Symmetrium Supports Deployment Across 5G Networks

Read more

How To Optimize Microsoft intune Using Symmetrium to Boost Security and Lower Costs

In today’s dynamic mobile cybersecurity landscape, where new threats are constantly and rapidly evolving, CISOs and security teams need to continuously focus on how best to fortify their defenses.

Organizations with existing Microsoft 365 and Azure subscriptions, often turn to Microsoft Intune to secure and manage all company-issued devices, as well as personal devices accessing work data through BYOD (Bring Your Own Device) programs. 

Intune enables Microsoft users to manage devices (phones, laptops, etc.) alongside other Microsoft services. Since Intune works within the Microsoft ecosystem, it can align well with an organization’s existing technology stack.

 

Managing The Cost and Complexity of Intune

While Intune offers several benefits such as device management, application management, and security policy enforcement, there are also some downsides to consider.

Cost: While Intune is part of Microsoft 365, it can be relatively expensive. The cost becomes more pronounced when scaling up the levels of protection.

Security: It is important to note that Intune provides the management layer, but implementing a defense layer requires an additional Mobile Threat Detection (MTD) solution. Microsoft’s MS Defender can fulfill this role but requires an additional payment on top of the cost of Intune.

Complexity in Setup and Management: The initial setup can be complex, while configuring conditional access, compliance settings, and application management requires a deep understanding of the platform. Intune also requires a separate setup for Android and iOS.

Limited Support for Non-Windows Devices: Although Intune supports iOS, Android, and macOS devices, its features are most comprehensive for Windows devices.

Dependency on Internet Connectivity: Being a cloud-based service, Intune requires consistent internet connectivity for management and policy enforcement.

While Microsoft Intune is a powerful tool for managing devices and protecting corporate data, it’s important for organizations to consider these potential downsides. Careful planning, clear policies, and ongoing management are key to mitigating these issues and making the most out of Intune.

 

Using Symmetrium with Intune Provides the Optimal, Cost-Effective and Efficient Mobile Security Solution

If you are considering using or currently have a subscription to Intune, to gain the full suite of security benefits you will need to pay extra money to get the full suite of protection. There’s another additional cost if you want to add Microsoft Defence. You’ll also pay extra to manage and secure WiFi connectivity. With Symmetrium you get the full capability from the get-go in one solution. You will never have to decide to add extra features and absorb the resulting additional costs.

Implementing mobile security can be daunting, resource intensive and costly. Symmetrium’s streamlined approach allows for the cost effective and efficient management of multiple devices, regardless of their brand or operating systems, from within Intune.

 

How Symmetium Optimizes Microsoft Intune

Enterprises using Intune don’t want the headache of managing additional tools and solutions. But by implementing Symmetrium they can quickly optimize the usage of Intune by treating Symmetrium just like any device in their Intune system. This means they can manage Symmetrium from within Intune to:

1) Maximize Security

Using Symmetrium in addition to Intune, instantly provides extra layers of security:

a. Web Protection — Symmetrium resides on a server within the organization network, which means organizations can uphold existing enterprise security protocols while effectively safeguarding data and resources. This enables security teams to manage the network from the server side, with no need for special tools to manage on the client/device side.

b. Malware Protection — With no data residing on mobile devices, there is no need to manage and protect the physical device.

c. Jailbreak Detection — Symmetrium can detect, analyze and block a jailbroken device before it makes a connection.

d. Network Protection — Symmetrium’s Virtual Mobile Devices (VMDs), which reside in the protection of the corporate IT infrastructure, uses the server network. The connection between the Symmetrium app and server is P2P encrypted.

e. Conditional Access — Symmetrium can easily be configured to provide conditional access. Any devices that try to connect that do not have access privileges will be instantly detected and blocked before they can make a connection. Symmetrium also provides extra conditional access, such as geolocation, device OS, and state.

2) Lower Costs

When using Symmetrium, organizations do not need a mobile threat defense (MTD) vendor, such as Microsoft Defender. This has several benefits.

– They don’t have to pay extra for security.

– MTD apps monitor threats by checking OS versions, system parameters, firmware, and device configurations. Symmetrium, however, stores all data in the cloud not on individual devices. This means it is not affected by threats at the device level.

– When an MTD detects an infected device that is integrated with Intune, the conditional access blocks email and managed apps, which affects the workflow. This scenario does not impact the usage of Symmetrium, because, unlike standard MDM and MTD solutions, the device itself holds no organizational data. So even if the device is infected with malware, the user can continue to work, because the data it accesses via Symmetrium will not be put at risk. In addition, Symmetrium validates if the hardware is jailbroken, rooted, using a custom ROM and can set the requirement for the minimum OS level.

3) Seamless Deployment and Management

Symmetrium allows Intune users to lower costs and improve security, all while using their existing settings and setup. This is because Symmetrium can be managed directly within Microsoft Intune. This means your IT team does not have to worry about using and configuring another management tool. They can use the same set of policies currently being used in Intune and simply treat Symmetrium as if they are managing a new device. It saves time and headaches as you already have a policy set up within Intune, so you can simply use it again.

