Introducing Traps for Android

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

In March, we announced Traps 5.0 and the Traps management service, a cloud-based service designed to simplify administration and management of your endpoint security. One of the benefits of the Traps management service is the ability to innovate and introduce new features, faster. Today, we are excited to announce the Traps for Android client.

In 2017, global mobile subscriptions reached a total of 7.8 billion. By 2023, there will be more than 30 billion connected devices, including 20 billion IoT devices. Cybercriminals have taken note of this massive growth and turned their malicious activity toward mobile and IoT devices and networks, as well as accelerated their development of Android-based malware. Considering 85 percent of new mobile devices sold worldwide are Android-based, and there are more vulnerabilities in the Android ecosystem than ever, it’s no surprise Android has become a favorable target for malicious actors.

 

Traps for Android

The new Traps app for Android extends malware detection and prevention to Android endpoints. Traps for Android leverages both local analysis and threat intelligence from WildFire to detect and prevent malware from running. The Traps app enforces security policies to determine whether to block known malware and unknown files, as well as perform local analysis to determine the likelihood an unknown file is malware. Administrators have additional controls to allow or block unknown apps before Traps receives an official verdict for the app.

android_1

 

Traps for Android can also optionally submit the unknown apps to the Traps management service for in-depth analysis by WildFire. From the Traps management service, you can monitor the health of the Traps app and view details about security events that occur on the Android endpoints in your organization. Traps for Android is supported on Android 4.4 and later releases.

android_2

Why is this important?

  • In 2017, global mobile subscriptions reached a total of 7.8 billion and are expected to reach 10 billion by 2023.
  • 90 percent of new mobile devices sold are Android-based, and as there are more vulnerabilities in the ecosystem, it is the favorite target for malicious actors.
  • Despite protections and controls implemented by Google, malicious Android samples sent to WildFire have increased 101 percent between 2016 and 2017.

Palo Alto Networks recently released a report that presents in-depth research findings and dives into the threat landscape specific to mobile devices. Download the “Look What’s Riding Your Network” report to learn more about mobile-based threats.

 

Learn more about Traps advanced endpoint protection

The post Introducing Traps for Android appeared first on Palo Alto Networks Blog.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
46 Followers
About Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets. Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyber threats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber criminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning across the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – everyone is a potential target. Ransomware has existed in various forms for decades, but in the last several years criminals have perfected the key components of these attacks. This has led to an explosion of new malware families and has drawn new actors into participating in these lucrative schemes.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel