Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Zimperium: Your Phone Is a Supercomputer (and a Target)

Truth in IT
05/05/2025
72
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 talking to some more of the great security cyber security vendors. We are now talking to Zimperium. Right, I got that right. Zimperium. We are talking about mobile security I think is going to be our topic today here. I've got Krishna here today. So how did you get involved in security on the mobile side? There's so many facets to security. What brought you into mobile? So we started down this journey ten years ago, and we've realized mobile devices were becoming prominent, not just for our personal lives, but of our professional lives and secure them matter down the line. And that's how we got into it. I mean, it's amazing how well, uh, these portable slabs got integrated into everything, and we don't even see them anymore, but everyone's got one in their hand. Seven by 20. Yeah. I mean, think about it, right? A mobile device to all of us means productivity. And for a business, it represents business growth. They're invested in it. So we're helping them secure it. There's people walking around here just heard me say that they're smiling because they're holding on to their phones. Uh, so let's talk about, like, zimperium. Uh, if we look at security and there's all the different facets of security on there, what are you guys specifically doing now in that mobile sector? Yeah. So there are two things that we do as a company, right? Every enterprise allows their employees to access their stuff on their mobile device. We make sure those devices are secure at all times when they're accessing enterprise data on the mobile application side. Everyone's building mobile apps, right? Over 75% of the enterprises we talk to say they're building mobile applications. So they're we're making sure they're building secure mobile applications. And more importantly, the app needs to be able to protect itself once it's deployed because you have no control where it runs. So is this security paradigm that you're supporting go with the phone itself as an endpoint. Yeah. So for our mobile device protection solution, it's an app that really sits on your phone and makes sure you're safe at all times. Okay. So this is not something you can leave behind or forget to turn on. No, it will be pushed through your MDM UEM or we will push it to your employees device. It's always on and it's making sure you are secure at all times. Your device right on the app side, we give you the technology and developers put it inside the app and it makes sure the app can be compromised. All right. That's great. Let's talk a little bit about RSA, the conference here. There are definitely some themes we've been seeing. And I'm just prepped that with AI and supply chain vulnerabilities and the rest of it. When you look out, what are you seeing and how would you fit Zimperium into the sort of solution to those challenges? Right. So I right. Everyone's talking about it like you said. So the two areas that AI is going to make a big difference. One, phishing AI in the hands of attackers is going to accelerate the sophistication of phishing, right? Everything is going to be that much more believable. Every email, every text, you have to make sure your defenses are up for it. On the mobile app development side, more developers are going to grab code written by a ChatGPT a deep seek, and nobody knows how secure their code is for them. It's code, and we need to be able to build tools that help them ensure the apps are going to be safe at the end of the day. Yeah, I mean, that's a refreshing take on it because most people would say, well, we have some AI inside the product that's going to keep pace with the bad actors. Well. I think AI is in the hands of the good guys and the bad guys. We just need to make sure we come out. Ahead on there. That's great. Uh, if you, uh, had a message that you wanted to get out to everyone here at RSA or even just in the security world, just one thing that you wanted them to take away from this, uh, possibly related to mobile security, what would it be? I think it's really important to understand that attackers have a mobile first strategy. Right? Which means you can't assume whether you have an Android phone or an iOS phone, or you're building apps for this ecosystem that they're inherently safe. Don't do that. All right. If someone wants to learn more about Zimperium, where would you have them look? Obviously you have a website, but is there something relevant to the themes we just talked about? Yeah. So we just published a global mobile threat report that essentially tells you what threats are relevant in the world today by industry. So instead of focusing on all things possible, I would highly recommend you look for Zimperium Mobile Global Threat Report and find out what threats are relevant to you. All right. Thank you so much for being here today and talking to us. Thank you so much for the time. All right. Take care folks. Bye.
Zimperium brings enterprise-grade security to mobile devices, with on-device detection that works even without network access. From phishing and ransomware to zero-click exploits, Zimperium protects mobile endpoints without relying on MDM. It’s mobile-first, not mobile-lite—and it’s built for real-world attacks, not just compliance checklists.
Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • zimperium
  • mobile
  • security
  • endpoint
  • protection
  • on-device
  • detection
  • ransomware
  • phishing
  • zero-click
  • exploits
  • mdm
  • alternative
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Zimperium: Your Phone Is a Supercomputer (and a Target)

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection for Enhanced Threat Prevention 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-for-enhanced-threat-prevention-8-0/
              • 01/28/2026
                10:55 AM
                01/28/2026
                Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization
                https://www.truthinit.com/index.php/channel/1769/transforming-insights-into-action-a-comprehensive-security-strategy-for-scalable-data-democratization/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 01/29/2026
                12:00 PM
                01/29/2026
                Transforming Secure Access through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1772/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/19/2026
                03:00 AM
                02/19/2026
                Keepit DACH Partner - Breakfast Webinar Insights and Strategies
                https://www.truthinit.com/index.php/channel/1786/keepit-dach-partner-breakfast-webinar-insights-and-strategies/

              Upcoming Spotlight Events

              • Jan
                20

                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                01/20/202601:00 PM ET
                • Jan
                  22

                  Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                  01/22/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection for Enhanced Threat Prevention 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      28

                      Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization

                      01/28/202610:55 AM ET
                      • Jan
                        29

                        Preparing Your Cybersecurity Strategy for the Challenges of 2026

                        01/29/202610:00 AM ET
                        More events

                        Recent Spotlight Events

                        • Dec
                          10

                          The Next Generation of Managed Data Security Services

                          12/10/202501:00 PM ET
                          • Dec
                            02

                            The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                            12/02/202501:00 PM ET
                            • Nov
                              20

                              Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                              11/20/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                18

                                Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                                12/18/202501:00 PM ET
                                • Dec
                                  16

                                  HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                  12/16/202501:00 PM ET
                                  • Dec
                                    11

                                    Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                    12/11/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version