The days of “leaving work at your desk” are long gone. Today, employees are mixing business with pleasure at all hours, in different places. It could be checking your email at halftime of your daughter’s soccer game; reviewing an Excel sales forecast spreadsheet while waiting for a friend at dinner; or, finishing up an overseas partner call while in line for your morning coffee. Any way you look at it, the workplace has evolved, as has the need for making sure all of your endpoints are protected.
A decade ago, the focus of CIOs, CTOs and CISOs was securing company computers, servers and laptops. Today, organizations are beginning to realize mobile devices are an unprotected endpoint with access to, or containing all of the information of a traditional endpoint.
The fact is, mobile devices are now the de facto platform for productivity in business. The traditional computing devices (e.g., servers, desktops and laptops) upon which enterprises focused their security and compliance efforts represent only 40 percent of the relevant endpoints.
The remaining 60 percent of devices are mobile. And while there are some overlaps in what you protect – email, calendars, etc., – the way you solve the traditional endpoint security problem is completely different than how you solve the mobile security problem.
Gartner refers to the process of protecting mobile devices as mobile threat defense (MTD). According to Gartner Analysts Dionisio Zumerle and Rob Smith’s “Market Guide for Mobile Threat Defense” Report (Published 14 November 2019), “Without support for mobile devices, there is a gap left in endpoint visibility that vendors are actively working to close.”
Unfortunately, for many businesses and government agencies around the world, mobile device threats are typically managed/researched/resolved in a separate mobile device console from traditional endpoints. This means an administrator is using multiple consoles when it comes to cybersecurity, which is an extremely inefficient and ineffective security process.
Maybe more importantly, it increases risk significantly as mobile devices are not included in the overall threat analysis.
Zimperium has integrated with Microsoft Defender Advanced Threat Protection (ATP) endpoint detection and response (EDR). Our MTD integration with Microsoft Defender ATP provides customers with a single pane of glass view within the Microsoft Defender Security Center; the same console they currently use for managing threats from traditional endpoints like laptops and desktops running Windows, Mac and Linux.
As a result, Microsoft Defender ATP customers now have access to:
Combined with our integration with Microsoft Endpoint Manager (formerly Microsoft Intune) mobile device management (MDM) and mobile app management (MAM) solution for bring your own device (BYOD) policies, the solution can be configured to automatically enforce Conditional Access to contain the detected threat.
To learn more about the integration, watch our on-demand webinar.