Resources

Data Sheets Data Sheets


Threat Alerts Threat Alerts


Webinars On Demand Webinars

Podcasts Podcasts

White Papers White Papers

  • What enterprises need to know about new iOS malware

    Report: What enterprises need to know about new iOS malware

    November 2014 may eventually become known as the ‘good ole days’ before iOS malware. That month the U.S. Government Computer Emergency Response Team (CERT) issued a warning to American businesses that iOS malware can be spread by phishing attacks, and that malicious apps may steal login credentials, access data, and monitor users’ devices. The electronic crime underground has begun exploiting iOS mobile devices and will intensify attacks on employees, making dynamic protection against malicious apps critically important.

    Download the Marble Labs report, and learn:

    • How the WireLurker and Masque Attack iOS malware are distributed and how they compromise enterprise systems
    • How Apple’s half measures for remediating these attacks leave both businesses and consumers vulnerable
    • How enterprises can protect against the new iOS malware, preventing advanced persistent attacks

  • MobileIron-Marble solution guide

    MobileIron and Marble Security have partnered to provide a tightly
    integrated solution that allows enterprises to manage which mobile
    apps may be used on employee devices that access corporate
    systems.

  • Nine Critical Threats Against Mobile Workers

    Criminals and hostile governments understand that the quickest way to corporate data is through mobile workers’ unsecured endpoints.

  • UBM: Protecting Mobile Device Users from Advanced Persistent Threats

    Understand the core requirements of enterprise mobile security, including mobile app scanning, personal VPNs, secure browsing and more.

  • SC Magazine: Mobile Moves Forward

    Download this SC Magazine Security Brief. It is the first step in moving your BYOD security strategy forward.

  • Spiceworks: How to Effectively Secure your Network Against Mobile Threats

    Learn about nine critical threats, why they succeed and how cutting-edge mobile security technologies render them ineffective.

  • CIO & CSO Group: Why you're still at risk, and what you can do about it

    Do you think MDM solutions stop mobile cyberattacks? Think again.


White Papers Analyst Reports