In our second blog, I discussed why a mobile device needs to be protected. Exactly what are we talking about here? What are the ways an attacker can hack a mobile device to get what they need? Gone are the days where attackers throw USB thumb drives in parking lots hoping someone from the … Read More
Posts in "Mobile Threat Defense"
According to the 2018 McKinsey Global Institute’s Smart Cities: Digital Solutions for a More Livable Future, more than half of the world’s population resides in cities, with another 2.5 billion new residents expected by 2050. Cities face increasing environmental pressures and infrastructure needs – and growing demands from residents to deliver a better quality of … Read More
5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #3: Mobile Technology & Workflow Integrations
Our third webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” examined Mobile Technology & Workflow Integrations, and took place on July 10, 2019. JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, led the session and answered questions. A cornerstone … Read More
With 1 billion more mobile connections in the world than there are people in the world, it’s fair to say most people have a mobile device. Certainly, Zimperium works with clients in the public sector and the private sector, in countries and on continents around the globe, with organizations in every major industry, and with … Read More
5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #2: In-Depth Risk Analysis
Our second webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” looks at In-Depth Risk Analysis, and took place on June 26, 2019. Mobile devices are subject to risks that other enterprise endpoints are not. Mobile devices are now the de facto platform for productivity in … Read More