Let’s take a look at Jamp’s acquisition of ZekOps… ‘Self-protecting enterprise mobile security’

Apple device management specialist ‘Jamf’ acquired security company ‘Zecops’. Why is this acquisition important, and what does it mean for enterprise mobile security?
ⓒGetty Images Bank

Security Beyond Boundaries
To answer this question, consider how security has evolved since the proliferation of mobile devices has made existing security tools far less effective than they used to be. Mobile devices are now It accounts for 59% of website traffic worldwide. but the most recent Verizon Mobile Security IndexAccording to , nearly half (45%) of businesses said they had experienced a mobile device-related breach in the past 12 months.

Corporate firewalls only protect “inside the wall,” and retrospective malware scanners basically don’t detect an attack until it happens.

The traditional security model has now been replaced by the concept of endpoint security, which applies security on a device, user, location, and even application basis. Today’s buzzwords in the security industry—zero trust, MFA, passwordless security—are all components of the new approach.

Can a device protect itself?
Another tactic is to try to advance the security protections of the device itself, such as Apple’s Secure Enclave. For example, developing a system that is smart enough to recognize if it has been attacked. But to provide this machine intelligence self-awareness, you first need to be able to access information in the form of telemetry data.

Jamp already has a security solution for Mac called ‘Jamf Protect’. It can detect threats, monitor compliance, and automatically respond to some security incidents. When it launched in 2019, it showed the future of security protection. The subsequent acquisition of ZekOps means that Jamp now has the capability to offer similar protection to iPhones and iPads.

Providing this level of security is complex and requires telemetric access. This is something ZekOps is particularly good at. It can also be seen that many governments, corporations, and high net worth individuals use ZekOps security solutions to accelerate mobile security checks.

The notion that software detects a breach when it occurs is important to corporate data protection. The ultimate goal is for the device itself to recognize and protect against attacks, making the system much more secure. “ZekOps is the only tool that provides the ability to extract, forward and analyze mobile device logs for signs of compromise or malicious activity,” said the State Department of one of the G7 member states, which is a customer of ZekOps.

how it works
ZekOps security tools capture and analyze logs from iOS and Android devices at the operating system layer. Explore analyzed telemetry data to identify suspicious events and spot hidden zero/one-click attacks. It also determines if a device has been attacked, when and how the attack occurred, and what impact it had, and then informs an effective incident response.

It is also important to know what threats the solution can prevent. It’s not just a simple virus scan. It is smart and capable enough to identify state-backed threat attacks targeting the lockdown mode created to protect Apple devices. This acquisition gives Jamp a powerful technology to prevent espionage.
* Jonny Evans is a professional contributor who has written about Apple and technology since 1999.
[email protected]


Source: ITWorld Korea by www.itworld.co.kr.

*The article has been translated based on the content of ITWorld Korea by www.itworld.co.kr. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!