Organizations Overwhelmed by Increased Security Complexities in Detecting and Resolving Mobile Threats - - Tulsa, OK - News, Weather, Video and Sports - |

Organizations Overwhelmed by Increased Security Complexities in Detecting and Resolving Mobile Threats

Information contained on this page is provided by an independent third-party content provider. WorldNow and this Station make no warranties or representations in connection therewith. If you have any questions or comments about this page please contact

SOURCE AccessData

AccessData announces industry's first mobile threat detection and response for iOS™ and Android™ devices, fully integrated with the ResolutionOne™ Platform

LINDON, Utah, June 24, 2014 /PRNewswire/ -- The explosive growth of BYOD and mobile devices provides increasingly attractive entry points through which cyber criminals are penetrating corporate networks. The rapid growth of advanced attacks, in the form of mobile malware, data leakage and insider threats, is escalating as InfoSec teams struggle to rapidly detect and respond to these security incidents. Add to that the challenges of deploying threat detection and remediation capabilities across a company's networks and endpoints – including thousands of mobile devices housing enormous amounts of sensitive data – and the cybersecurity situation seems insurmountable for many corporations.

AccessData, the leader in incident resolution solutions, bridges the security gap between prevention-focused mobile device management (MDM) solutions and mobile threat detection and response with mobile device support in the ResolutionOne Platform. ResolutionOne integrates network, endpoint and malware analysis, threat intelligence, end-to-end e-discovery and remediation technologies into a single, scalable platform.

In a technology first, the mobile device support provides comprehensive, real-time visibility, intelligence and resolution capabilities across iOS and Android devices on or off corporate networks. The platform is the first to incorporate current MDM and MAM mobile device policies with real-time proactive mobile device monitoring to discover, analyze, respond to and resolve mobile threats at an enterprise scale.

  • Full Coverage of iOS and Android Devices
    First technology to provide deep visibility through activity recording and data collection on both iOS and Android devices.
  • Threat Intelligence
    First to auto-correlate mobile data against ResolutionOne's ThreatBridge threat intelligence engine to detect known threats.
  • Analytics
    Identify unusual behaviors and anomalies that stand out when looking at aggregated mobile device data across the enterprise.
  • Incident Replay
    Allows users to see what happened at any point in time in detail, formulating a timeline of events and the ability to reconstruct an incident.
  • Geolocation Visualization
    Provides geolocation information so investigators can track devices accurately on a graphical map.

"Organizations face growing challenges with multiple niche point products that are unable to provide the complete picture on incidents of all types," said Lee Reiber, Vice President Mobile Solutions at AccessData. "They rely on MDM and MAM solutions to handle their mobile security. This represents a false sense of security as the software is not equipped to deliver incident detection, response, and remediation. To address this need, we incorporated our advanced mobile forensics capabilities into the ResolutionOne Platform to extend rapid threat detection, analysis and resolution across iOS and Android devices."

The mobile endpoint monitoring feature operates in a similar fashion as the desktop version. The mobile agent is delivered silently to iOS and Android devices which are connected to the enterprise's network via a MDM or MAM application catalog. The devices are then monitored by the ResolutionOne Platform where processes, network communications and mobile device data are captured at predefined intervals. The data is auto-correlated with the integrated, customizable ThreatBridge engine's threat intelligence library to identify any known threats such as malicious IP addresses and known malware. It also detects unknown threats by providing visibility into network communications and running processes, so anomalous activities can be identified and remediated.

The ResolutionOne Platform with the mobile agent capabilities improves InfoSec and business processes with actionable intelligence to quickly identify and resolve security incidents.

  • The remote real-time visibility and remediation capabilities can accurately identify impacted mobile devices thus eliminating the laborious and time consuming task of collecting the entire fleet of mobile devices for analysis and reimaging.
  • Organizations can save valuable time, resources and related costs while resolving incidents faster.
  • Companies can minimize business risks, productivity loss, business downtime and potential revenue loss by not having to physically collect and analyze the entire company's mobile devices.
  • The platform installs into existing enterprise environments with the flexibility to scale as an organization's needs change. It also integrates current and new third party threat feeds/MDM/MAM solutions, other software and applications into a single platform.

Additional Resources

Overview ResolutionOne Platform Mobile Endpoint Monitoring
Press Release:  Gigaom Research Reveals Organizations are Unprepared for Security Incidents Involving Mobile Malware and Data Leakage
Report:  Gigaom Research Mobile security and incident readiness: preparing for threats
Blog:  Mobile Security for a Nomadic Workforce

Follow us on Twitter at @AccessDataGroup.

About AccessData

AccessData Group makes the world's most advanced and intuitive incident resolution solutions. AccessData technology delivers real-time insight, analysis, response and resolution of data incidents, including cyber threats, insider threats, mobile and BYOD risk, GRC (Governance Risk & Compliance) and eDiscovery events. Over 130,000 users in corporations, law enforcement, government agencies, and law firms around the world rely on AccessData software to protect them against the risks present in today's environment of continuous compromise.  

Media Contacts:

Judy Kaneko


 Merritt Group



©2012 PR Newswire. All Rights Reserved.

Powered by WorldNow
News On 6
303 N. Boston Ave.
Tulsa, OK 74103
Oklahoma's Own is proud to provide Oklahomans with timely and relevant news and information, sharing the stories, pictures and loves of Oklahomans across our great state including Tulsa's Own and Green Country's Own.
All content © Copyright 2000 - 2014, WorldNow and KOTV. All Rights Reserved. For more information on this site, please read our Privacy Policy and Terms of Service.