Your Guide to Mobile Threat Defense

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

“The signs are clear that mobile threats can no longer be ignored. Security and risk management leaders must familiarize themselves with mobile threat defense solutions and plan to gradually integrate them to mitigate mobile risks.”*

*Gartner Market Guide for Mobile Threat Defense Solutions, Dionisio Zumerle, John Girard, 22 August 2017

mobile threat defense guideGartner recently released its second Market Guide for Mobile Threat Defense (MTD) Solutions. In the document, Gartner provides an overview of mobile malware rates, the size of the market as enterprise move to mobile first communication methods, and provides an overview of the vendors that enable safe and secure mobile usage.

Gartner states the mobile threat defense market contains “solutions that protect organizations from threats on mobile platforms.”* Simply put, we believe if you are using mobile devices in your enterprise you need to install an MTD solution to detect threats on the devices your employees and contractors use in your business.

How Does Mobile Threat Defense Work?

MTD solutions protect at multiple layers and are optimized for the constraints inherent to mobile operating systems. It is best to have a solution detecting threats at device, network and application levels like that of Zimperium.

    • Device Threats – MTD tools monitor system parameters, configuration, firmware and libraries to identify suspicious or malicious activity.
    • Network Threats – MTD tools monitor network traffic and disable suspicious connections to and from mobile devices.
    • Application Threats – MTD tools identify “leaky” apps (meaning apps that can put enterprise data at risk) and malicious apps, through reputation scanning and code analysis.

 

“By 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today.”*

Mobile Security Recommendations

The Market Buyers Guide for Mobile Threat Defense Solutions provides additional information on Key Findings on the market and Recommendations on how to proceed with securing your mobile devices from threats. We agree with many of the recommendations Gartner provides and have some of our own on how to educate yourself and your security teams.

  1. Risks – Educate yourselves and your teams on the risks mobile devices introduce into your business and review customer case studies. There are several Zimperium reviews available on Gartner Peer Insights.
  2. Deployment – Understand there are deployment options available to you. You can deploy with your current EMM and leverage existing compliance policies in both corporate owned, BYOD or in apps you build.
  3. Download – Obtain our latest research “Your Guide to Mobile Threat Defense” featuring a complimentary copy of Gartner’s Market Guide for Mobile Threat Defense Solutions.

 

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 

The post Your Guide to Mobile Threat Defense appeared first on Zimperium Mobile Security Blog.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
1983 Followers
About Zimperium
Zimperium, the industry leader in Mobile Threat Defense, offers real-time, on-device protection against both known and previously unknown threats, enabling detection and remediation of attacks on all three mobile threat vectors - Device, Network and Applications. Zimperium’s patented z9™ detection engine uses machine learning to power zIPS™, mobile on-device Intrusion Prevention System app, and zIAP™, an embedded, In-App Protection SDK that delivers self-protecting iOS and Android apps. Leaders across the mobile ecosystem partner with Zimperium, including mobile operators (Airtel, Deutsche Telekom, SmarTone, SoftBank and Telstra), device manufacturers (Samsung, SIRIN, TriGem), and leading enterprise mobility management (EMM) providers (AirWatch, MobileIron, BlackBerry, Citrix and SAP). Headquartered in San Francisco, Zimperium is backed by Sierra Ventures, Samsung, Telstra, Warburg Pincus and SoftBank. Learn more at www.zimperium.com or our official blog at https://blog.zimperium.com.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel