{"id":20648,"date":"2022-11-18T10:30:05","date_gmt":"2022-11-18T18:30:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/11\/18\/news-14381\/"},"modified":"2022-11-18T10:30:05","modified_gmt":"2022-11-18T18:30:05","slug":"news-14381","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/11\/18\/news-14381\/","title":{"rendered":"The future of security: smarter devices that protect themselves"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2022\/11\/shutterstock_2205269319-100934304-small.jpg\"\/><\/p>\n<p>Jamf officially\u00a0completed its <a href=\"https:\/\/www.computerworld.com\/article\/3674792\/jamf-buys-zecops-to-bring-world-class-security-to-apple-enterprise.html\">acquisition\u00a0of Zecops<\/a>\u00a0this week. <a href=\"https:\/\/www.jamf.com\/resources\/press-releases\/jamf-completes-acquisition-of-zecops\/\" rel=\"noopener nofollow\" target=\"_blank\">Why is this important<\/a> and what might it mean to enterprise mobile security? Potentially, a lot.<\/p>\n<p>To get an answer to the question, think about how security has evolved. as the proliferation of mobile devices has made traditional security protections even less effective than they used to be.<\/p>\n<p>Mobile devices\u00a0<a href=\"https:\/\/www.statista.com\/statistics\/277125\/share-of-website-traffic-coming-from-mobile-devices\/\" rel=\"nofollow noopener\" target=\"_blank\">now account\u00a0for 59% of global website traffic<\/a>. But almost half (45%) of companies surveyed in the most recent <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2022-msi-report.pdf\" rel=\"nofollow noopener\" target=\"_blank\">Verizon Mobile Security Index<\/a> say they have suffered a compromise involving a mobile device in the past 12 months.<\/p>\n<p>Company firewalls only protect those <em>inside<\/em> the wall, and retrospective malware checkers by nature don\u2019t detect an attack until it&#8217;s taken place.<\/p>\n<p>Traditional security models have now been replaced by the concept of endpoint security, in which security is applied on a device, user, location, and even application basis.\u00a0It&#8217;s this evolving understanding of security that contributes to today\u2019s security industry buzzwords, things like zero trust, multi-factor authentication, and password-free security \u2014 all are components of the new approach.<\/p>\n<p>Another tactic is the continued attempt to evolve security protection on the device itself, kind of like the Secure Enclave on Apple\u2019s products. But it involves even more: developing systems that are smart enough to recognize whether they have been attacked.<\/p>\n<p>But being able to deliver that kind of machine intelligence self-awareness requires access to a little information first, in the form of telemetry data.<\/p>\n<p>Jamf already has a security solution for Macs that shows this direction of travel, called <a href=\"https:\/\/www.jamf.com\/lp\/en-gb\/jamf-protect\/?attr=google_ads-brand-search-security&amp;gclid=Cj0KCQiA99ybBhD9ARIsALvZavURuWM7wKrRacTIci1VyS6FUEzmZuXS5xGwzt8O8riJ7l1HzqQ6Zn0aAmnCEALw_wcB\" rel=\"nofollow noopener\" target=\"_blank\">Jamf Protect<\/a>. It can detect threats, monitor compliance, and automatically respond to some security incidents. When it was introduced in 2019, it showed a <a href=\"https:\/\/www.applemust.com\/jamf-protect-shows-the-future-for-mac-security-and-everyone-should-use-it\/\" rel=\"nofollow noopener\" target=\"_blank\">future for security protection<\/a>. The ZecOps deal means the company now has technology it might be able to use to provide similar protection to iPhones and iPads, too.<\/p>\n<p>Delivering that level of security is complex and requires access to telemetry, which is the kind of information Zecops is very good at grabbing.\u00a0That explains why its security solutions are already used by governments, enterprises, and high-net-worth individuals to accelerate mobile security investigations. The solution is very good at taking data and identifying attacks and compromises at a deep scale.<\/p>\n<p>The idea is that if a breach has taken place, the software will spot it, which is invaluable to the protection of corporate data. However, the goal must be that eventually the device itself will recognize and protect itself against any visibly recognize attack, making systems even more secure.<\/p>\n<p>\u201cZecOps\u00a0is the only\u00a0available tool that provides the capability to extract, deliver, and analyze mobile device logs for signs of compromise or malicious activity,\u201d said one \u201cDepartment of State, a G7 government&#8221; customer, according to the company.<\/p>\n<p>The tool works by <a href=\"https:\/\/blog.zecops.com\/research\/how-ios-malware-can-spy-on-users-silently\/\" rel=\"nofollow noopener\" target=\"_blank\">capturing and analyzing\u00a0logs from both iOS and Android devices<\/a>\u00a0at the operating system layer. It explores this telemetric data to identify suspicious events and has been designed to catch hidden zero- and one-click attacks. It will identify whether a device is attacked, how and when that attack took place, what impact it has, and then help inform effective incident response.<\/p>\n<p>It\u2019s a threat hunter for iPhones.<\/p>\n<p>It&#8217;s important also to consider the kind of threats this solution may be able to fend off. This isn\u2019t just a virus checker. It is smart and capable enough to identify some of the state-sponsored threats Apple built Lockdown Mode to protect devices against. The acquisition essentially gives Jamf a technology sufficiently robust to protect against espionage.<\/p>\n<p>And at a <a href=\"https:\/\/www.computerworld.com\/article\/3680548\/why-macs-and-iphones-should-avoid-installing-orphan-apps.html\">deeply paranoid time in our global history<\/a>, this level of protection is the degree of security every iPhone user requires.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow noopener\" target=\"_blank\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple Discussions<\/a>\u00a0groups on MeWe.\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3680728\/the-future-of-security-smarter-devices-that-protect-themselves.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2022\/11\/shutterstock_2205269319-100934304-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Jamf officially\u00a0completed its <a href=\"https:\/\/www.computerworld.com\/article\/3674792\/jamf-buys-zecops-to-bring-world-class-security-to-apple-enterprise.html\">acquisition\u00a0of Zecops<\/a>\u00a0this week. <a href=\"https:\/\/www.jamf.com\/resources\/press-releases\/jamf-completes-acquisition-of-zecops\/\" rel=\"noopener nofollow\" target=\"_blank\">Why is this important<\/a> and what might it mean to enterprise mobile security? Potentially, a lot.<\/p>\n<h2><strong>Security beyond the perimiter<\/strong><\/h2>\n<p>To get an answer to the question, think about how security has evolved. as the proliferation of mobile devices has made traditional security protections even less effective than they used to be.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3680728\/the-future-of-security-smarter-devices-that-protect-themselves.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,10480,10554,714,24580],"class_list":["post-20648","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-ios","tag-mobile","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20648"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20648\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20648"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}