Proofpoint Mobile Defense Description

The threat of malicious Wi-Fi hotspots is increasing, as are the millions of apps that employees have installed on their devices. These apps may contain malware or "riskware", which are apps that do not appear malicious, but display behavior that puts enterprise data in danger. Businesses are facing growing threats from malicious WiFi hotspots, and millions of apps installed on employee-owned mobile devices. These apps may contain malware or "riskware", which are apps that do not appear malicious, but display behavior that puts enterprise data in danger. These threats expose enterprise users' data leakage, credential stealing, and the exfiltration private information which can be used in advanced attacks to target specific employees. Enterprise users access Wi-Fi hotspots casually and grant these riskware apps broad permissions. They don't realize that their corporate and personal data can be sent to remote servers or advertising networks around the world.

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Proofpoint
Year Founded:
2002
Headquarters:
United States
Website:
www.proofpoint.com/us/resources/datasheets/mobile-defense

Media

Proofpoint Mobile Defense Screenshot 1
Recommended Products
Secure remote access solution to your private network, in the cloud or on-prem. Icon
Secure remote access solution to your private network, in the cloud or on-prem.

Deliver secure remote access with OpenVPN.

OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
Get started — no credit card required.

Product Details

Platforms
SaaS
iPhone
iPad
Android

Proofpoint Mobile Defense Features and Options

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Proofpoint Mobile Defense Lists

Proofpoint Mobile Defense User Reviews

Write a Review
  • Previous
  • Next