device, network, application and phishing (“DNAP”) continue to be the primary focus for hackers. And with remote work and bring your own device (BYOD) practices becoming a permanent fixture, the attack surface for an enterprise is on pace to grow exponentially.
The Most Innovative Defense Against Advanced Mobile Threats
Whether you are extending your existing antivirus and IT security measures to cover corporate-owned devices, or implementing a BYOD policy, you need to look beyond the conventional IT security tools and policies for enterprise mobility management to address today’s advanced mobile threats.
Detecting and protecting against mobile cyber attacks calls for innovative technology, explicitly designed and built for mobile platforms. This is what differentiates Zimperium solutions from other security and antivirus vendors who claim to offer mobile security.
The Zimperium Mobile Threat Defense (MTD) platform provides continuous, on-device monitoring and analysis capabilities to detect mobile cyber attacks in real time. Powered by its z9™ detection engine and patented machine learning based models - developed and refined through years of threat intelligence research - the solution dynamically and accurately identifies malicious attacks. It also detects and classifies any zero-day attacks regardless of the entry point.
The Zimperium app running locally on the device doesn’t require signatures, a cloud-based sandbox or even an Internet connection, meaning users are always protected and alerted to any actions needed. Even when in airplane mode, roaming or plugging into a port, there is no waiting hours or days to find out if a device has been compromised.
On-device detection architecture enables all of your mobile devices to become powerful sensors to alert users and management to enterprise threats from mobile device endpoints across your organization.
Only the Zimperium platform delivers continuous and real-time threat defense to both mobile devices and the applications running on them. Enterprises benefit from the most responsive protection on the market against known and unknown cyber attacks.
With Zimperium, you receive comprehensive mobile threat defense against more than 40 known attack vectors, as well as detection and mitigation of new ones that haven’t yet been discovered. Your devices are protected against advanced phishing, device, network and application cyber attacks in real time.
- Phishing – On mobile devices, email, SMS and even messaging apps are susceptible to phishing attacks;
- Device – OS/kernel exploits (Android/iOS/Chromebook), profile/configuration modifications, system tampering, physical USB/SD card exploits;
- Network – Reconnaissance scans, Man-in-the-Middle, SSL stripping, SSL decryption attempts, rogue access points; and
- Application – Malicious apps, known and unknown malware, dynamic threats abusing download and exploit techniques.
When a threat is detected, end users receive contextual alerts and recommendations to help remediate the situation. The platform also notifies the security team to keep them informed.
Security teams gain best-in-class visibility across all mobile devices in the organization to assess enterprise risk, identify security gaps and update policies to adapt and improve their device and application protection. Dashboards and detailed reporting make it easy for security administrators to manage risk and monitor incidents on protected devices.
Incident response teams get actionabe phishing, network, device and malware threat forensics for all declared mobile security events. They can understand the who, what, where, when and how of each threat event. Using these contextual forensics, IR teams can take action to prevent a single compromised device from turning into an outbreak.
Zimperium provides just the right amount of control at each level of an organization to efficiently monitor and mitigate advanced mobile threats while respecting the unique policy and privacy requirements of the organization.
Our ability to integrate simultaneously with multiple EMM/UEMs, support on-premises and cloud deployments, granular access control and enforce group based polices, allows us to help customers achieve their mobile security outcomes.
Our platform works seamlessly with leading Enterprise Mobility Management (EMM)/Unified Endpoint Solution (UEM) solutions including Microsoft, VMware, BlackBerry UEM, Citrix, MobileIron, and Samsung, and adapts to support any SIEM solution through a REST-based API.
Rather than sending a stream of alerts to already overwhelmed security teams, Zimperium’s risk dashboards allow InfoSec teams to focus on critical areas and establish automated actions within the platform to respond and remediate issues in an efficient manner. Administrators can also setup custom email notifications to ensure the right Security and Risk stakeholders are made aware in a timely manner.
Research and Innovation
Zimperium may have delivered an award-winning, disruptive solution to market, but since mobile threats will never stop evolving, we’ll never stop innovating. Our zLabs, is considered one of the leading mobile security research groups in the world. This select group of mobile security experts discovered and documented attacks such as Stagefright on Android, zIVA on iOS and provided detailed analysis of the FreeRTOS TCP/IP Stack Vulnerabilities. They are repeatedly sought out by other security teams for collaboration, as well as to provide insights on cyber attacks to the media.
Following the Stagefright vulnerability discovery, zLabs established the Zimperium Handset Alliance, composed of 30+ leading mobile network operators (MNOs), OEMs, and app developers, to boost cooperation within the mobile ecosystem and to help accelerate security improvements in Android.