Due to the pandemic, distancing traders is no longer a contingency plan: it is the new normal.

Therefore the use of mobile devices can no longer be completely banned as before, and it is necessary to set up a close supervision of these means of communication.

• MIFID II regulations require that all communications associated with a deal must be recorded, whether they be voice, written, electronic, and whatever the channels used: this therefore includes the use of cell phones.

• It is also necessary to ensure that employees located at home do not use uncontrolled means of communication, and to ensure the confidentiality of communications, for example:

  • Instant messaging apps like whatsapp, also allow making audio or video calls that must be recorded or blocked
  • Wifi connections and public operator must be protected against eavesdropping
  • Leaks of large volumes of data through unsupervised corporate or private apps must be detected.

Samoby can help you enforce compliance to MIFID rules to your mobile devices.

For instance, Samoby allows you to locally on each device detect and block if necessary, voice or video calls made from messaging apps like whatsapp. And for each of these calls, samoby can retrieve additional information such as the WiFi access point used and where the user was at that time.

Samoby collects comprehensive information on mobile user behavior and potential and actual threats to security or privacy.

More than 120 data points are collected and analyzed in real time, such as:

  • All Internet traffic, including detailed system and application connections to remote servers
  • Detailed history of the use of each application
  • Location history
  • Phone configuration changes
  • Connection of external components such as USB cables, SIM cards, or SD cards
  • Establishment of WiFi connection or to the public network

Samoby can then use the gathered information to detect external or internal threats:

  • Internet and operator connection eavesdropping
  • Phishing attempts
  • Malware and spyware detection
  • Leaky apps sending private information to the cloud

This website uses cookies. By continuing to browse the site your are agreeing to our use of cookies. Review our cookies information for more details