Mobile Threat Defense for Business

Most organizations now promote the use of smart devices in the workplace, either by provisioning corporate devices or Bring Your Own Device (BYOD) programs. As sensitive data is accessed through mobile devices, your organization’s security policies must evolve in step.

Samoby gives you a clear view of mobile threats through constant device auditing and automatic mitigation actions. All these features are delivered through a platform that easily integrates into your existing security and service management solutions.


Extend your security perimeter to mobile devices


Samoby integrates seamlessly into corporate cybersecurity applications like SIEM to make mobile devices a recognized component of the security perimeter.

Real time data points are gathered and can complete all the other source you are already using:
  • Smartphone’s outgoing and in coming IP connections
  • DNS requests
  • Network connections, APN, Access point details, ARP tables, etc.
  • App usage log
  • Volume of data by connections
  • And many others…

Network threats


Your mobile workforce may spend the majority of its time working outside of secured networks. This potentially exposes data to unsecured or even fake wifi hotspots and carrier base stations. By analyzing network connections and traffic, Samoby acts as a local firewall and effectively detects and blocks:
  • Unsecured connections.
  • Man-in-the-middle (MitM) attacks.
  • ARP Spoofing.
  • Certificate Pinning.
  • Security protocol downgrades.
  • Suspicious remote servers.

Apps threats


Apps are the predominant way sensitive data is accessed on mobile devices, with risks spanning across all phone models. Samoby can give you visibility into app-based risks such as:
  • Apps downloaded outside of official app stores.
  • Trojans, keyloggers, ransomware and other known malware.
  • Apps versions with known vulnerabilities.
  • Apps with suspicious behaviour, such as access to SMS or remote servers.

Device threats


If the device is compromised by software vulnerabilities, the built-in security of the operating system can be bypassed. Samoby can identify anomalies and risks, such as:
  • Risky device configurations.
  • Root/jailbreak.
  • Debugging mode devices.
  • Out-of-date operating systems.
  • Security breaches.