What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment … Read More

The First FedRAMP “Authority to Operate” MTD Solution: Zimperium Federal Cloud

Zimperium, the global leader in mobile threat defense (MTD), is the first MTD provider to be granted an Authority to Operate (ATO) by the U.S. Department of Homeland Security and U.S. Immigration and Customs Enforcement under the Federal Risk and Authorization Management Program (FedRAMP). A cloud-based application deployed on the AWS GovCloud infrastructure, the Zimperium … Read More

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #5: Deployment Technology & Workflow Integrations

Our final webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Deployment Technology & Workflow Integrations, and took place on July 24, 2019. JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, led the session. Different enterprises utilize different deployment … Read More

Latest Android Malware is Not a Surprise; Zimperium Customers Protected

According to news reports, a new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module.   It’s believed the malware originated from a Chinese internet company that helps Chinese Android developers publish and promote their apps in foreign markets. The malware was disguised as Google-related updaters and … Read More