Mobile Threat Defense for Business

Most organizations now promote the use of smart devices in the workplace, either by provisioning corporate devices or Bring Your Own Device (BYOD) programs. As sensitive data is accessed through mobile devices, your organization’s security policies must evolve in step.

Samoby gives you a clear view of mobile threats through constant device auditing and automatic mitigation actions. All these features are delivered through a platform that easily integrates into your existing security and service management solutions.


Network threats


Your mobile workforce may spend the majority of its time working outside of secured networks. This potentially exposes data to unsecured or even fake wifi hotspots and carrier base stations. By analyzing network connections and traffic, we can effectively detect:
  • Unsecured connections.
  • Man-in-the-middle (MitM) attacks.
  • ARP Spoofing.
  • Certificate Pinning.
  • Security protocol downgrades.
  • Suspicious remote servers.

Apps threats


Apps are the predominant way sensitive data is accessed on mobile devices, with risks spanning across all phone models. Samoby can give you visibility into app-based risks such as:
  • Apps downloaded outside of official app stores.
  • Trojans, keyloggers, ransomware and other known malware.
  • Apps versions with known vulnerabilities.
  • Apps with suspicious behaviour, such as access to SMS or remote servers.

Device threats


If the device is compromised by software vulnerabilities, the built-in security of the operating system can be bypassed. Samoby can identify anomalies and risks, such as:
  • Risky device configurations.
  • Root/jailbreak.
  • Debugging mode devices.
  • Out-of-date operating systems.
  • Security breaches.