They can use the same set of policies currently being used in Intune and simply treat Symmetrium as if they are managing a new device. It saves time and headaches as you already have a policy set up within Intune, so you can simply use it again.

Employee privacy is also strengthened using Symmetrium. If we compare standard devices managed by Intune, the user needs to install the agent, grant permission, install MTD, etc, directly on their device. With Symmetrium, the user only downloads the Symmetrium app to access the managed device.

Another important difference from Intune is that Symmetrium doesn’t need the client to be connected to update policy, apps, block access, etc. Whereas if you are using Intune you need an internet connection on the end-user device to get the update.

 

The Bottom Line: The Perfect Blend for Optimal Security, Cost Effectiveness and Seamless Management within InTune

To address the vulnerability of diverse endpoints and the inherent risk of exposing sensitive data outside the secure corporate network, Symmetrium’s unique approach transforms all mobile devices into secure virtual extensions of an organization’s network. And when blended with Microsoft Intune, it offers the optimal secure environment for the most cost-effective and resource-efficient solution for mobile security. So, when looking to balance the optimum solution in mobile security using Intune with the minimum TCO, Symmetrium provides the perfect match.

Discover how easy it is to lower the costs of your Intune mobile data protection while adding ease-of use to optimize your network security by booking a demo with Symmetrium here.

The Rise of AI-Powered Cyberattacks on Mobile Devices: A Growing Threat to Organizations

In today’s super connected hybrid workplaces, mobile devices have become indispensable tools. They enable employees to work remotely, access data, and communicate efficiently. However, with the increasing adoption of mobile technology comes a new frontier for cybercriminals: the exploitation of vulnerabilities using artificial intelligence (AI).

AI offers hackers a powerful arsenal of tools and techniques to launch sophisticated cyberattacks, including voice cloning. By harnessing the capabilities of AI by using ChatGPT, for example, hackers can conduct research into targets to improve scripts and help build social engineering techniques.

 

Exploiting The AI Advantage in Cyberattacks

AI-powered tools can automate the process of reconnaissance, identifying potential targets and gathering information about mobile devices and network infrastructure. This automation enables hackers to scale their attacks and target a large number of devices simultaneously, increasing their chances of success.

Traditional malware detection mechanisms rely on signature-based approaches to identify known threats. However, AI-powered malware can dynamically adapt and evolve to evade detection by learning from its environment and adjusting its behavior in real-time. This makes it challenging for organizations to detect and mitigate AI-driven malware attacks effectively.

AI algorithms can analyze vast amounts of data to personalize phishing attacks, making them more convincing and difficult to detect. By mimicking the writing style, voice and behavior of trusted contacts or organizations, AI-powered phishing attacks can trick employees into revealing sensitive information or clicking on malicious links, compromising the security of their mobile devices and the entire organization.

 

Why Traditional Security Solutions Are Vulnerable

The integration of AI techniques into cyberattacks poses significant challenges for organizations seeking to protect their mobile devices and data. Traditional boundary-based security methods are struggling to cope with the use of AI by hackers for several reasons:

1) Adaptability and Dynamism: AI-powered attacks are highly adaptable and dynamic, constantly evolving to evade detection and exploit vulnerabilities. Traditional boundary-based security methods rely on static rules and signatures to identify threats, making them ineffective against AI-driven attacks that can quickly change their tactics and behaviors.

2) Complexity and Sophistication: AI-powered attacks are often more complex and sophisticated than traditional cyber threats, making them harder to detect and mitigate using traditional security measures. Hackers can use AI to analyze vast amounts of data, identify vulnerabilities, and develop custom attack techniques tailored to specific targets, making it challenging for boundary-based security methods to keep pace.

3) Stealth and Evasion Techniques: AI-powered attacks can employ stealth and evasion techniques to bypass traditional security defenses. For example, AI-powered malware can dynamically alter its code to avoid detection by antivirus software, or AI-powered phishing attacks can mimic the behavior of legitimate users to evade detection by email security filters.

4) Scale and Automation: AI enables hackers to scale their attacks and automate various stages of the cyber kill chain, from reconnaissance to exploitation to exfiltration. Traditional boundary-based security methods may struggle to cope with the sheer scale and automation of AI-driven attacks, leading to gaps in security coverage and increased risk of successful breaches.

5) Limited Visibility and Context: Traditional boundary-based security methods typically provide limited visibility and context into network traffic and user behavior, making it difficult to detect subtle signs of AI-driven cyberattacks. Hackers can exploit these blind spots to launch stealthy attacks that go unnoticed by traditional security defenses until it’s too late.

 

Symmetrium: A Paradigm Shift in Mobile Security

The rise of AI-powered cyberattacks represents a watershed moment in cybersecurity, necessitating a fundamental rethink of traditional security approaches. To effectively defend against the evolving tactics of cybercriminals, organizations must adapt their security strategies.

