Zimperium Blog

Our Most Vulnerable Devices Are in Our Pockets

iOS & Android
1 minutes
Jun 22, 2018
The smartphone continuously revolutionizes the way we work, stay connected and informed. Smartphone users now spend nearly 3 hours per day on their
Read Full Post

Webinar: The State of Mobile Device Security in Government

Zimperium
2 minutes
Jun 19, 2018
Webinar to highlight emerging mobile cybersecurity threats facing state and local governments, and what these entities can do to better protect mobile
Read Full Post

Webinar: How Was Your GDPR Transition and What Can You Learn from It?

Compliance
1 minutes
Jun 15, 2018
Webinar to discuss the adoption of new GDPR regulations and how enterprises are protecting mobile devices and apps in the process. Zimperium is hosting a
Read Full Post

Zimperium Acquires Application Security Provider Mi3 Security

iOS & Android
2 minutes
Jun 12, 2018
I'm very excited to announce that Zimperium has acquired application analytics company mi3 Security. The full press release can be found here: Zimperium
Read Full Post

Webinar: Device Detection – To Cloud or Not to Cloud

Zimperium
2 minutes
Jun 11, 2018
Webinar to discuss the pros and cons of both on-device detection and detection in the cloud and the many ways on-device detection outweighs the cloud in
Read Full Post

Zimperium's Leading Mobile Threat Defense Platform Takes Major Step in FedRAMP Certification

Compliance
2 minutes
May 25, 2018
Today, Zimperium is proud to announce that our highly differentiated MTD platform, Zimperium 5.0, is officially “FedRAMP In Process”. For U.S. federal
Read Full Post

May 25, 2018: Big Day for GDPR, But Just Another One For The Mobile Security Privacy Leader

Compliance
2 minutes
May 25, 2018
Today, the European Union’s (EU) General Data Protection Regulation (GDPR) goes into effect. For the few information security folks that haven’t heard
Read Full Post

Webinar: Rise of the Machine (Learning)

Zimperium
1 minutes
May 23, 2018
Webinar will share the use of machine learning in mobile security and how to identify the machine learning solutions that are (and are not) effective in
Read Full Post