Pradeo wins Mobile Security Leadership Award from Frost & Sullivan

Posted by Stéphane Saad on August 24, 2020

Find here the full Press Release published by Frost & Sullivan: https://prn.to/2lAM8Rh


 

Pradeo's mobile security solutions are awarded for their capacity to help organizations evaluate exposure levels of their mobile deployments, adopt appropriate cybersecurity response capabilities, and respond to cybersecurity breaches, better than any of their competitors.

Read More

How to vet mobile apps before issuing them to collaborators

Posted by Roxane Suau on June 30, 2020

Cybersecurity experts are unanimous, mobile apps are hackers’ preferred vector to exfiltrate valuable data from mobile devices. Yet, the flexibility they offer makes them irreplaceable for both work and personal usages. Today, companies cannot afford to forbid public apps usages to their collaborators, even in the most sensitive industries. However, it doesn’t mean they should turn a blind eye to app-related risks.

 

Read More

Application threat analysis/App vetting: how to separate key decision-making insights from pointless information

Posted by Roxane Suau on June 26, 2020

Needless to emphasize that applications stand at the very heart of mobile usages. Except for very specific business cases, mobile workers require flexibility in their apps usage and have to be free to download, on top of the provided set of corporate applications, any other application they might need. In addition, the democratization of BYOD configurations makes no question of the aforementioned.

 

Read More

Why cloning your app is a piece of cake?

Posted by Roxane Suau on June 19, 2020

One thing is certain: cloning an application is a child’s play for cyber-criminals.

Fake apps (or clones) are Android or iOS mobile applications that mimic to some extend the look and features of an official app while hiding malicious, intrusive or lucrative activities.

 

Read More

Mobile security solutions comparison

Posted by Roxane Suau on May 28, 2020

Workers are undeniably mobile with 80% of corporate tasks to take place on mobile devices in 20201. With 77% of the digital traffic2 coming from smartphones and tablets, mobile protection comes as a central piece of the information security strategy of companies.

The advent of mobility drew a new paradigm where security gates have to be relocated beyond the enterprise perimeter. In that framework, legacy security practices are falling short to address a landscape characterized by a plethora and dynamicity of threats.

 

Read More