Pradeo acts against coronavirus by making its mobile security services available for free

Posted by Clément Saad on March 17, 2020

 

In this context of global health crisis, Pradeo supports companies by offering its mobile security services for free. This initiative is part of the mobilization action undertaken by the Hexatrust group of companies in response to the call of Cédric O, French Secretary of State for Digital Affairs. The publisher of mobile security solutions is committed to going beyond borders and opens the use of its solutions to all companies around the world who request them.

Read More

What Zero Trust means for mobile security?

Posted by Roxane Suau on March 16, 2020

The Zero Trust model, first identified by the research firm Forrester, is a security approach based on the principle of not trusting any network or data access request by default, even when it comes from inside the company perimeter. Zero Trust goes beyond the identity approach which focuses on only authenticating the user. It has emerged as the most reliable way for companies to keep away cyberthreats evolving within their distant and immediate environment.

 

Read More

Mobile security, what to expect from Android Enterprise?

Posted by Roxane Suau on March 10, 2020

The arising of Android 10 major release and consequently Android Enterprise brings plethora of questions around how to manage and secure Android devices.

If Android Enterprise smoothen the administration of devices, it does not add a structuring piece to UEM security.

This article aims at clarifying the ins and outs underlying Android Enterprise and what are the key security steps to be implemented to ensure Android devices security.

 

Read More

The network threats that endanger mobile devices privacy

Posted by Roxane Suau on March 05, 2020

Along the massive growth of enterprise mobility, cybercriminals looking for valuable data naturally shifted their interest toward mobile devices. Indeed, smartphones and tablets have inherent capabilities that, when exploited illegally, can provide a direct access to all the data they manipulate. Mobile threats can operate at three different layers of a device: 76% of them use mobile applications, 8% exploit the OS and 16% leverage the network. 

From phishing attempts to the more sophisticated Man-In-The-Middle, this article presents the most common network attacks used to exfiltrate data from mobile devices in the corporate environment.

 

Read More

Pradeo enriches VMware Workspace ONE with Mobile Threat Intelligence

Posted by Stéphane Saad on February 24, 2020

Pradeo, member of Workspace ONE Trust Network, expands its long-standing partnership with Workspace ONE to deliver mobile threats insights and mobile data processing to Workspace ONE Intelligence.

 

Read More