Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:01 PM
Dark Reading
Dark Reading
Products and Releases

AdaptiveMobile Acquires Sentry Wireless

Sentry’s technology will be integrated into AdaptiveMobile’s Network Protection Platform

Dublin, 22 June, 2011 — AdaptiveMobile, the world leader in mobile security, is today announcing the acquisition of Sentry Wireless, a developer of handset based mobile security applications. Sentry’s market-leading technology will be integrated into AdaptiveMobile’s Network Protection Platform to give mobile operators visibility when subscriber handsets become infected by rogue mobile applications and viruses, and limit subscriber loss of data and credit.

Following consumer research from AdaptiveMobile that identified that consumers now fear spyware, rogue apps and loss of data more than they do the loss of the handset itself, operators are looking for an all embracing security platform that will help them preserve subscriber trust in the network. Through the acquisition of Sentry Wireless, AdaptiveMobile will provide operators with white-label applications that subscribers can use to report SMS spam, check the validity of a downloaded app, and be notified securely by their operator if their handset is detected to be compromised.

In addition, the handset applications will allow individual subscribers and their children or companies and their employees greater control of who can contact them, when and for what reason. This unique combination of handset based policy management and network-centric enforcement enables mobile operators to step up and cater for customers who are looking towards mobile operators to provide them with protection against mobile threats.

The research also confirmed that cybercriminals are shifting their focus to smartphones and tablets with mobile malware alone up by 33 per cent in 2010 from the previous year, with particular focus on new mobile operating systems such as Android. This focus is driven by the greater potential for return from illicit activity on mobile networks, with criminals taking advantage of existing mechanisms to extract money such as premium rate numbers and SMS shortcodes.

The risk for consumers is that “free” mobile security apps advertised online can be hostile applications that will infect the device, and that SMS notifications from operators may be faked. As a result of the acquisition of Sentry Wireless, as well as protecting their subscriber base from the core of the network, mobile operators will now also be able to provide secure and timely feedback to their subscribers when they become infected, and where necessary disinfect comprised devices on their network through a patented disinfection process to remove malicious software and rogue applications.

Brian Collins, Chief Executive Officer of AdaptiveMobile said: “AdaptiveMobile’s unique network-to-handset protection approach now provides unparalleled levels of security to both the operator and their subscribers. As the number of mobile threats and their complexity continues to increase, the question of subscriber trust in their chosen network provider is a critical concern. With applications being downloaded onto subscribers’ devices over the mobile network, and malware reaching record levels, the liability paradigm is moving to the operator. In order to help operators remain a step ahead of mobile security threats and in response to consumer demand for increasing levels of protection, AdaptiveMobile can now empower operators to provide their customers increased flexibility in managing their personal controls, addressing infected or compromised devices, and in preserving subscriber trust through reporting and feedback”.

Matt Norton, Chief Executive Officer from Sentry Wireless said: “We are delighted to be part of AdaptiveMobile’s market-leading mobile security product set. Having focussed on building handset based solutions for Parental Controls, app disinfection and SMS Spam detection, we are delighted that AdaptiveMobile has recognised the unique IP and approach of Sentry Wireless, and has decided to incorporate this within its Network Protection Platform, a globally deployed network solution for mobile operators, protecting 700 million subscribers around the world”.

About AdaptiveMobile:

AdaptiveMobile is the world leader in mobile security, enabling trusted networks for the world’s largest operator groups and protecting one in six subscribers globally. AdaptiveMobile provides Operators with the most comprehensive network-based security solutions enabling them to protect their consumer and enterprise customers against the growing threat of mobile abuse. www.adaptivemobile.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.