Mobile
1/23/2014
12:44 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyber-Defense Specialist Gets Backing Of Major Smartphone Manufacturer And Launches New Approach To Mobile Security Threats

Zimperium launches two products to protect organizations from advanced persistent threats on mobile

SAN FRANCISCO – January 23rd, 2014 – Zimperium, creators of the world's first mobile intrusion prevention system&trade (IPS) powered by artificial intelligence (AI), is today announcing the launch of two new products to protect organizations from advanced persistent threats (APT) on mobile. The launch addresses a huge void in mobile security: more employees are bringing their personal devices to work, but there is no security solution to detect, notify, and protect against advanced cyber-attacks deployed through mobile devices.

Existing Security Solutions Are Not Adequate

Governments and enterprises are extremely vulnerable to cyber-attacks from devices such as smartphones and tablets, suggests a whitepaper published by Zimperium.

Top network and computer security vendors are not experts in mobile security. These providers can protect against network threats, but don't know how to protect mobile devices from cyber-attacks that can later comprise the entire corporate network. Meanwhile, current mobile security offerings are extremely limited in their scope of protection. These providers only offer protection against predefined types of threats. This protection is narrow, slow to adapt, and does not safeguard against simple tricks or cyber-attacks.

New Solution Sets New Standards

Zimperium is launching zIPS and zCONSOLE, offering organizations the first comprehensive mobile security solution zIPS is the world's first mobile IPS&trade that uses AI to detect advanced cyber-attacks. Leveraging algorithms and machine learning, zIPS monitors how a device behaves and is capable of recognizing unusual usage patterns and safeguarding the device.

zCONSOLE is an easily integrated, cloud-based, mobile unified threat management (UTM) platform that enables IT managers to monitor zIPS devices entering and leaving the network. Each device becomes a powerful sensor that IT managers can monitor using zCONSOLE to detect network attacks.

"Hackers are looking to exploit any weakness in your company's defenses to steal proprietary information--and mobile devices are one of the weakest links," say Kevin Mitnick, legendary security researcher. "zIPS is first mobile intrusion prevention system that stops hackers in their tracks, before they can damage your business."

Co-founded and led by Zuk Avraham, a former military and Samsung Electronics security researcher, and Elia Yehuda, an experienced hands-on security researcher, Zimperium is supported by Raymond Liao of Samsung, the world's most famous hacker Kevin Mitnick, and early-investors in Sourcefire: Mark Fernandes, Managing Director of Sierra Ventures, and Stephen Northcutt, former President of SANS Technology Institute.

"With zIPS, corporations will now have the opportunity to use BYOD as an advantage to their security. zIPS is the first security solution that can combat modern cyber-attacks on mobile. There is already evidence of attacks that are happening to infiltrate organizations, which only zIPS can prevent," says Zuk Avraham, Zimperium founder and CEO.

Today's launch of zIPS and zCONSOLE sets a new standard for mobile security. At just a fraction of the cost of top security solutions, CIOs and IT managers can expect the following groundbreaking features from zIPS:

· zIPS runs completely in user-mode – and can be deployed as a standard Android app

· zIPS is the first mobile IPS&trade

· zIPS is using a new technique called "non-intrusive packet monitoring" that protects a user's privacy

· zIPS is the only available solution that is capable of detecting malware running outside of its own sandbox – as seen in self modifying apps

· zIPS prevents advanced network attacks when a device is connected to public, uncontrolled networks

· zIPS does not rely on signatures to detect threats

· zIPS uses machine learning to detect IPv4, IPv6 and unknown attacks (0days)

zIPS is currently available for Android only, but will unveil an iOS beta soon.

Download zIPS for Android: https://www.zimperium.com/mobile-ips

Learn more about Zimperium, visit www.zimperium.com.

About Zimperium

Zimperium is a privately owned mobile security start-up based in San Francisco, with a R&D center in Tel Aviv. Its flagship solutions protect mobile devices from cybersecurity threats. The company was founded in 2011 by CEO Zuk Avraham, a highly regarded security expert and Elia Yehuda, an experienced hands-on researcher. Zimperium's mission is to secure organizations from daily cyber threats in an increasingly mobile world.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: So this is what happens when The Cloud goes down.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.