Free trial

Whitepaper download

Today's mobile threat landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating systems, better enterprise support and the emergence of mature mobility management platforms. But significant and persistent mobile threats remain. The whitepaper explains the nature of these threats and the steps every enterprise needs to take to protect sensitive information in an ever-connected world.

Tehnology startup of the year 2017

Latest blog posts

By Colm 27th May 2019

In Light of the WhatsApp Hack, Which Approach to Mobile Device Security Offers the Best Protection?

Anti-virus, Mobile Device Management and Mobile Threat Defense won’t help against today’s attacks – so where should you look for protection ? On May 13th the Financial Times reported that a recently discovered vulnerability in the hugely popular messaging app WhatsApp had allowed attackers to inject commercial spyware onto mobile devices. The hack involved the […]

Read more
By Colm 24th May 2019

Why Google and Apple’s Malware Protection Might Not Be Good Enough – Part 2

Last week, Part 1 of our two-part series outlined the current defense systems offered by Apple and Google, two of the world’s biggest mobile operating system developers, to protect devices from mobile malware. We found that despite strict content requirements and security scans, malicious and suspicious apps are still able to make their way onto […]

Read more
By Colm 21st May 2019

Why Google and Apple’s Mobile Malware Protection May Not Be Enough – Part 1

Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, and steal information from mobile devices. And with 42 million mobile malware attacks occurring every year, the problem only seems to be getting worse. In this […]

Read more

Whitepapers

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, ne...

Today's mobile threat landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating system...

Mobile Data Control

Date usage growth in enterprise is expanding at an alarming rate. Our analysis shows that data usage growth rates are in the region of 70% – 140% per annum. T...

7 ways Malware Can Infiltrate Your Mobile Device

Mobile devices pack an extraordinary range of technologies into an extraordinarily compact design. Among these is a plethora of ways in which can connect to the out...