Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

AirPatrol Enables ‘Big Brother-Like’ Enforcement of Mobile Security Policy

New Technology Enforces Mobile Security Policy on a “Situationally Aware” Basis

AirPatrol Corp. today unveiled ZoneDefense, a monitoring and security technology that lets enterprises detect any mobile device on premise, track its location, check its compliance with company policy and enforce rules based on where the user is located and who is nearby.

New Technology Enforces Mobile Security Policy on a “Situationally Aware” Basis

AirPatrol Corp. today unveiled ZoneDefense, a monitoring and security technology that lets enterprises detect any mobile device on premise, track its location, check its compliance with company policy and enforce rules based on where the user is located and who is nearby.

AirPatrol LogoImagine a board meeting where sensitive conversations take place and confidential presentations are made. With the features in today’s smartphones, users are easily able to record audio, take photos, videos and of course, make calls at any time—posing a threat in situations where sensitive information is prevalent. That being said, forcing a board member to check his or her mobile device at the door may be a bit much to ask. 

Security Resource: Advanced Fraud Threats in Mobile Environments

AirPatrol’s ZonDefense can help defend against mobile threats beyond the typical access controls and data protections that many enterprise mobile management solutions provide. Utilizing commercial wireless bands and Wi-Fi, ZoneDefense’s technologies can track a device within a couple of meters of its exact location. In the case of a board meeting, ZoneDefense could, for example, automatically disable cameras and microphones as well as outgoing calls on smart phones detected in the boardroom.

AirPatrol Zone Defense Screenshot

With ZoneDefense deployed, any mobile device that is detected — whether it is a managed device or an unknown device — can follow specifically-defined policies based on where it is located and who is nearby. In another example use case, a mobile device may be permitted to do file sharing in an approved area of the headquarters building might have file sharing turned off in another part of the facility. Enterprises also can set up the system to trigger an alert when an unknown device enters a secure zone such as a boardroom or trading floor.

“ZoneDefense revolutionizes the way we monitor and manage the very fluid and ubiquitous mobile device layer through intelligence,” stated Tom Kellermann, CTO of AirPatrol. “Through continuous wireless monitoring and situational awareness, AirPatrol’s ZoneDefense has an advance persistent response that is paramount in today’s wireless security.”

ZoneDefense currently supports iOS (iPhones and iPads) and BlackBerry platforms, but will support Android later this year.

Related Reading: Advanced Fraud Threats in Mobile Environments

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...