One manages an enterprises’ mobile devices; the other detects and prevents mobile device, network, phishing and malicious app attacks I recently had the pleasure of participating in a webinar with Mikel Draghici – a Principal Engineer at Zimperium – and JT Keating – our SVP of Marketing, in which we talked about the differences between … Read More
Underestimating the Importance of Mobile Security Suppose one of your business’s employees was out and about one day and her mobile device got hacked. The general consensus would be it’s not exactly a disaster. It’s unlikely that you store your enterprise’s intellectual property on a given employee’s smartphone. It’s not as if we have seen … Read More
As mobile has taken the lead in enabling enterprise user productivity, it has also become a prime focus for hackers. This reflects the reality that mobile endpoints have all the same access to corporate network resources and data as traditional endpoints and they are critical to Zero Trust/two-factor authentication efforts. Historically, the difference between mobile … Read More
Government agencies’ usage of Microsoft Office 365 and Teams has skyrocketed (over 900% for some agencies). Unfortunately, the cyber threats to the GFE and BYOD mobile devices that are accessing O365 has also significantly increased. Without implementing mobile threat defense (MTD) solutions, agencies and their “Zero Trust” initiatives are exposed and at risk. Adversaries only … Read More