Zimperium

  • Home Product & Solution Zimperium

Mobile Threat Defense (MTD)

Why Businesses Need Mobile Threat Defense

According to the 2022 Verizon Mobile Security Index:

23% of surveyed enterprises said their organization had suffered a mobile security compromise

79% of respondents said the shift to remote or hybrid work has undermined the cybersecurity of their organizations due to the distribution of devices and less secure networks

87% surveyed said they have been forced to re-evaluate how they operate as attacks on mobile devices grow

46% of the companies surveyed said they had suffered a compromise involving a mobile device in the past 12 months.

Mobile threat defense (MTD) solutions protect mobile platforms by detecting threats to devices, operating systems, the networks they use, and apps on the device. Each of these vectors is vulnerable to a variety of attack vectors.

Comprehensive Mobile Threat Defense

Zimperium Mobile Threat Defense (MTD) – formerly known as zIPS – provides continuous, on-device monitoring to detect known and unknown threats in real-time across the kill chain: device, network, phishing, and app attacks.

Phishing: Mobile phishing, especially via text/messaging apps and personal email, is a highly-effective way to steal credentials and deliver targeted exploits

Device: Attackers’ primary goal on mobile is to fully compromise a device to be persistent and weaponize it for “land and expand” lateral movements

Network: Attackers use rogue access points (RAPs) and man-in-the-middle (MITMs) to steal data and also to deliver targeted exploits to compromise the device

Apps: Malicious apps can create fraud, steal information and also deliver device exploits

The Zimperium mobile threat defense running locally on the device doesn’t require signatures, a cloud-based sandbox, or even an Internet connection. This means users are always protected and alerted to any actions needed. Even when in airplane mode, roaming or plugging into a port, there is no waiting hours or days to find out if a device has been compromised.

Scalable Enterprise Mobile Security

Zimperium MTD, can be used as a stand-alone tool or integrated with a MDM for managed devices. When integrated with a MDM, Zimperium MTD sends alerts about detected threats to the MDM, and the MDM remediates the risk based on predefined rules. Zimperium MTD works seamlessly with leading MDM solutions, including Microsoft, VMware, BlackBerry UEM, Citrix, Ivanti, Samsung, and IBM and is the only mobile threat defense solution that can simultaneously integrate with multiple MDMs. Zimperium MTD can also be used for unmanaged devices with mobile application management (MAM). With MAM-enabled apps, when a user launches a work application, such as Microsoft O365, on a mobile device, the application only permits access when mobile threat defense is running on the device.

Mobile Threat Telemetry to Enable Your Security Teams

Zimperium enables security operations and incident response teams with the critical mobile threat and risk data necessary to support modern security architectures. The unmatched threat forensics and risk intelligence data feed can be integrated with leading MDM, XDR, SIEM, security operations (SOC), and incident response (IR) solutions. But Zimperium doesn’t send a stream of alerts to already overwhelmed security teams. Instead, Zimperium’s risk dashboards allow InfoSec teams to focus on critical areas and establish automated actions within the platform to respond and remediate issues efficiently. Administrators can also set up custom email notifications to ensure the right security and risk stakeholders are made aware in a timely manner.

Mobile Applications Protection Suite

The Mobile Application Protection Suite (MAPS) from Zimperium provides four capabilities, including Mobile Application Security Testing (MAST), App Shielding, Key Protection, and Runtime Protection (RASP). The suite provides mobile app teams with centralized threat visibility and comprehensive in-app protection from development through runtime. It combines both inside-out and outside-in security approaches to help organizations build compliant, secure,


MAPS is a key component of the Zimperium Mobile-First Security Platform™ that secures mobile devices and mobile applications.

What is

zSCAN

zScan aims to enable enterprise to shift left security in the mobile App SLDC and find vulnerabilities and security defects before they are released or face pen-testing

Automated Analysis platform focused on application binaries Delivers static and dynamic analysis for iOS and Android apps Contextualize analysis results for specific compliance framework Enables security, compliance and risk professional to define policies Integrates security feedback into the SDLC
What is

zKEYBOX

White-box crypto library providing cryptographic operations Never reveal keys when executing cryptographic operations Support Dynamic and Static keys Delivered as a C based static lib or WASM As shared Lib for Java (JCA or JNI)

Key Capabilities

Operations

  • Encryption
  • Decryption
  • Signing
  • Digest
  • Key Wrapping/Unwrapping
  • Key Generation
  • Key Agreement
  • Key Derivation
  • Signature Verificatio

Algorithms & Ciphers

  • AES, DES, TDEA, SPEC
  • AES, TDEA, DES Speck, RSA, ECC
  • CMAC, HMAC, ECDSA, RSA, DSA
  • MD5, SHA-1, SHA-256, SHA-512
  • NIST AESKW
  • ECC, AES
  • Diffie-Hellman, ECDH, X25519
  • CMAC, HMAC, RAS, ECDSA, DSA

zSHIELD

Anti Reversing
Advanced Obfuscation Anti-Debugging Binary Packing Diversification
Anti Tampering
Integrity Checking Anti-Method Swizzling Function Caller Verification Share Lib Cross Verification Mach-O Binary Signature Verification Google Play Licensing Protection

zDEFEND

One Device
Real time on device threat detection Detection across all attack vectors    - Deviceg    - Network    - Apps Proactive call backs API’s to support risk based
Backend
Full threat forensic visibility Dynamic policy definition    - Threat Policies    - Privacy Policies Threat feed integration