Zimperium Reviews & Pricing
by Zimperium | Founded 2010, Dallas, TX
Categories:
What is Zimperium?
Zimperium provides mobile security protection for devices, networks and applications against malicious attacks. It enables secure access to sensitive data and mission-critical systems and helps build risk-free mobile apps. It offers centralized threat visibility so users can contain breaches and remediate efficiently to ensure smooth operations, protect brand reputation and avoid costly incidents.
Businesses can leverage machine learning to safeguard Android, iOS and Chromebooks. Its offerings include device security, advanced app analysis, citizen safety, application shielding and security testing, runtime self-protection and cryptographic key protection.
PRICE
$
$
$
$
$
COMPANY SIZE
DEPLOYMENT
PLATFORM
Try Before You Buy.
Request a Free Demo Today!
Request Demo
It's completely free!
Product Screenshots and Videos
Zimperium Benefits and Insights
Why use Zimperium?
Key differentiators & advantages of Zimperium
- Protect Intellectual Property: Protect applications throughout their lifecycle by detecting cyberattacks even without an internet connection. Prevent intellectual property theft to protect brand reputation and avoid sensitive data exposure, disruptions due to sabotage and compliance violations.
- Safe Remote Education: Centralized visibility into attacks safeguards Chromebook users against phishing sites, malicious internet signals, privacy violations and camera hacking.
- Secure Weak Targets: Ensure safe financial transactions and services by detecting and remediating network-based attacks, unauthorized app installs, phishing and OS vulnerabilities. Contain breaches offline using the z9 engine.
- Ensure Compliance: Meet continuous diagnostics and mitigation compliance to achieve robust defense positioning, enhance visibility, manage mobile assets and attest critical devices to support incident response and monitoring.
- Secure Data and Privacy: Healthcare services can prevent data loss or downtime. Identify malicious attacks by analyzing mobile behavior. Remediate threats locally to protect privacy.
- Avert Insurance Fraud: Protect private data of insurance agents and service teams, including claims photos, geolocations, customer identity, communications and financial data.
- Secure Pharma Teams: Protect corporate and laboratory networks. Regulate security management and improve productivity outside office hours without compromising device security.
- Ensure Safe Transactions: Avoid losses due to showrooming and protect vulnerable touch points across the enterprise. Quickly block payment frauds using the zDefend feature.
- Comprehensive Security: Get real-time threat detection defense without impacting performance. Alerts via API help prioritize actions. Shut down suspicious sessions, activate read-only mode, remove cache and force password reset to protect payment data.
Industry Expertise
Serves automotive, education, financial services, government, healthcare, insurance, legal, pharmaceutical and retail industries
Key Features
- zIPS Mobile Security: Use the z9 engine to detect app, network and phishing attacks. Offers advanced defense solutions to protect corporate-owned and BYOD devices.
- Machine learning detects advanced threats and protects user data with a privacy-first approach. The ML engine uses data points to analyze security breaches.
- Provides access to critical mobile risk data to support zero trust architecture. Integrate threat forensics and risk intelligence data with multiple security management systems.
- z3A App Analysis: Monitors and evaluates new mobile applications.
- Provides detailed analysis of app privacy and risk. Collects malware and manipulation data to identify breaches. Enables users to view the app code and behavior, and domains, certificates and network communications.
- The zConsole feature generates security and privacy reports to facilitate appropriate actions.
- Create customized and granular app policies.
- zSecure Resident Protection: Offers ML-based on-device threat detection capabilities.
- Protects against phishing, malicious and risky apps, vulnerable software, unsafe settings and device compromise.
- Provides contextual alerts and useful recommendations to deploy efficient security practices.
- zShield Application Shielding: Safeguards source code, data and intellectual property to prevent obfuscation and tampering.
- Implement code hardening techniques to prevent reverse engineering.
- Provides live reports on hacking attempts and offers comprehensive forensics.
- Integrates into the build process without altering the source code. Offers plugins for the build tools and development environments.
- zScan Application Security Testing: Scans for privacy, security and compliance risks before application launch. Document risks, add apps from the build pipeline or upload manually and create custom policies to ensure opening of only applicable findings. Auto-create tickets to help developers address risks. Analyze risk trends using the Build Compare capability.
- zDefend Runtime App Self-Protection: Integrates the z9 engine into mobile applications. Embeds as an SDK inside apps for complete security adoption and requires negligible permissions.
- Mobile apps can determine network breaches. Create a VPN to deter man-in-the-middle (MITM) attacks and freeze access to infected apps. Trigger policies during device jailbreak to find additional risks.
- Advanced Threat Insights: Analyze mobile forensics and change them into actionable insights for risk management. Provides detailed assessment, recommendations, threat trends, access to additional tools and more.
- zKeyBox Cryptographic Key Protector: Protects keys and private data in breached devices using the white-box cryptography feature. Supports custom PCI-DSS specifications to meet compliance regulations. Integrates easily, regularly undergoes penetration tests and operates without dedicated security hardware.
- Mobile Threat Defense: Achieve scalable security against advanced threats. Build efficient threat defense capabilities with a mobile threat defense maturity model.
Limitations
At the time of this review, these are the limitations according to user feedback:
- Gives a high false-positive rate for network threats.
- The user interface is clunky.
Suite Support
mail_outlineEmail: [email protected].
phonePhone: (844) 601-6760.
schoolTraining: Not available.
local_offerTickets: Not available.