Posts in "Mobile Security"

Unified Endpoint Security with VMware & Zimperium

We have said this many times: an endpoint is an endpoint is an endpoint. Today, users perform more than 80% of their daily work on mobile devices. These devices contain or have access to the same information and applications traditional endpoints (laptop, desktop) do.  Unfortunately, they also expose organizations to new threats that must be … Read More

A Deeper Dive into Phishing Attacks

written and researched by Nicolás Chiaraviglio and Santiago A. Rodriguez As mentioned in our blogpost on mobile phishing, there are different types of phishing attacks. Here, we’ll dig deeper into the different types that exist. Moreover, we’ll take a look at phishing kits, a tool that allows non-technical scammers to execute successful attacks.  All phishing … Read More

Gone (Mobile) Phishing

written and researched by Nicolás Chiaraviglio and Santiago A. Rodriguez CISOs worldwide are scrambling to address phishing attacks. In the second quarter of 2019 alone, there were close to 130 million phishing attacks, taking place on different types of devices within an enterprise – – desktops, laptops and mobile devices. And as unfortunate as it … Read More

Zimperium First to Integrate Mobile Threat Defense with Microsoft Azure Sentinel SIEM Solution

Zimperium now integrates with Endpoint Manager (formerly Intune), Microsoft Defender ATP, Azure Active Directory and Azure Sentinel SIEM In January, we announced our integration with the Microsoft Defender Advanced Threat Protection (ATP) endpoint detection and response (EDR) solution. Our mobile threat defense (MTD) integration with Microsoft Defender ATP provides customers with a single pane of … Read More

Zimperium Introduces Mobile Threat Advisory Services

Customized Threat Intelligence Reports Crafted by Mobile Security Experts Provides Meaningful, Actionable Insights for CISOs, CIOs and Security Operational Teams to Effectively Protect Enterprises   Data overload can cause security teams to feel overwhelmed and create desensitization to real threats. What’s more, analyzing mobile threat data to derive actionable insights requires specific expertise not available to … Read More