Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Networking
    • The Edge
    • Virtualization
    • Converged Infrastructure
  • Data Security ▼
    • Backup & Recovery
    • Cybersecurity
    • Application Security
  • Cloud ▼
    • Private Cloud
    • Public Cloud
    • Hybrid Cloud
  • Storage ▼
    • Software Defined Storage
    • Object Storage
    • Physical Storage
  • DevOps ▼
    • Analytics
    • Applications
    • Open Source

Zimperium: Your Phone Is a Supercomputer (and a Target)

Truth in IT
05/05/2025
49
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 talking to some more of the great security cyber security vendors. We are now talking to Zimperium. Right, I got that right. Zimperium. We are talking about mobile security I think is going to be our topic today here. I've got Krishna here today. So how did you get involved in security on the mobile side? There's so many facets to security. What brought you into mobile? So we started down this journey ten years ago, and we've realized mobile devices were becoming prominent, not just for our personal lives, but of our professional lives and secure them matter down the line. And that's how we got into it. I mean, it's amazing how well, uh, these portable slabs got integrated into everything, and we don't even see them anymore, but everyone's got one in their hand. Seven by 20. Yeah. I mean, think about it, right? A mobile device to all of us means productivity. And for a business, it represents business growth. They're invested in it. So we're helping them secure it. There's people walking around here just heard me say that they're smiling because they're holding on to their phones. Uh, so let's talk about, like, zimperium. Uh, if we look at security and there's all the different facets of security on there, what are you guys specifically doing now in that mobile sector? Yeah. So there are two things that we do as a company, right? Every enterprise allows their employees to access their stuff on their mobile device. We make sure those devices are secure at all times when they're accessing enterprise data on the mobile application side. Everyone's building mobile apps, right? Over 75% of the enterprises we talk to say they're building mobile applications. So they're we're making sure they're building secure mobile applications. And more importantly, the app needs to be able to protect itself once it's deployed because you have no control where it runs. So is this security paradigm that you're supporting go with the phone itself as an endpoint. Yeah. So for our mobile device protection solution, it's an app that really sits on your phone and makes sure you're safe at all times. Okay. So this is not something you can leave behind or forget to turn on. No, it will be pushed through your MDM UEM or we will push it to your employees device. It's always on and it's making sure you are secure at all times. Your device right on the app side, we give you the technology and developers put it inside the app and it makes sure the app can be compromised. All right. That's great. Let's talk a little bit about RSA, the conference here. There are definitely some themes we've been seeing. And I'm just prepped that with AI and supply chain vulnerabilities and the rest of it. When you look out, what are you seeing and how would you fit Zimperium into the sort of solution to those challenges? Right. So I right. Everyone's talking about it like you said. So the two areas that AI is going to make a big difference. One, phishing AI in the hands of attackers is going to accelerate the sophistication of phishing, right? Everything is going to be that much more believable. Every email, every text, you have to make sure your defenses are up for it. On the mobile app development side, more developers are going to grab code written by a ChatGPT a deep seek, and nobody knows how secure their code is for them. It's code, and we need to be able to build tools that help them ensure the apps are going to be safe at the end of the day. Yeah, I mean, that's a refreshing take on it because most people would say, well, we have some AI inside the product that's going to keep pace with the bad actors. Well. I think AI is in the hands of the good guys and the bad guys. We just need to make sure we come out. Ahead on there. That's great. Uh, if you, uh, had a message that you wanted to get out to everyone here at RSA or even just in the security world, just one thing that you wanted them to take away from this, uh, possibly related to mobile security, what would it be? I think it's really important to understand that attackers have a mobile first strategy. Right? Which means you can't assume whether you have an Android phone or an iOS phone, or you're building apps for this ecosystem that they're inherently safe. Don't do that. All right. If someone wants to learn more about Zimperium, where would you have them look? Obviously you have a website, but is there something relevant to the themes we just talked about? Yeah. So we just published a global mobile threat report that essentially tells you what threats are relevant in the world today by industry. So instead of focusing on all things possible, I would highly recommend you look for Zimperium Mobile Global Threat Report and find out what threats are relevant to you. All right. Thank you so much for being here today and talking to us. Thank you so much for the time. All right. Take care folks. Bye.
Zimperium brings enterprise-grade security to mobile devices, with on-device detection that works even without network access. From phishing and ransomware to zero-click exploits, Zimperium protects mobile endpoints without relying on MDM. It’s mobile-first, not mobile-lite—and it’s built for real-world attacks, not just compliance checklists.
Categories:
  • » Small World Big Data
  • » Technology Communities » Data Security » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • zimperium
  • mobile
  • security
  • endpoint
  • protection
  • on-device
  • detection
  • ransomware
  • phishing
  • zero-click
  • exploits
  • mdm
  • alternative
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Zimperium: Your Phone Is a Supercomputer (and a Target)

            Upcoming Spotlight Events

            • Jun
              24

              Agentic AI Ransomware: What You Need to Know

              06/24/202513:00:00 ET
              More events

              Upcoming 360 View Events

              • Jun
                18

                360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                06/18/202512:00:00 ET
                • Jul
                  24

                  360View: API Security & the Expanding Attack Surface

                  07/24/202512:00:00 ET
                  • Aug
                    21

                    360View: HCI, Cloud, and Virtualization: What’s Next?

                    08/21/202512:00:00 ET
                    More events

                    Upcoming Industry Events

                    • Jun
                      04

                      Rubrik FORW>>RD

                      06/04/202510:00:00 ET
                      • Jun
                        04

                        Securing the Surge: AppSec in the Age of AI-Generated Code

                        06/04/202513:00:00 ET
                        • Jun
                          26

                          Mastering Modern Security with Wallarm's Advanced API Solutions

                          06/26/202513:00:00 ET
                          • Jul
                            15

                            Recognizing Identity Threats: Effective Detection and Response Strategies with Netwrix

                            07/15/202502:00:00 ET
                            More events
                            Truth in IT
                            • Advertise
                            • About Us
                            • Terms of Service
                            • Privacy Policy
                            • Contact Us
                            • Be Our Guest
                            • Preference Management
                            Desktop version
                            Standard version