Zimperium

Zimperium

Enhancing Mobile Security: Zimperium and CrowdStrike Expand Strategic Partnership

Mobile Security
2 minutes
Mar 04, 2025
Zimperium and CrowdStrike have expanded their partnership, integrating Zimperium’s Mobile Threat Defense (MTD) with CrowdStrike Falcon® Next-Gen SIEM.
Read Full Post

Top 5 Cryptographic Key Protection Best Practices

Mobile Security
5 minutes
Dec 17, 2024
We're sharing top 5 cryptographic key protection best practices.
Read Full Post

Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025

Mobile Security
6 minutes
Nov 20, 2024
This blog shares Zimperium's 2025 mobile security trends and threat predictions.
Read Full Post

Addressing NIS2 Requirements: Why it's Time to Get Ready Now

iOS & Android
7 minutes
Nov 07, 2024
Complying with the NIS2 directive will represent a significant, broad-based effort for security teams, and strengthening the security of mobile devices and mobile apps will be a key part of those efforts.
Read Full Post

ISM’s Guidelines for Enterprise Mobility

MTD
36 minutes
Oct 10, 2024
In this blog, we will analyze the ISM’s mobile controls, explore the risks they aim to mitigate, and outline practical approaches for addressing each control.
Read Full Post

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

MTD
2 minutes
Sep 17, 2024
Zimperium has achieved the Australian Government security status of  PROTECTED after successfully completing an assessment performed by the Information Security Registered Assessors Program (IRAP) for its sovereign-hosted Mobile Threat Defense (MTD) solution.
Read Full Post

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

MTD
2 minutes
Sep 04, 2024
As we continue to strengthen our presence in India and South Asia, we are excited to announce the appointment of Shashank Pathak to our Go-to-Market team.
Read Full Post

Securing Agency Devices: The Critical Need for Mobile App Vetting

MTD
3 minutes
Aug 20, 2024
This blog will explore the various types of risky apps and the concerns they pose, emphasizing the need for stringent mobile app vetting processes.
Read Full Post