This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Marble Security introduces secure mobile defence technology

Share this article:

Marble Security has announced the launch of an enterprise mobile security service.

Available for iOS, Android, Mac OS X and Windows, the company said that its Mobile Perimeter Defense technology can secure all devices via a secure environment.

According to the company, the isolated client allows the user to access a secure browser that connects to Marble's own virtual private network. Using secure virtual network services, risk-based access control and policy-based remediation, it claimed that it integrates real-time security intelligence that learns and adapts to sophisticated new threats.

Marble Security founder and CTO David Jevans said: “Mobile device management (MDM) falls short of securing mobile endpoints, and is expensive and hard to manage. Our mobile security approach goes beyond MDM to proactively protect a mobile worker's endpoints against cyber attacks even if they are infected with malware, something MDM solutions do not do.” 

 

Research by Marble Security found that small-to-medium enterprises are either unaware of or defenceless against the threats posed to their networks by mobile devices.

 

Its survey of 180 IT professionals found that 68 per cent were unaware of advanced persistent threats, 58 per cent were unaware of malicious and privacy-leaking apps and 57 per cent did not know of rooted devices or DNS poisoning.

 

Jevans said: “You can't defend against threats you don't understand. Hackers know mobile devices are the weak point and that is where they are attacking. The reality is that MDM alone is not a mobile security solution.

 

“Until now protecting against all of the critical threats required buying and managing multiple solutions, which is complex, heavy to manage and expensive. That is why we introduced the Marble mobile security service. It rolls up a completely integrated solution that is effective against the eight critical threats while remaining lightweight, light touch and affordable.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...