Hi [[ session.user.profile.firstName ]]

Zimperium - Mobile Threat Protection

  • Date
  • Rating
  • Views
  • Mobile Endpoints: Detect Threats and Improve Mobile Security Mobile Endpoints: Detect Threats and Improve Mobile Security Andrew Kellett, Principal Analyst, Ovum; John Michelsen, Chief Product Officer, Zimperium Recorded: Sep 20 2016 47 mins
    Controlling and protecting smartphones and tablets and the applications they run is an important part of the extended endpoint protection environment. Endpoint security is vital, and you need to treat your mobile endpoints with the same urgency as your Windows and server endpoints.

    Join Zimperium’s latest webinar featuring Ovum’s Andrew Kellett. Andrew and John will discuss the importance of adding mobile devices to your endpoint security procedures and how to detect attacks via mobile OSs, applications, malware and Wi-Fi networks.


    - Mobile Devices are a Viable Vector of Attack
    - Ovum Research: Endpoint Security & Mobile Security Requirements Differ
    - Enabling mobile devices as threat detection sensors
  • The Biggest Threat To Enterprises Comes on the Smallest Screen The Biggest Threat To Enterprises Comes on the Smallest Screen Zuk Avraham, Founder, CTO and Patrick Murray, VP Products, Zimperium Recorded: Dec 18 2014 40 mins
    The growth of mobile devices has already led to a significant rise in network attacks on wireless networks. With the recent wave of attacks like Shellshock, WireLurker, and now DoubleDirect, security professionals are predicting that 2015 will be the year previously undetected mobile attacks go mainstream. Hear from mobile security experts Zuk Avraham and Patrick Murray as together they explain how a mobile device changes the threat landscape forever. Learn how unsecured mobile devices provide a new entry point for hackers looking to infiltrate and compromise an organization. Zuk will dissect DoubleDirect, a new attack technique recently found in the wild by the Zimperium Security Labs to show how an iOS and Android device can be silently attacked. Patrick will share best practices to help modern enterprises securely embrace mobility initiatives for 2015 that support productivity, protect the corporate network and respect user privacy.

Embed in website or blog