This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Marble Security introduces secure mobile defence technology

Share this article:

Marble Security has announced the launch of an enterprise mobile security service.

Available for iOS, Android, Mac OS X and Windows, the company said that its Mobile Perimeter Defense technology can secure all devices via a secure environment.

According to the company, the isolated client allows the user to access a secure browser that connects to Marble's own virtual private network. Using secure virtual network services, risk-based access control and policy-based remediation, it claimed that it integrates real-time security intelligence that learns and adapts to sophisticated new threats.

Marble Security founder and CTO David Jevans said: “Mobile device management (MDM) falls short of securing mobile endpoints, and is expensive and hard to manage. Our mobile security approach goes beyond MDM to proactively protect a mobile worker's endpoints against cyber attacks even if they are infected with malware, something MDM solutions do not do.” 

 

Research by Marble Security found that small-to-medium enterprises are either unaware of or defenceless against the threats posed to their networks by mobile devices.

 

Its survey of 180 IT professionals found that 68 per cent were unaware of advanced persistent threats, 58 per cent were unaware of malicious and privacy-leaking apps and 57 per cent did not know of rooted devices or DNS poisoning.

 

Jevans said: “You can't defend against threats you don't understand. Hackers know mobile devices are the weak point and that is where they are attacking. The reality is that MDM alone is not a mobile security solution.

 

“Until now protecting against all of the critical threats required buying and managing multiple solutions, which is complex, heavy to manage and expensive. That is why we introduced the Marble mobile security service. It rolls up a completely integrated solution that is effective against the eight critical threats while remaining lightweight, light touch and affordable.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Chinese hackers steal confidential documents on Israeli missile defence system

Chinese hackers steal confidential documents on Israeli missile ...

Chinese hackers comprised the computer systems of three Israeli defence contractors between 10 October 2011 and 13 August 2012 in order to steal hundreds on confidential documents on Israel's Iron ...

Security researcher finds exploitable flaws in 14 antivirus engines

Security researcher finds exploitable flaws in 14 antivirus ...

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has found exploitable local and remote flaws in 14 of the 17 major antivirus (AV) engines used by most major AV ...

Russian government promises £60k bounty to Tor hackers

Russian government promises £60k bounty to Tor hackers

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately £64,600) reward to anyone who can find a way of identifying and tracking users of the ...