Pradeo's biannual mobile security report: The current mobile threat landscape

Posted by Roxane Suau on March 05, 2019

In the corporate sector, smartphones, tablets and mobile applications are trusted with confidential information and granted access to companies’ information systems.

 

 

Read More

Meet the Pradeo team at RSA Conference 2019

Posted by Roxane Suau on February 27, 2019

The Pradeo team will be attending RSA Conference in San Francisco.

 

 

Read More

Pradeo wins 5 Awards from the Cybersecurity Excellence Jury

Posted by Roxane Suau on February 26, 2019

The Cybersecurity Excellence jury has released today the names of the best cybersecurity solutions it has awarded in 2019.

We are proud to announce that Pradeo has won the award for mobile security solution of the year, along 4 other prizes for its advanced solutions including Mobile Threat Defense, Mobile Application Security Testing, Runtime Application Self-Protection and GDPR compliance solution.

 

Read More

MWC 2019: Pradeo and Samsung rethink mobile security with their joint solution

Posted by Stéphane Saad on February 18, 2019

A year after launching “Pradeo Security for Samsung”, Pradeo and Samsung once again leverage the Mobile World Congress to put the spotlight on their structuring partnership. Pradeo Security for Samsung will be showcased on Samsung booth at the Mobile World Congress in Barcelona from February 25th to 28th, 2019.

 

 

Read More

The network threats that endanger mobile devices privacy

Posted by Roxane Suau on February 14, 2019

Along the massive growth of enterprise mobility, cybercriminals looking for valuable data naturally shifted their interest toward mobile devices. Indeed, smartphones and tablets have inherent capabilities that, when exploited illegally, can provide a direct access to all the data they manipulate. Mobile threats can operate at three different layers of a device: 77% of them use mobile applications, 14% exploit the OS and 9% leverage the network. 

From phishing attempts to the more sophisticated Man-In-The-Middle, this article presents the most common network attacks used to exfiltrate data from mobile devices in the corporate environment.

 

Read More