A mobile security solution dedicated to Samsung | What is Pradeo Security for Samsung?

Posted by Stéphane Saad on June 20, 2019

Enterprise mobility is remarkably enhancing productivity. Companies have seized this opportunity by enabling collaborators to work with mobile devices and applications, often out of companies’ premises. Accordingly, mobile data privacy has become a major focus for end-users and authorities in the last years. The area is now regulated by general or industry-specific laws that require organizations to protect their mobile environment through the deployment of dedicated solutions. These new usages and legal requirements are redefining cybersecurity, constraining security heads to rethink their strategy.

 

Read More

Gartner Market Guide for Mobile Threat Defense features Pradeo Security

Posted by Stéphane Saad on January 24, 2019

For the fifth year in a row, the research firm Gartner has recognized Pradeo as a major mobile security vendor, reinforcing Pradeo Security leading position on the market.

Read More

IDC named Pradeo as a worldwide leader of Mobile Threat Management

Posted by Roxane Suau on December 26, 2018

The global market intelligence firm IDC just published its latest MarketScape report on Mobile Threat Management solutions. We are proud to announce that after a thorough evaluation of Pradeo’s clients views completed by a technology assessment, IDC analysts named Pradeo as a worldwide leader of the market.

 

Read More

iOS Security Report: Threats Targeting Apple Mobile Devices

Posted by Vivien Raoul on December 11, 2018

There has been a debate for years. Many consider the Apple mobile operating system, iOS, to be more secured than Android. But, is it really?

 

Read More

Mobile Security Report 2018 - Malwares, network attacks...

Posted by Rabah Laouadi on October 31, 2018

We live in an ultra-connected world in which billions of corporate and personal data are manipulated through mobile devices every second. Smartphones and tablets have inherent capabilities that, when illegally exploited, enable hackers to locate users, eavesdrop on their communications, access their files, microphones, camera, etc., making them a target of choice.

Read More