Zimperium Launches First-Ever iOS Security Solution That Protects Employees’ Devices From Cyberattacks Wherever They Go
Zimperium Mobile Threat Defense 2.0 leverages Zimperium’s patented on-device, behavior-based security solution to defend iOS devices against unknown and known network threats
SAN FRANCISCO – July 31, 2014 – It’s a jungle out there. It’s estimated that cybercrime may cost the global economy $3 trillion by 2020. Today Zimperium, the company protecting enterprises in the modern mobile workforce, is announcing the release of Zimperium Mobile Threat Defense 2.0, which now defends iOS devices from cyberattacks wherever business takes them. Today’s news addresses growing enterprise insecurity as employees increasingly practice “Bring Your Own Device” (BYOD) -- 90 percent of U.S. employees now use their smartphones for work purposes, but until now, there has been no solution that protects these devices (and the corporate data they contain) both inside and outside of the corporate network.
To protect your organization and start a free trial of Zimperium Mobile Threat Defense 2.0, visit: https://www.zimperium.com/zMTD2.0-evaluation.php
iOS devices are as vulnerable as Androids to network-based attacks
Enterprises wrongly trust iOS devices. Many companies assume that since iOS takes a “walled garden” approach with its carefully curated App Store, this means iOS devices are safe from all cyber threats -- but iOS devices are vulnerable to the same types of network-level attacks as Android devices, which MDM and antivirus solutions do not protect against.
These attacks include:
- “Man-in-the-middle” (MITM): A hacker on the same public Wi-Fi as their target intercepts the communication between the target and router.
- “SSL strip:” An attacker replaces the encrypted, “HTTPS,” version of a webpage with the unencrypted, “HTTP,” version to view the victim’s traffic in its unencrypted form (clear text).
- ”Reconnaissance scans:” After compromising a device, the hacker scans the network, gathering information around vulnerabilities or weaknesses to exploit.
- “Rogue AP:” A hacker creates a Wi-Fi access point -- generally at an airport, coffee shop, or next to an office -- to look identical to a legitimate network, and performs a man-in-the-middle attack on victims that connect.
- “Rogue Basestation”/“Femtocell:” A hacker steals the victim’s traffic while the victim is using the cellular network. Normally, the hacker places a fake antenna next to the physical location of a company to target employees.
The first-ever enterprise-grade mobile device security for iOS
Today, Zimperium is releasing version 2.0 of its Mobile Threat Defense solution, bringing network-level protection to iOS devices for the first time ever. Zimperium’s Mobile Threat Defense 2.0 includes zIPS, the world’s only Mobile IPS app, which uses behavioral learning on the device to defend against mobile attacks. The zIPS engine utilizes machine learning technology to understand how a device normally functions during daily use, and uses this understanding to detect when it starts to behave irregularly, allowing it to detect both known and unknown threats. This announcement follows the launch of zIPS on Android earlier this year, which brought both host and network on-device defense to Android for the first time.
In addition to zIPS, Zimperium’s Mobile Threat Defense suite 2.0 also consists of zConsole, a cloud-based mobile threat management console, and zANTI, a mobile network penetration testing toolkit.
“The most dangerous hackers aren’t going to limit themselves to hacking you through an app,” said Zuk Avraham, founder and CEO of Zimperium. “Enterprises are adopting a mobile workplace environment but aren’t protecting themselves adequately. Regardless of whether the device is iOS or Android, a hacker can leverage a network attack to help them infiltrate that device at a coffee shop, airport or anywhere else. Once that device is compromised, the corporate network is next, and it’s game over for the enterprise. The hacker can steal the company’s intellectual property without anyone noticing, as existing solutions fail to detect these threats.”
Additionally, Zimperium’s Mobile Threat Defense 2.0 also will see updates to zConsole. The mobile threat management console shows security officers actionable forensics about every incident during the lifetime of the devices – including where attacks happen, through what method and even who the attacker is. This lets security officers make time-sensitive decisions to protect the company from data theft by identifying compromised devices. Now, this platform will also include:
- Enhanced mobile threat forensics make it easier to investigate security incidents that have been prevented by zIPS. Forensics include over 15 new parameters by proximity, time and more to help provide context around how an attack took place and hard evidence of the attack.
- Added reporting filters by severity, compliance level and attack type to quickly locate specific mobile threat incidents within zConsole -- like bringing critical-level events to the forefront, isolating compromised devices, locating specific types of threats and more.
Zimperium is backed by early investors in Sourcefire: Mark Fernandes, managing director of Sierra Ventures, and Stephen Northcutt, former president of the SANS Technology Institute; as well as Samsung and Lazarus Investment Partners.
Zimperium is a privately-owned mobile security startup based in San Francisco, with an R&D center in Tel Aviv. Its flagship solutions protect mobile devices from cybersecurity threats. The company was founded in 2010 by CEO Zuk Avraham, a world renowned security researcher, and Elia Yehuda, an experienced hands-on security expert. Zimperium’s mission is to secure organizations from advanced cyber threats in an increasingly mobile world.
VSC for Zimperium
( Press Release Image: http://photos.webwire.com/prmedia/42381/190044/190044-1.png )
- Contact Information
- David Johnson-Igra
- Account Manager
- VSC for Zimperium
- Contact via E-mail
This news content may be integrated into any legitimate news gathering and publishing effort. Linking is permitted.