Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Zimperium: Your Phone Is a Supercomputer (and a Target)

Truth in IT
05/05/2025
73
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 talking to some more of the great security cyber security vendors. We are now talking to Zimperium. Right, I got that right. Zimperium. We are talking about mobile security I think is going to be our topic today here. I've got Krishna here today. So how did you get involved in security on the mobile side? There's so many facets to security. What brought you into mobile? So we started down this journey ten years ago, and we've realized mobile devices were becoming prominent, not just for our personal lives, but of our professional lives and secure them matter down the line. And that's how we got into it. I mean, it's amazing how well, uh, these portable slabs got integrated into everything, and we don't even see them anymore, but everyone's got one in their hand. Seven by 20. Yeah. I mean, think about it, right? A mobile device to all of us means productivity. And for a business, it represents business growth. They're invested in it. So we're helping them secure it. There's people walking around here just heard me say that they're smiling because they're holding on to their phones. Uh, so let's talk about, like, zimperium. Uh, if we look at security and there's all the different facets of security on there, what are you guys specifically doing now in that mobile sector? Yeah. So there are two things that we do as a company, right? Every enterprise allows their employees to access their stuff on their mobile device. We make sure those devices are secure at all times when they're accessing enterprise data on the mobile application side. Everyone's building mobile apps, right? Over 75% of the enterprises we talk to say they're building mobile applications. So they're we're making sure they're building secure mobile applications. And more importantly, the app needs to be able to protect itself once it's deployed because you have no control where it runs. So is this security paradigm that you're supporting go with the phone itself as an endpoint. Yeah. So for our mobile device protection solution, it's an app that really sits on your phone and makes sure you're safe at all times. Okay. So this is not something you can leave behind or forget to turn on. No, it will be pushed through your MDM UEM or we will push it to your employees device. It's always on and it's making sure you are secure at all times. Your device right on the app side, we give you the technology and developers put it inside the app and it makes sure the app can be compromised. All right. That's great. Let's talk a little bit about RSA, the conference here. There are definitely some themes we've been seeing. And I'm just prepped that with AI and supply chain vulnerabilities and the rest of it. When you look out, what are you seeing and how would you fit Zimperium into the sort of solution to those challenges? Right. So I right. Everyone's talking about it like you said. So the two areas that AI is going to make a big difference. One, phishing AI in the hands of attackers is going to accelerate the sophistication of phishing, right? Everything is going to be that much more believable. Every email, every text, you have to make sure your defenses are up for it. On the mobile app development side, more developers are going to grab code written by a ChatGPT a deep seek, and nobody knows how secure their code is for them. It's code, and we need to be able to build tools that help them ensure the apps are going to be safe at the end of the day. Yeah, I mean, that's a refreshing take on it because most people would say, well, we have some AI inside the product that's going to keep pace with the bad actors. Well. I think AI is in the hands of the good guys and the bad guys. We just need to make sure we come out. Ahead on there. That's great. Uh, if you, uh, had a message that you wanted to get out to everyone here at RSA or even just in the security world, just one thing that you wanted them to take away from this, uh, possibly related to mobile security, what would it be? I think it's really important to understand that attackers have a mobile first strategy. Right? Which means you can't assume whether you have an Android phone or an iOS phone, or you're building apps for this ecosystem that they're inherently safe. Don't do that. All right. If someone wants to learn more about Zimperium, where would you have them look? Obviously you have a website, but is there something relevant to the themes we just talked about? Yeah. So we just published a global mobile threat report that essentially tells you what threats are relevant in the world today by industry. So instead of focusing on all things possible, I would highly recommend you look for Zimperium Mobile Global Threat Report and find out what threats are relevant to you. All right. Thank you so much for being here today and talking to us. Thank you so much for the time. All right. Take care folks. Bye.
Zimperium brings enterprise-grade security to mobile devices, with on-device detection that works even without network access. From phishing and ransomware to zero-click exploits, Zimperium protects mobile endpoints without relying on MDM. It’s mobile-first, not mobile-lite—and it’s built for real-world attacks, not just compliance checklists.
Categories:
  • » Small World Big Data
  • » Cybersecurity
  • » Cybersecurity » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • zimperium
  • mobile
  • security
  • endpoint
  • protection
  • on-device
  • detection
  • ransomware
  • phishing
  • zero-click
  • exploits
  • mdm
  • alternative
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Zimperium: Your Phone Is a Supercomputer (and a Target)

              Upcoming Webinar Calendar

              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-insights/
              • 03/05/2026
                01:00 PM
                03/05/2026
                "VMware Alternative" or "Private Cloud OS"?
                https://www.truthinit.com/index.php/channel/1834/vmware-alternative-or-private-cloud-os/
              • 03/11/2026
                01:00 PM
                03/11/2026
                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
              • 03/11/2026
                01:00 PM
                03/11/2026
                Introducing the Netskope AI Launch for the Americas
                https://www.truthinit.com/index.php/channel/1850/introducing-the-netskope-ai-launch-for-the-americas/
              • 03/12/2026
                12:00 AM
                03/12/2026
                Unveiling the Netskope AI Initiative in the APAC Region
                https://www.truthinit.com/index.php/channel/1849/unveiling-the-netskope-ai-initiative-in-the-apac-region/
              • 03/12/2026
                06:00 AM
                03/12/2026
                Introducing the Netskope AI Revolution in EMEA
                https://www.truthinit.com/index.php/channel/1848/introducing-the-netskope-ai-revolution-in-emea/
              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et les années suivantes
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-les-années-suivantes/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk Through AI-Driven Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-driven-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/

              Upcoming Spotlight Events

              • Mar
                05

                "VMware Alternative" or "Private Cloud OS"?

                03/05/202601:00 PM ET
                • Mar
                  11

                  AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets

                  03/11/202601:00 PM ET
                  • Mar
                    18

                    Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                    03/18/202601:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Mar
                      03

                      Energize Your Connections with Netskope and Presidio Insights

                      03/03/202601:00 PM ET
                      • Mar
                        11

                        Introducing the Netskope AI Launch for the Americas

                        03/11/202601:00 PM ET
                        • Mar
                          12

                          Unveiling the Netskope AI Initiative in the APAC Region

                          03/12/202612:00 AM ET
                          More events

                          Recent Spotlight Events

                          • Feb
                            19

                            The CISO Dilemma: Fostering Innovation & Security in the Age of AI

                            02/19/202601:00 PM ET
                            • Feb
                              03

                              Evolution of Cloud Adaptability and AI Performance

                              02/03/202601:00 PM ET
                              • Jan
                                27

                                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                                01/27/202601:00 PM ET
                                More events

                                Recent Industry Events

                                • Feb
                                  26

                                  Strategies for Safeguarding Data Amidst AI Innovations with DSPM

                                  02/26/202609:30 PM ET
                                  • Feb
                                    26

                                    HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders

                                    02/26/202601:00 PM ET
                                    • Feb
                                      26

                                      Demonstrating and Ensuring Endpoint Compliance in the Age of AI

                                      02/26/202612:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version