Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Zimperium: Your Phone Is a Supercomputer (and a Target)

Truth in IT
05/05/2025
73
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 talking to some more of the great security cyber security vendors. We are now talking to Zimperium. Right, I got that right. Zimperium. We are talking about mobile security I think is going to be our topic today here. I've got Krishna here today. So how did you get involved in security on the mobile side? There's so many facets to security. What brought you into mobile? So we started down this journey ten years ago, and we've realized mobile devices were becoming prominent, not just for our personal lives, but of our professional lives and secure them matter down the line. And that's how we got into it. I mean, it's amazing how well, uh, these portable slabs got integrated into everything, and we don't even see them anymore, but everyone's got one in their hand. Seven by 20. Yeah. I mean, think about it, right? A mobile device to all of us means productivity. And for a business, it represents business growth. They're invested in it. So we're helping them secure it. There's people walking around here just heard me say that they're smiling because they're holding on to their phones. Uh, so let's talk about, like, zimperium. Uh, if we look at security and there's all the different facets of security on there, what are you guys specifically doing now in that mobile sector? Yeah. So there are two things that we do as a company, right? Every enterprise allows their employees to access their stuff on their mobile device. We make sure those devices are secure at all times when they're accessing enterprise data on the mobile application side. Everyone's building mobile apps, right? Over 75% of the enterprises we talk to say they're building mobile applications. So they're we're making sure they're building secure mobile applications. And more importantly, the app needs to be able to protect itself once it's deployed because you have no control where it runs. So is this security paradigm that you're supporting go with the phone itself as an endpoint. Yeah. So for our mobile device protection solution, it's an app that really sits on your phone and makes sure you're safe at all times. Okay. So this is not something you can leave behind or forget to turn on. No, it will be pushed through your MDM UEM or we will push it to your employees device. It's always on and it's making sure you are secure at all times. Your device right on the app side, we give you the technology and developers put it inside the app and it makes sure the app can be compromised. All right. That's great. Let's talk a little bit about RSA, the conference here. There are definitely some themes we've been seeing. And I'm just prepped that with AI and supply chain vulnerabilities and the rest of it. When you look out, what are you seeing and how would you fit Zimperium into the sort of solution to those challenges? Right. So I right. Everyone's talking about it like you said. So the two areas that AI is going to make a big difference. One, phishing AI in the hands of attackers is going to accelerate the sophistication of phishing, right? Everything is going to be that much more believable. Every email, every text, you have to make sure your defenses are up for it. On the mobile app development side, more developers are going to grab code written by a ChatGPT a deep seek, and nobody knows how secure their code is for them. It's code, and we need to be able to build tools that help them ensure the apps are going to be safe at the end of the day. Yeah, I mean, that's a refreshing take on it because most people would say, well, we have some AI inside the product that's going to keep pace with the bad actors. Well. I think AI is in the hands of the good guys and the bad guys. We just need to make sure we come out. Ahead on there. That's great. Uh, if you, uh, had a message that you wanted to get out to everyone here at RSA or even just in the security world, just one thing that you wanted them to take away from this, uh, possibly related to mobile security, what would it be? I think it's really important to understand that attackers have a mobile first strategy. Right? Which means you can't assume whether you have an Android phone or an iOS phone, or you're building apps for this ecosystem that they're inherently safe. Don't do that. All right. If someone wants to learn more about Zimperium, where would you have them look? Obviously you have a website, but is there something relevant to the themes we just talked about? Yeah. So we just published a global mobile threat report that essentially tells you what threats are relevant in the world today by industry. So instead of focusing on all things possible, I would highly recommend you look for Zimperium Mobile Global Threat Report and find out what threats are relevant to you. All right. Thank you so much for being here today and talking to us. Thank you so much for the time. All right. Take care folks. Bye.
Zimperium brings enterprise-grade security to mobile devices, with on-device detection that works even without network access. From phishing and ransomware to zero-click exploits, Zimperium protects mobile endpoints without relying on MDM. It’s mobile-first, not mobile-lite—and it’s built for real-world attacks, not just compliance checklists.
Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • zimperium
  • mobile
  • security
  • endpoint
  • protection
  • on-device
  • detection
  • ransomware
  • phishing
  • zero-click
  • exploits
  • mdm
  • alternative
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Zimperium: Your Phone Is a Supercomputer (and a Target)

              Upcoming Webinar Calendar

              • 02/19/2026
                10:00 AM
                02/19/2026
                Prepare for Tomorrow: Strategies to Strengthen Your Resilience Plan
                https://www.truthinit.com/index.php/channel/1816/prepare-for-tomorrow-strategies-to-strengthen-your-resilience-plan/
              • 02/19/2026
                01:00 PM
                02/19/2026
                The CISO Dilemma: Fostering Innovation & Security in the Age of AI
                https://www.truthinit.com/index.php/channel/1809/the-ciso-dilemma-fostering-innovation-security-in-the-age-of-ai/
              • 02/19/2026
                04:00 PM
                02/19/2026
                Real Talk w. IT Leaders: Top Trends in 2026
                https://www.truthinit.com/index.php/channel/1823/real-talk/
              • 02/26/2026
                01:00 PM
                02/26/2026
                HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders
                https://www.truthinit.com/index.php/channel/1833/human-dialogue-examining-the-effects-of-owasps-top-ten-agentic-risks-on-builders-and-defenders/
              • 02/26/2026
                09:30 PM
                02/26/2026
                Strategies for Safeguarding Data Using DSPM in the AI Era
                https://www.truthinit.com/index.php/channel/1827/strategies-for-safeguarding-data-using-dspm-in-the-ai-era/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-insights/
              • 03/05/2026
                01:00 PM
                03/05/2026
                "VMware Alternative" or "Private Cloud OS"?
                https://www.truthinit.com/index.php/channel/1834/vmware-alternative-or-private-cloud-os/
              • 03/11/2026
                01:00 PM
                03/11/2026
                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk Through AI-Driven Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-driven-cyber-resilience/

              Upcoming Spotlight Events

              • Feb
                19

                The CISO Dilemma: Fostering Innovation & Security in the Age of AI

                02/19/202601:00 PM ET
                • Mar
                  05

                  "VMware Alternative" or "Private Cloud OS"?

                  03/05/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Feb
                    19

                    Prepare for Tomorrow: Strategies to Strengthen Your Resilience Plan

                    02/19/202610:00 AM ET
                    • Feb
                      19

                      Real Talk w. IT Leaders: Top Trends in 2026

                      02/19/202604:00 PM ET
                      • Feb
                        26

                        HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders

                        02/26/202601:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Feb
                          03

                          Evolution of Cloud Adaptability and AI Performance

                          02/03/202601:00 PM ET
                          • Jan
                            27

                            AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                            01/27/202601:00 PM ET
                            • Jan
                              22

                              Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                              01/22/202601:00 PM ET
                              More events

                              Recent Industry Events

                              • Feb
                                10

                                Transforming Secure Access through Netskope One Private Access

                                02/10/202612:00 AM ET
                                • Feb
                                  03

                                  De la visibilidad a la protección: asegurando la integridad de los datos sensibles

                                  02/03/202604:00 AM ET
                                  • Jan
                                    29

                                    Transforming Secure Access through Netskope One Private Access Solutions

                                    01/29/202612:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version