In January, we announced our integration with the Microsoft Defender Advanced Threat Protection (ATP) endpoint detection and response (EDR) solution. Our mobile threat defense (MTD) integration with Microsoft Defender ATP provides customers with a single pane of glass view within the Microsoft Defender Security Center; the same console they currently use for managing threats from traditional endpoints like laptops and desktops running Windows, Mac OS and Linux.
Today we’re announcing that Zimperium’s Android and iOS mobile threat data is now fully integrated with the Azure Sentinel, Microsoft’s cloud-native SIEM solution. As the first and only mobile threat defense (MTD) solution integrated with Azure Sentinel, security analysts are now able to include mobile threat data in their advanced threat hunting and threat correlation analysis.
“Whereas the Defender ATP EDR solution is focused on endpoints – Windows, Mac, Linux, iOS, Android – the Azure Sentinel SIEM solution aggregates data across all sources of your enterprise, including users, applications, servers, and devices running on-premises or in any cloud,” said Brian Peck,vice president of product management for Zimperium. “This allows Azure Sentinel users to hunt for threat patterns and correlate threats across all of the systems within an organization – like firewalls, web proxies, routers, servers, mobile and traditional devices, and Office 365 applications.”
Combined with Zimperium’s integration with Microsoft Intune, policies can be configured to automatically enforce conditional access to contain the detected threat.
As a result, Microsoft Azure Sentinel customers now have access to:
“The integration with Zimperium mobile threat information in Azure Sentinel enables mutual customers to better inform hunting, investigation and remediation activities,” said Adwait Joshi, Director of Azure Sentinel Product Marketing at Microsoft Corp. “Our customers can view, hunt and take actions on mobile threats in the same SIEM platform they currently use for managing security events from sources including users, applications, servers, and devices running on-premises or in the cloud.”
To learn more about our relationship with Microsoft, please contact us. We are here to help.