zIPS Identifies Dangerous Wi-Fi Networks with Danger Zone

Zimperium added a couple of new features and screens to zIPS today based on customer demand. Our users understand the threat that mobile devices introduce into enterprises and have used zIPS to monitor for threats on Wi-Fi, apps and OS exploits, but some asked to peek under the screens a little more to understand how zIPS … Read More

Zimperium Wins Best Mobile Security Product for Cybersecurity Excellence Awards

We are ecstatic to win, for the second year in a row, a Cybersecurity Excellence Award. Our Mobile Threat Defense platform won for Best Mobile Security product for 2017. The Cybersecurity Excellence Award is a prestigious award that honors individuals, products and companies that demonstrate excellence, innovation and leadership in information security. This independent awards … Read More

Secure Your Smart Phones at RSA with Zimperium

Mobile is Your Greatest Cyber Vulnerability and the Zimperium team will be demonstrating the latest in enterprise Mobile Threat Defense at RSA. Get a Trial at the Expo Booth Visit our expo booth N4710, Moscone North to meet with the zLabs Global Threat Intelligence team, for an in-depth look at our industry-leading research and Mobile Threat Defense … Read More

Zimperium Announces Its Exploit Acquisition Program for N-Days

Your million dollar 0day just got burned and now worth nothing? No worries – we are still interested in your exploit. The value of 0days can range from a few thousands to even a million dollars for a full remote exploit chain and many companies and governments are willing to buy them. The problem with … Read More

What is Mobile Threat Defense?

“It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used…” Gartner Market Guide for Mobile Threat Defense Solutions, John Girard, Dionisio Zumerle, 28 July 2016 Mobile Threat Defense (MTD) solutions protect mobile platforms by detecting threats to devices, operating … Read More