Another Milestone: Zimperium Available In Azure Marketplace and Still the Only MTD Capable of Running on Azure Cloud

Since early 2017, Zimperium has been the only MTD solution that can be hosted in Azure Cloud and integrated with Azure AD and Intune EMS to protect O365 deployments. Integrated with Azure AD / Intune, Zimperium MTD enables risk-based compliance policies to eliminate mobile devices from being used in advanced attacks against corporate systems and … Read More

Webinar: Top Mobile Security Predictions for 2019

Webinar highlights hackers’ evolving attack methods and predicts shifts in mobile threat landscape in 2019. Zimperium is providing customers, media and the general public with a live webinar in which they will learn about Zimperium’s top mobile security predictions for 2019. The webinar will also discuss why more organizations are prioritizing mobile security and implementing … Read More

Zimperium Scales into the Billions (that’s with a “B”)

Seven thousand events per second. Six hundred million events per day. Two hundred billion (that’s with a “B”) events per year. That is how many events Zimperium processes while providing the world’s best enterprise mobile threat defense (MTD) solution! Not only do we have the best solution, we have the most scalable one too! As … Read More

PSD2 Compliance for Mobile Devices: What Banks Need to Know

The moving target of regulatory compliance rarely slows down. Now, banks have yet another target to aim for: PSD2. The European Commission’s Revised Payment Services Directive, PSD2, regulates payment services and payment service providers (PSPs) such as banks. In fact, PSD2 applies any kind of business providing electronic and non-cash payments, including mobile and online payments, … Read More

FreeRTOS TCP/IP Stack Vulnerabilities – The Details

Researcher: Ori Karliner (@oriHCX) Following our blog from last month, this blog will cover the technical details of our findings. If you suspect that any of your devices are affected by these vulnerabilities and want our assessment, contact us at General information Before we dive into the vulnerabilities, there are some important things to … Read More