While more and more business data is accessible on mobile devices, only 15-20 percent of mobile devices are protected. For example, with 60 percent of emails being accessed from mobile devices, experts consider mobile phishing as one of the most common methods of beginning a breach. To detect phishing and other cyber threats, Zimperium created the z9 engine, a versatile mobile security engine capable of performing real-time detection on the device where it is installed. This real-time detection counters the major threat vectors such as malicious apps and networks, phishing, andcompromised devices. z9 employs machine learning-powered detection, offered in two versions—z in-app protection (zIAP) and z intrusion prevention system (zIPS).
zIAP is a software development kit, which makes it possible to add all the z9 capabilities into a mobile app. Although this version focuses less on the device holistically, the development kit embeds z9 in the mobile application, which provides details of any threat to the app and initiates risk mitigation actions. From the intrusion prevention standpoint, zIPS—the next generation antivirus for mobile devices—protects the device, as well as the data that it contains and can access. Zimperium’s association with several mobile device management (MDM) companies makes it possible to protect the user device, where the former detects a threat on the device and the latter remediates it instantly.
Zimperium has the ability to integrate with all major enterprise mobile management (EMM) solutionsand even handles multiple EMMs in a single console.
Attackers follow the principle of ‘land and expand’—land on vulnerable systems and then expand to other systems. Mobile devices are today’s most vulnerable systems
With a keen eye on the future, Keating points out that since both mobile devices and IoT work on a similar architecture, the next step for the company will be using the z9 capabilities for IoT. Zimperium is implementing this in cars and traffic lights already, and is aiming to expand the reach of z9. “The key strategy is to get better at what we provide and find more innovative ways to nip cyber threats in the bud,” concludes Keating.