Making mobile devices secure

Cyber adAPT has introduced a cloud-based solution that provides mobile device security, attack detection, and automated remediation for devices outside of the core network.

  • 8 years ago Posted in
The risk of catastrophic outcomes from unsecure devices is becoming a weekly cover story. Juniper Research says that we will see 160 TRILLION messages transmitted annually by mobile and Internet of Things (IoT) technologies as early as 2019. Cyber adAPT continues to deliver comprehensive security to federated enterprises that manage the risk of countless devices connecting to their network.
 
A simple, three-click enrollment process now enables this “round-trip” security:
1.        Secures network communications with advanced device traffic encryption and authentication.
2.        Detects malware and anomalous network traffic in real-time.
3.        Pin-points precise users and devices that activate each attack alarm.
4.        Triggers immediate action to ensure compromised devices are isolated by automatic quarantine or wipe.
5.        Provides detailed forensic clarity to security analysts, allowing the fastest possible manual response.
 
With this new release, more devices and more operating systems can be protected and enabled within seconds, without hardware being shipped or software installed. Cyber adAPT is now available in a 100% virtualized environment – meaning all deployment options are now open to the security architects:  multi-tenant cloud service, private cloud and hybrid solutions, a virtual machine delivered onto the client’s infrastructure, and the dedicated Cyber adAPT appliance.
 
“Cyber adAPT brings customers visibility and control, something they have yet to experience from a security platform that focuses on behavior outside of the traditional ‘core network’,” says Michael Weinberger, senior vice president of product development at Cyber adAPT.
 
“Imagine having a brand new Ferrari in the driveway that you are scared to drive at any speed because you can’t see through the warped windshield. That’s what it’s like for many chief information security officers (CISOs) who feel they have to hold back on the mobile-throttle because they have no way of detecting and isolating dangerous traffic that flies past.”
 
Many companies have made initial progress enabling users and devices in the field, outside of the core network. Tools such as mobile device management (MDM) and the wider enterprise mobility management (EMM) provide a degree of control and data access, but are woefully short of being a secure solution.
 
Reluctance to deploy genuine security can be down to an underestimation of the ease and impact of an attack. Adversaries that target entry through an unsecured device like a smart phone can cause more damage, more quickly than through attack surfaces behind the protection of the traditional perimeter.
 
Even when this threat is understood, the perceived mitigation requirements of cost, infrastructure, management overhead and user experience can be overwhelming. Cyber adAPT’s new cloud service has been released to combat this issue directly.
 
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Palo Alto Networks has introduced Prisma® Cloud 3.0, said to be the industry’s first integrated...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...