View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

Zimperium's zIPS

Zimperium’s zIPS™ is the world’s first mobile intrusion prevention system app that provides comprehensive protection for iOS and Android devices against mobile network, device and application cyber attacks. Security health checks for mobile devices Much like a doctor can diagnose an illness by analyzing the symptoms your body is exhibiting, zIPS™ can detect both known and unknown threats by analyzing the behavior of your mobile device. By analyzing slight deviations to the mobile device’s operating system’s statistics, memory, CPU and other system parameters, z9™ detection engine can accurately identify not only the specific type of malicious attack, but also the forensics associated with the who, what, where, when, and how of an attack occurrence. Zimperium developed the innovative and award-winning z9™ engine by training it over many years on proprietary machine-learning algorithms that distinguish normal from malicious behavior on Android and iOS devices. Unlike cloud-based mobile security solutions that employ app sandboxing or tunnel traffic through the cloud, the z9™ engine sits directly on the mobile devices within the zIPS™ app, in order to provide complete protection around the clock. Zimperium's zIPS functions:
  • Detect. Uses the on-device z9™ detection engine to monitor the whole device for malicious behavior, and to dynamically detect known and unknown threats in real time
  • Analyze. Leverages machine learning to analyze deviations to device behavior and make determinations about indicators of compromise to accurately identify specific types of attacks and classify zero-day attacks
  • Remediate. Implements quick incident-response recommendations and decisions when malicious activity is discovered
Mobile Vulnerability Management To address enterprise-specific mobile security vulnerabilities, Zimperium also provides a risk-based approach to mobile security management. View. Enable Security Administrators to continuously monitor and manage the health of all mobile devices from a real-time threat dashboard with the ability to trigger automated response. Understand. Unmatched network, device and malware forensics data lets security administrators view and understand each mobile security incident, including the who, what, where, when and how of an occurrence. Enforce. Define and enact risk-based policies to continuously protect your organization from mobile attacks.
... Learn more
-
ROI-
-
12
10