Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Zimperium: Your Phone Is a Supercomputer (and a Target)

Truth in IT
05/05/2025
71
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 talking to some more of the great security cyber security vendors. We are now talking to Zimperium. Right, I got that right. Zimperium. We are talking about mobile security I think is going to be our topic today here. I've got Krishna here today. So how did you get involved in security on the mobile side? There's so many facets to security. What brought you into mobile? So we started down this journey ten years ago, and we've realized mobile devices were becoming prominent, not just for our personal lives, but of our professional lives and secure them matter down the line. And that's how we got into it. I mean, it's amazing how well, uh, these portable slabs got integrated into everything, and we don't even see them anymore, but everyone's got one in their hand. Seven by 20. Yeah. I mean, think about it, right? A mobile device to all of us means productivity. And for a business, it represents business growth. They're invested in it. So we're helping them secure it. There's people walking around here just heard me say that they're smiling because they're holding on to their phones. Uh, so let's talk about, like, zimperium. Uh, if we look at security and there's all the different facets of security on there, what are you guys specifically doing now in that mobile sector? Yeah. So there are two things that we do as a company, right? Every enterprise allows their employees to access their stuff on their mobile device. We make sure those devices are secure at all times when they're accessing enterprise data on the mobile application side. Everyone's building mobile apps, right? Over 75% of the enterprises we talk to say they're building mobile applications. So they're we're making sure they're building secure mobile applications. And more importantly, the app needs to be able to protect itself once it's deployed because you have no control where it runs. So is this security paradigm that you're supporting go with the phone itself as an endpoint. Yeah. So for our mobile device protection solution, it's an app that really sits on your phone and makes sure you're safe at all times. Okay. So this is not something you can leave behind or forget to turn on. No, it will be pushed through your MDM UEM or we will push it to your employees device. It's always on and it's making sure you are secure at all times. Your device right on the app side, we give you the technology and developers put it inside the app and it makes sure the app can be compromised. All right. That's great. Let's talk a little bit about RSA, the conference here. There are definitely some themes we've been seeing. And I'm just prepped that with AI and supply chain vulnerabilities and the rest of it. When you look out, what are you seeing and how would you fit Zimperium into the sort of solution to those challenges? Right. So I right. Everyone's talking about it like you said. So the two areas that AI is going to make a big difference. One, phishing AI in the hands of attackers is going to accelerate the sophistication of phishing, right? Everything is going to be that much more believable. Every email, every text, you have to make sure your defenses are up for it. On the mobile app development side, more developers are going to grab code written by a ChatGPT a deep seek, and nobody knows how secure their code is for them. It's code, and we need to be able to build tools that help them ensure the apps are going to be safe at the end of the day. Yeah, I mean, that's a refreshing take on it because most people would say, well, we have some AI inside the product that's going to keep pace with the bad actors. Well. I think AI is in the hands of the good guys and the bad guys. We just need to make sure we come out. Ahead on there. That's great. Uh, if you, uh, had a message that you wanted to get out to everyone here at RSA or even just in the security world, just one thing that you wanted them to take away from this, uh, possibly related to mobile security, what would it be? I think it's really important to understand that attackers have a mobile first strategy. Right? Which means you can't assume whether you have an Android phone or an iOS phone, or you're building apps for this ecosystem that they're inherently safe. Don't do that. All right. If someone wants to learn more about Zimperium, where would you have them look? Obviously you have a website, but is there something relevant to the themes we just talked about? Yeah. So we just published a global mobile threat report that essentially tells you what threats are relevant in the world today by industry. So instead of focusing on all things possible, I would highly recommend you look for Zimperium Mobile Global Threat Report and find out what threats are relevant to you. All right. Thank you so much for being here today and talking to us. Thank you so much for the time. All right. Take care folks. Bye.
Zimperium brings enterprise-grade security to mobile devices, with on-device detection that works even without network access. From phishing and ransomware to zero-click exploits, Zimperium protects mobile endpoints without relying on MDM. It’s mobile-first, not mobile-lite—and it’s built for real-world attacks, not just compliance checklists.
Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • zimperium
  • mobile
  • security
  • endpoint
  • protection
  • on-device
  • detection
  • ransomware
  • phishing
  • zero-click
  • exploits
  • mdm
  • alternative
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Zimperium: Your Phone Is a Supercomputer (and a Target)

              Upcoming Webinar Calendar

              • 12/02/2025
                01:00 PM
                12/02/2025
                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
                https://www.truthinit.com/index.php/channel/1629/the-invisible-threat-how-polymorphic-malware-is-outsmarting-your-email-security/
              • 12/02/2025
                01:00 PM
                12/02/2025
                Kickstart Your Journey with Netwrix
                https://www.truthinit.com/index.php/channel/1631/kickstart-your-journey-with-netwrix/
              • 12/04/2025
                12:00 PM
                12/04/2025
                Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation
                https://www.truthinit.com/index.php/channel/1557/insights-from-an-osc-and-c3pao-assessor-on-cmmc-level-2-evaluation/
              • 12/04/2025
                01:00 PM
                12/04/2025
                CMMC Success: Enhancing Compliance with Intelligent Endpoint Protection Solutions
                https://www.truthinit.com/index.php/channel/1650/cmmc-success-enhancing-compliance-with-intelligent-endpoint-protection-solutions/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-insights/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Partner Tech Talk: Bridge Gaps and Boost Revenue with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/partner-tech-talk-bridge-gaps-and-boost-revenue-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize Revenue Opportunities with Druva’s Microsoft Expansion Strategies in EMEA.
                https://www.truthinit.com/index.php/channel/1625/maximize-revenue-opportunities-with-druvas-microsoft-expansion-strategies-in-emea/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Maximize Revenue Opportunities with Druva's Microsoft Expansion Insights.
                https://www.truthinit.com/index.php/channel/1623/maximize-revenue-opportunities-with-druvas-microsoft-expansion-insights/
              • 12/16/2025
                01:00 PM
                12/16/2025
                HUMAN Dialogue: Uncovering Insights and Safeguarding Performance through Page-Level Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-uncovering-insights-and-safeguarding-performance-through-page-level-intelligence/
              • 12/18/2025
                11:00 AM
                12/18/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
              • 12/18/2025
                01:00 PM
                12/18/2025
                Insightful Perspectives on IconAds, SlopAds, and AI Threats in 2026
                https://www.truthinit.com/index.php/channel/1649/insightful-perspectives-on-iconads-slopads-and-ai-threats-in-2026/

              Upcoming Spotlight Events

              • Dec
                02

                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                12/02/202501:00 PM ET
                • Dec
                  10

                  The Next Generation of Managed Data Security Services

                  12/10/202501:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Dec
                    04

                    Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation

                    12/04/202512:00 PM ET
                    • Dec
                      04

                      CMMC Success: Enhancing Compliance with Intelligent Endpoint Protection Solutions

                      12/04/202501:00 PM ET
                      • Dec
                        09

                        Energize Your Connections with Netskope and Presidio Insights

                        12/09/202501:00 PM ET
                        More events

                        Upcoming 360 View Events

                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            • Nov
                              18

                              Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                              11/18/202501:00 PM ET
                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Nov
                                  20

                                  CMMC Certification: Next Steps for Continuous Monitoring and Management

                                  11/20/202512:00 PM ET
                                  • Nov
                                    19

                                    Deep Packet Inspection (DPI) Insights within Endpoint Protector Learning Lab

                                    11/19/202511:00 AM ET
                                    • Nov
                                      18

                                      HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce

                                      11/18/202501:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version