More and more employees use their mobiles as a work tool, to access their apps, work on corporate documents, exchange information with their clients, or participate in video conferences.

This trend has accelerated with the COVID-19 Pandemic, and has highlighted the need for the security perimeter to extend to include these devices.

However, the use of VPN does not solve everything, and increasingly mobile users continue to use channels or networks that are not controlled by the IT department, without any protection, and even worse, without the possibility of traceability or forensic analysis in case of a security breach.

Samoby allows you to easily detect security threats on your employees’ Android or iOS mobile devices, and analyze the behavior of apps and users themselves.

For example, you can analyze all internet traffic in your mobile fleet in real time, and view which devices and which applications have made connections to sensitive countries, or have used insecure security protocols, irrespective of which internet connection is being used to make that connection.

And even if your phones are not connected to the corporate network, or are not using the VPN, Samoby can automatically take actions to protect your employees,

• immediate blocking of any internet traffic flowing to/from a server from where an attack is taking place,

• blocking apps that exfiltrate data,

• Forcing the use of secure protocols, reducing the possibility of traffic hijack

• blocking the installation of known malicious applications.

• Or dynamic detection and then blocking of phishing attacks,

From the console, you can access a list of all public Wifi hotspots to which your employees are connecting, and then define a black list and a white list of where they can or cannot connect.

If you wish, Samoby can also integrate with the SIEM system of your Security Operations Centre, supplying all the IP connection logs, alerts, and other usage information to complement the existing data from your network infrastructure or workstations, thus extending the security perimeter completely to employees on the move.

This website uses cookies. By continuing to browse the site your are agreeing to our use of cookies. Review our cookies information for more details