This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Marble Security introduces secure mobile defence technology

Share this article:

Marble Security has announced the launch of an enterprise mobile security service.

Available for iOS, Android, Mac OS X and Windows, the company said that its Mobile Perimeter Defense technology can secure all devices via a secure environment.

According to the company, the isolated client allows the user to access a secure browser that connects to Marble's own virtual private network. Using secure virtual network services, risk-based access control and policy-based remediation, it claimed that it integrates real-time security intelligence that learns and adapts to sophisticated new threats.

Marble Security founder and CTO David Jevans said: “Mobile device management (MDM) falls short of securing mobile endpoints, and is expensive and hard to manage. Our mobile security approach goes beyond MDM to proactively protect a mobile worker's endpoints against cyber attacks even if they are infected with malware, something MDM solutions do not do.” 

 

Research by Marble Security found that small-to-medium enterprises are either unaware of or defenceless against the threats posed to their networks by mobile devices.

 

Its survey of 180 IT professionals found that 68 per cent were unaware of advanced persistent threats, 58 per cent were unaware of malicious and privacy-leaking apps and 57 per cent did not know of rooted devices or DNS poisoning.

 

Jevans said: “You can't defend against threats you don't understand. Hackers know mobile devices are the weak point and that is where they are attacking. The reality is that MDM alone is not a mobile security solution.

 

“Until now protecting against all of the critical threats required buying and managing multiple solutions, which is complex, heavy to manage and expensive. That is why we introduced the Marble mobile security service. It rolls up a completely integrated solution that is effective against the eight critical threats while remaining lightweight, light touch and affordable.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

MH17 spammers direct Twitter users to Zeus-ridden websites

MH17 spammers direct Twitter users to Zeus-ridden websites

In the aftermath of the MH17 tragedy which saw almost 300 people lose their lives in an airplane crash over Ukraine, cyber-criminals are taking advantage by leading social media users ...

EU's new cybercrime taskforce set to launch

EU's new cybercrime taskforce set to launch

Andy Archibald, deputy head of the UK's National Cyber Crime Unit (NCCU), is to chair a new cyber-crime taskforce based out of the European Cybercrime Centre (EC3) in The Hague ...

The 5 most read articles this week: July 11-17

The 5 most read articles this week: July ...

Here are the five most popular SC articles, as seen by you the reader, in the week for July 11 to 17.