Mobile

1/31/2018
12:21 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Appthority & Google Deliver Mobile Threat Intelligence to Enterprises

First-of-Its-Kind Solution Makes InfoSec and Regulatory Policy Compliance Seamless

SAN FRANCISCO, Calif. – January 30, 2018 – Appthority, the global leader in enterprise mobile threat protection, today announced the product of close collaboration with Google to offer seamless integration of its mobile threat defense solution and managed Google Play. The new integrated solution enables enterprises to use Appthority Mobile Threat Protection (MTP) to easily ensure compliance with security, privacy and regulatory policies for apps deployed through managed Google Play on Android.

Enterprises can now set policy and enable Appthority MTP to automatically scan apps in managed Google Play to ensure those apps meet their compliance criteria. For example, the solution includes features to test for data leakage threats or vulnerabilities and privacy risks that might endanger compliance with the EU's new General Data Protection Regulation (GDPR) or other regulations.

Businesses can now make smarter decisions about which apps to offer employees and safely and efficiently whitelist apps from managed Google Play for employee use on Android, including in BYOD deployments that use Android work profiles.

Appthority MTP brings the benefits of automation and proactive risk management to security teams setting and enforcing policies for their Android fleets. With the integration, businesses can automate the app vetting process directly in the tools used to configure managed Google Play, eliminating long bottlenecks and costly manual app security testing and approval.

The integration gives companies granular abilities to write policies and specifically define the types of app threats they want to scan for before apps are approved for employee use. Companies write their policies once and, from that point forward, Appthority automatically monitors every app in their managed Google Play deployment and ensures that the apps available to employees comply with company requirements. Using Google's powerful recommendation engine, Appthority MTP can even suggest other apps for employee use that meet the company's security criteria.

"We're thrilled to collaborate with Google and integrate managed Google Play with the threat intelligence from our mobile threat defense solution" said Domingo Guerra, president and co-founder of Appthority. "Google has put a tremendous amount of thought and energy into making the Android Platform secure and enterprise friendly, while always protecting user privacy. Enterprises now can have additional peace of mind, knowing that the apps their employees use for work meet their company's security and compliance criteria."

Enterprises will also be able to test their internally developed apps for vulnerabilities and threats. This is critical because many companies use third-party libraries and SDKs in their own apps which can inadvertently introduce vulnerabilities that put corporate data and employee privacy at risk and may cause them to run afoul of compliance regulations.

 

About Appthority

Appthority is a pioneer in enterprise mobile security and the leader in the Mobile Threat Defense category. The comprehensive Appthority Mobile Threat Protection (MTP) solution helps customers keep their data private and secure from mobile device, app and network threats. More Fortune 1000 companies trust Appthority to secure their enterprises from mobile threats because Appthority delivers best-in-class mobile threat protection and unparalleled enterprise visibility and control of mobile risks. With Appthority, security teams are informed, employees are productive, and enterprise data is kept private and secure. Learn more at www.appthority.com.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11311
PUBLISHED: 2018-05-20
A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
CVE-2018-11319
PUBLISHED: 2018-05-20
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to ...
CVE-2018-11242
PUBLISHED: 2018-05-20
An issue was discovered in the MakeMyTrip application 7.2.4 for Android. The databases (locally stored) are not encrypted and have cleartext that might lead to sensitive information disclosure, as demonstrated by data/com.makemytrip/databases and data/com.makemytrip/Cache SQLite database files.
CVE-2018-11315
PUBLISHED: 2018-05-20
The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack. This can result in remote device temperature control, as demonstrated by a tstat t_heat request that accesses a device purchased in the Spring of 2018, and sets a ho...
CVE-2018-11239
PUBLISHED: 2018-05-19
An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in ...