Leading Direct-to-Cloud Network Complements Mobile Device Management with Advanced Threat Protection to Address EMEA Compliance Regulation with Real-time Visibility and Granular Policy Enforcement to BYOD and Corporate-owned Mobile Environments
San Jose, CA, June 4, 2013 – Zscaler, the industry’s leading secure Direct-to-Cloud Network for global advanced security and policy enforcement, today announced the release of the Zscaler Mobile Security Solution, extending the benefits of the Zscaler Network to enable centrally-managed advanced threat protection, real-time visibility and granular policy controls for mobile devices deployed in BYOD, corporate-issued and hybrid environments. Zscaler also announced partnerships with Mobile Device Management (MDM) solutions, integrating Mobile Security to complement provisioning and auditing capabilities.
“Security appliances have become irrelevant in securing mobile users since mobile traffic and cloud applications often bypass appliances completely,” said Jay Chaudhry, founder and CEO, Zscaler. “MDM solutions have been the first step to manage and configure mobile devices; Zscaler is the natural step forward to provide security by inspecting all mobile content, enforcing policy and ensuring visibility.”
Analysis from IDC indicates, “With more devices entering the workplace and with more demand for access to applications in the work environment, companies across EMEA — with tight compliance and regulatory environments to contend with — have to balance the rewards of mobility with the risks associated with security compromises, data loss, and attacks. As a result, companies are in the process of trying to figure out how to best strike this delicate balance between the benefits of mobility and its risks. This is dominating security conversations and strategy decisions.”[1]
Research from Zscaler indicates that less than 40 percent of mobile traffic originates from the browser; the majority originates from mobile applications. Mobile applications present considerable risk by accessing and communicating user location, device type, contact lists and calendars to third-party servers.
“The Internet used to be referred to as a wild west, now it seems that mobile application marketplaces have become an untrusted swap meet,” said Charles Kolodgy, research VP of Security Products, IDC. “Whether an organization adopts BYOD, corporate-owned devices or a hybrid strategy, it is clear that mobile devices are susceptible to a myriad of threats and vulnerabilities. Purpose-built solutions are required to address the unique requirements associated with mobile security."