Mobile security event collection for SIEM software

Posted by Roxane Suau on March 21, 2019

Maintaining a safe digital framework can be a tricky task for large organizations’ IT teams. To help them, some solutions such as security information and event management (SIEM) softwares are specifically designed to group and analyze large amounts of data and make them comprehensible at a human scale. By relying on these capabilities, a SIEM can alert on suspicious and potentially illegitimate behaviors, providing security heads with visibility in a security context.

 

Read More

C-Executives, IT, sales… Which staff is the most exposed to mobile threats?

Posted by Roxane Suau on March 12, 2019

Nowadays, the vast majority of employees is using smartphones or tablets as part of their work. Those devices, whether they are corporate (COPE) or personal (BYOD), are a gateway to organizations information systems.

Read More

Pradeo's biannual mobile security report: The current mobile threat landscape

Posted by Roxane Suau on March 05, 2019

In the corporate sector, smartphones, tablets and mobile applications are trusted with confidential information and granted access to companies’ information systems.

 

 

Read More

MWC 2019: Pradeo and Samsung rethink mobile security with their joint solution

Posted by Stéphane Saad on February 18, 2019

A year after launching “Pradeo Security for Samsung”, Pradeo and Samsung once again leverage the Mobile World Congress to put the spotlight on their structuring partnership. Pradeo Security for Samsung will be showcased on Samsung booth at the Mobile World Congress in Barcelona from February 25th to 28th, 2019.

 

 

Read More

The network threats that endanger mobile devices privacy

Posted by Roxane Suau on February 14, 2019

Along the massive growth of enterprise mobility, cybercriminals looking for valuable data naturally shifted their interest toward mobile devices. Indeed, smartphones and tablets have inherent capabilities that, when exploited illegally, can provide a direct access to all the data they manipulate. Mobile threats can operate at three different layers of a device: 77% of them use mobile applications, 14% exploit the OS and 9% leverage the network. 

From phishing attempts to the more sophisticated Man-In-The-Middle, this article presents the most common network attacks used to exfiltrate data from mobile devices in the corporate environment.

 

Read More