All posts tagged: Security Limitations on Smartphones

BYOD Security | Employee Mobile Devices vs Your Network

It used to happen all the time. People actually carried a work phone and a personal phone. There used to be a real cost to how companies and their employees used their digital devices. Now, with inexpensive and unlimited use cellular plans, the financial concerns of using a personal device […]

Read more

Privacy vs. Security

If you think about it, practically every type of security product in the market provides security through surveillance. Surveillance is the act of keeping a close watch over someone or something in order to prevent or detect. In law enforcement it’s looking for crime but in an IT sense it’s [...]
Read more

The Biggest Threat to Enterprises Comes on the Smallest Screen

Criminals may not have physical access to your device – but that won’t stop them from hacking your device remotely to steal sensitive and confidential data. The BYOD revolution is here to stay and enterprises need to adopt mobile security best practices that can help prevent cyberattacks like Shellshock, WireLurker, […]

Read more

JPMorgan Hacked: Wake Up Call For Enterprises to Secure Endpoints

Why $250 million didn’t protect JPMorgan from hackers… Late last month CBS Nightly News reported about a robbery at American’s biggest bank, JPMorgan. This attack was no ordinary hold-up. JP Morgan Chase fell victim to a targeted cyberattack, despite spending $250 million dollars on cybersecurity. According to the information disclosed […]

Read more

Security Limitations in Smartphones

In our previous blog post, we wrote about what’s planned for 2014. Since we’re aiming to change the world of mobile security, maybe a good place to start is to describe the security limitations on smart devices. Like a computer, right? Often, people think that mobile device security is exactly […]

Read more

How 2014 is going to be Z-Year

ZIMPERIUM recently announced a Series A fund-raising round of $8 Million. This will allow us to support all organizations demanding a change in current mobile security offerings; they are seeking advanced, next-generation security protection comparable to what you would expect in today’s sophisticated enterprise networks, but a solution which protects […]

Read more

Get started with Zimperium today