Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
Zimperium MTD with a Deep Dive on Integ...
On board with Mobile Threat Defense (MTD), but interested in seeing more on the day-to-day detail of how it will impact your mobile security? Watch a member of the Zimperium Sales Engineering team do a demo of the core aspects of our advanced MTD solution, formerly known as zIPS. Complete the form to watch and learn about: Integrations with MDM / EMM, XDR, SIEM and SOAR solutions, including a special highlight on integrating with Google MDM ...
Zimperium- How Hackers Bypass MFA ... A...
Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to networks, applications, or databases. However, malicious actors have found ways to bypass this control through sophisticated SMS-based attacks, device compromises, malware and even network attacks. Join Zimperium and RSA for a discussion on how advanced mobile threat defense (MTD) solutions, either s...
See a Demo of Zimperium MTD | Plus a De...
On board with Mobile Threat Defense, but interested in seeing more on the day-to-day detail of how it will impact your mobile security? Join a member of the Zimperium Sales Engineering team for a demo of the core aspects of zIPS, our advanced mobile threat defense (MTD) solution. Attend to ask questions and learn about: Policy setup and enforcement Integrations with MDM / EMM, XDR, SIEM and SOAR solutions Alerts and managing risks Special high...
Better Together: Why EDR Without MTD Le...
According to recently published ESG research, “the top 3 reasons security operations are more difficult today than they were two years ago: The threat landscape is growing and changing rapidly The attack surface has grown The attack surface is continuously changing and evolving” Security operations teams demand massive scale to collect, process, analyze, and act upon vast amounts of data. Threat detection and response across enterp...
January 26, 2023
Organizer:
Zimperium Location:
Webcast
Spyware for Sale: The Growing Threat to...
The monetized world of cybercrime is not a new concept, and until recently the highly technical malware did not reach into the mobile world. But like everything else, that has changed. Cybercriminals see the widely adopted frontier of mobile as a valuable target for increasingly advanced malware and services, and for the right price, are ready to sell to anyone. Advanced mobile malware, like spyware, is no longer a product just for nation stat...
December 13, 2022
Organizer:
Zimperium Location:
Webcast
Zimperium- The State of Mobile Payment...
As widespread worldwide adoption of smartphones continues, and as global consumers conduct an increasing proportion of their shopping online due to the restrictions imposed by the last two plus years of a global pandemic, mobile transactions have skyrocketed. Yet, two years ago just prior to the first outbreaks of COVID-19, the Pew Charitable Trusts published research that suggested distrust and avoidance of mobile payments was common due, pri...
Zimperium- The Global Mobile Threat Rep...
As the worldwide leader in mobile threat defense (MTD), Zimperium protects millions of mobile devices and apps. As a result, we have unmatched forensic data about mobile device, network, phishing, and app risks and attacks. After analyzing the full breadth of our 2021 anonymized data, we’ve gleaned unique insights on the state of mobile security that we’re sharing in our Global Mobile Threat Report. On the heels of the release of t...
From Fares to Surfing: Why Leading MTAs...
As MTAs continue to evolve and improve their digital experiences, mobile components have become more vital. While mobile payment apps and onboard WiFi networks benefit riders, they also create new attack vectors for attackers. Leading MTAs are taking proactive measures to protect riders against these risks. Join cybersecurity leaders from Los Angeles Metro and Zimperium for a discussion on the best ways to protect riders against mobile cyberth...
Zimperium- The Evolution of BYOD and En...
Microsoft Office 365 has been the primary enterprise productivity suite for years, launching on traditional endpoints and eventually moving to mobile devices. Now, during this distributed workforce era where employers and employees are more reliant on mobile, more corporate data is transferred through Outlook and Teams, opening the door to intellectual property and PII on mobile endpoints than ever before. But despite having access to much of...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.