Zimperium and Ping Identity Extend Zero Trust Controls to the Most Vulnerable Endpoint: Mobile


Integration of Zimperium’s mobile device risk attestation into the PingFederate platform enables real-time Zero Trust authorizations and access to corporate resources

Zimperium is excited to announce a partnership with Ping Identity, enhancing Zero Trust architectures by delivering comprehensive mobile risk posture data to enable joint customers to implement more robust controls and policies to provide end-users with clear, actionable alerts directing them to resolve security or compliance issues. With the real-time mobile threat detection, notification, and response from Zimperium and the PingFederate architecture and enterprise workflows, security teams can ensure mobile endpoint coverage is an integral part of their Zero Trust security posture.

The established perimeters around corporate devices have faded away, replaced by an ever-mobile distributed workforce with global access into enterprise assets. Increased connectivity and data availability enable organizations to grow and evolve beyond a physical location’s confines while minimizing the friction an employee would typically experience in this new, spread-out workspace. For enterprises to securely enable employees to access the data they need on the devices they use the most, Zero Trust must be enabled with advanced mobile threat defense.

Ping Identity, the Intelligent Identity solution for the enterprise, believes zero trust technology is essential to securing business and consumers in an increasingly connected world. And Zimperium’s integration into the PingFederate platform provides joint customers with enhanced controls, addressing the mobile device’s security posture by providing the granular telemetry data back to the Ping Identity Zero Trust architecture.

Using Zimperium’s patented on-device, machine learning-based mobile security technology, the integration enhances Ping Identity’s existing mobile endpoint identity management and access controls. Joint customers will be protected against targeted mobile risks and attacks and will immediately experience the benefits of enhanced Zero Trust capabilities and workflows, such as:

  • Broadest range of mobile risk and threat-based detection in the industry;
  • Real-time conditional access across all mobile devices and accounts across a broad range of apps and services;
  • Direct user feedback on detected risks within the protected app (where applicable)
  • Defined access policies best suited for the environment; and
  • Reduced attack surface through mobile endpoint access and authorization controls.

“Due to the rise in distributed work and bring your own device policies, the average enterprise is not securing 60% of the connected devices in their network – mobile endpoints,’ said Jon Paterson, CTO of Zimperium. “The integration between Zimperium and Ping Identity not only brings those devices into the security fold, but it also enhances mobile Zero Trust controls, minimizing mobile risks and attack surfaces.”

This integration between Zimperium and Ping Identity enables enterprises to evolve and scale without sacrificing their security posture. By enhancing existing mobile endpoint identity management and access tools, security operations teams can understand their whole risk posture and raise their mobile security confidence on managed and unmanaged mobile devices.

“Identity is the new perimeter that enterprises need to secure, and the best way to effectively do that is to leverage a zero trust approach that unifies mobile threat defense with strong authentication,” said Loren Russon, vice president of product management at Ping Identity. “Our integration with Zimperium will make zero trust implementation easy for security teams to deliver a more seamless and secure user experience.”

For More Information

Attend our webinar on April 29th at 11am EDT to see a how Zimperium enhances Zero Trust architecture on mobile endpoints.

About Zimperium

Zimperium, the global leader in mobile security, offers the only real-time, on-device, machine learning-based protection against Android, iOS and Chromebooks threats. Powered by z9, Zimperium provides protection against device, network, phishing and malicious app attacks. For more information, visit www.zimperium.com.

Zimperium and Ping Identity Extend Zero Trust Controls to the Most Vulnerable Endpoint: Mobile

Source

Related Articles

The President’s Executive Order on Cybersecurity is a Massive Shift for Security

The latest ransomware attack on Colonial Pipeline highlights the worst secret in cybersecurity; our nation’s critical infrastructure is not prepared to stand up against the modern cyber threats. Systems like these have been the target for attacks from domestic and foreign cybercriminals for years. These groups are armed with the latest and most effective zero-day … Read More

The post The President’s Executive Order on Cybersecurity is a Massive Shift for Security appeared first on Zimperium Mobile Security Blog.

Gartner 2021 Market Guide for Mobile Threat Defense

“Security and risk management leaders who need to strengthen their mobile security posture should adopt MTD products to improve their overall security hygiene.” – Gartner Gartner recently published the 2021 Market Guide for Mobile Threat Defense report, and the analyst firm continued to highlight the importance of enterprise adoption of Mobile Threat Defense (MTD) solutions … Read More

The post Gartner 2021 Market Guide for Mobile Threat Defense appeared first on Zimperium Mobile Security Blog.

Let’s Protect More than 40% of our Endpoints

Imagine finding out your most recent departmental budget was only 40% of what it should be. If you’re like me, you’d get a strong feeling that “something is missing and it’s a real disaster.” Well, here’s the thing. If you’re a CISO – or if your job involves information security in general – you should … Read More

The post Let’s Protect More than 40% of our Endpoints appeared first on Zimperium Mobile Security Blog.

Unsecured Cloud Configurations Exposing Information in Thousands of Mobile Apps

Abstract When approaching the development of a mobile application, one of the key design decisions revolves around the server side aspect of the application. Specifically, storage of information relevant to the app’s usage, as well as the backend API’s allowing the app to query the server for information in real time (as opposed to static … Read More

The post Unsecured Cloud Configurations Exposing Information in Thousands of Mobile Apps appeared first on Zimperium Mobile Security Blog.

GriftHorse Android Trojan Steals Millions from Over 10 Million Victims Globally

Research and writeup by Aazim Yaswant and Nipun Gupta With the increase of mobile device use in everyday life, it is no surprise to see cybercriminals targeting these endpoints for financial crimes. Zimperium zLabs recently discovered an aggressive mobile premium services campaign with upwards of 10 million victims globally, and […]

The post GriftHorse Android Trojan Steals Millions from Over 10 Million Victims Globally appeared first on Zimperium Mobile Security Blog.