Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

AirPatrol Enables ‘Big Brother-Like’ Enforcement of Mobile Security Policy

New Technology Enforces Mobile Security Policy on a “Situationally Aware” Basis

AirPatrol Corp. today unveiled ZoneDefense, a monitoring and security technology that lets enterprises detect any mobile device on premise, track its location, check its compliance with company policy and enforce rules based on where the user is located and who is nearby.

New Technology Enforces Mobile Security Policy on a “Situationally Aware” Basis

AirPatrol Corp. today unveiled ZoneDefense, a monitoring and security technology that lets enterprises detect any mobile device on premise, track its location, check its compliance with company policy and enforce rules based on where the user is located and who is nearby.

AirPatrol LogoImagine a board meeting where sensitive conversations take place and confidential presentations are made. With the features in today’s smartphones, users are easily able to record audio, take photos, videos and of course, make calls at any time—posing a threat in situations where sensitive information is prevalent. That being said, forcing a board member to check his or her mobile device at the door may be a bit much to ask. 

Security Resource: Advanced Fraud Threats in Mobile Environments

AirPatrol’s ZonDefense can help defend against mobile threats beyond the typical access controls and data protections that many enterprise mobile management solutions provide. Utilizing commercial wireless bands and Wi-Fi, ZoneDefense’s technologies can track a device within a couple of meters of its exact location. In the case of a board meeting, ZoneDefense could, for example, automatically disable cameras and microphones as well as outgoing calls on smart phones detected in the boardroom.

AirPatrol Zone Defense Screenshot

With ZoneDefense deployed, any mobile device that is detected — whether it is a managed device or an unknown device — can follow specifically-defined policies based on where it is located and who is nearby. In another example use case, a mobile device may be permitted to do file sharing in an approved area of the headquarters building might have file sharing turned off in another part of the facility. Enterprises also can set up the system to trigger an alert when an unknown device enters a secure zone such as a boardroom or trading floor.

“ZoneDefense revolutionizes the way we monitor and manage the very fluid and ubiquitous mobile device layer through intelligence,” stated Tom Kellermann, CTO of AirPatrol. “Through continuous wireless monitoring and situational awareness, AirPatrol’s ZoneDefense has an advance persistent response that is paramount in today’s wireless security.”

ZoneDefense currently supports iOS (iPhones and iPads) and BlackBerry platforms, but will support Android later this year.

Related Reading: Advanced Fraud Threats in Mobile Environments

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Mobile & Wireless

South Dakota Gov. Kristi Noem says her personal cell phone was hacked and linked it to the release of documents by the January 6...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...