Traditional security strategies often prioritize protecting devices and individuals, overlooking the critical aspect of safeguarding data. Symmetrium shifts the focus to data security while minimizing the need for extensive infrastructure changes. It achieves this by offering a device-agnostic, low-resource solution that seamlessly integrates with existing information and security technology infrastructures. Rather than overhauling systems, Symmetrium enhances data protection by introducing virtual mobile devices (VMDs) within the organization’s network perimeter.

These VMDs operate in tandem with established enterprise security protocols, allowing authorized remote and third-party users to securely access data using their own devices. Leveraging P2P encrypted streaming, Symmetrium’s VMDs enable users to view data without physically transferring it to external devices, ensuring that sensitive information remains within the secure organizational network.

By keeping data within the protected perimeter, Symmetrium significantly reduces the risk of data compromise or unauthorized access, providing organizations with peace of mind in an increasingly complex security landscape.

Schedule a demo today to experience the future of remote access security firsthand.

What Google Can Teach Organizations About Mobile Security and Malware’s Use as a Weapon of War

Targeting mobile phones with malicious software is now one of the tools of choice when it comes to waging war, according to a report released by Google. The research focuses on the conflicts in the Middle East and Ukraine, where the phones and tablets of civilians and military personnel are being targeted to disrupt communications, steal sensitive information, spread misinformation and potentially put lives at risk. This sinister use of malware is adding a new dimension to modern warfare, underlining the importance of the digital battlefield.

Google has been actively monitoring spikes in cyber threats and mobile malware to safeguard their users during these conflicts. This has revealed fresh insights into phishing campaigns, hack-and-leak operations, information warfare, disruptive attacks and other cyber activities to its Threat Analysis Group (TAG), Mandiant, and Trust & Safety teams.

A significant number of cyber attacks involve spyware campaigns that rely on malicious mobile apps, which are playing a substantial role in gathering intelligence by targeting data at rest on users’ devices, including messages, contacts, real-time location, and other sensitive data.

 

Anatomy of a Mobile Spyware Campaign

In its report, Google details the key elements of the spyware campaigns and their sequence being used in conflict zones and beyond:

1) Delivery to user: This is the first stage of the attack and its primary emphasis lies in persuading users to install malicious applications through SMS phishing or social engineering techniques employed on social media and messaging applications.

2) Installation: The spyware might disguise itself as a legitimate application, tricking the user into granting access to sensitive information, including SMS and location data.

3) Gather and steal information: Following installation, the spyware has the capability to collect various information about the device, including but not limited to location, contacts, SMS, and audio recordings.

4) Exfiltration of the data: The malicious application might store any data that comes to rest on that device or pilfered data in an encrypted file, transmit it to command and control infrastructure controlled by the attacker, and subsequently erase the file from the device.

Malicious apps can be hard to detect by users because they often cloak themselves in legitimacy, mimicking commonly used utilities like VPNs and messaging apps like Telegram. However, beneath the surface lurk standard backdoor features, designed to turn the user’s device into a surveillance tool.

Unlike Apple’s App Store, which is famously a ‘walled garden’ from which it controls all app distribution, Android users can download apps from Google Store and alternative third-party channels. This allows groups involved in conflicts to distribute Android spyware through apps not verified by Google, employing SMS phishing and social engineering tactics on social media and chat platforms to trick users into installing them.

 

Targeting the Weakest Link

Humans are often considered the weak link in mobile malware attacks due to their susceptibility to manipulation. Mobile malware attackers frequently exploit human vulnerabilities through tactics such as phishing, where users are tricked into clicking on malicious links or downloading harmful applications. Social engineering techniques, including deceptive messages and fraudulent websites, capitalize on human trust and curiosity.

Moreover, users may inadvertently grant unnecessary permissions to seemingly benign apps, allowing malicious software to access sensitive information. Lack of awareness, complacency, and a tendency to overlook security warnings contribute to the effectiveness of mobile malware attacks. Human behavior plays a pivotal role in the success of these attacks, making it crucial for individuals to stay informed, exercise caution, and adopt security best practices to mitigate the risks associated with mobile malware.

 

Lessons for Organizations

Mobile malware attacks during conflicts offer several harsh lessons for organizations:

Preying on urgency: These attacks exploit heightened emotions and the need for information during crises. Malicious actors disguise malware as legitimate apps, like fake air raid sirens or news sources, to trick users into downloading them. Organizations should remind staff to be cautious of unexpected app downloads, especially during volatile times.

Targeting vulnerabilities: Conflict zones often have limited access to reliable internet and software updates. This creates a breeding ground for malware targeting outdated operating systems with known vulnerabilities. Organizations should prioritize keeping software updated on all devices and enforce strong password policies.

Importance of a ‘walled garden’ approach: Organizations should implement a ‘walled garden’ approach to ensure a secure environment that controls employees’ access to apps. Such a policy enhances security by only allowing the downloading of approved apps from verified sources.

Evolving tactics: Cybercriminals are constantly adapting their methods. For instance, malware might steal user data for espionage or disrupt critical infrastructure. Organizations should have up-to-date security solutions and conduct regular training for employees on cybersecurity best practices.

Importance of backups: Malware attacks can render devices unusable or erase critical data. Organizations should have robust backup and recovery plans in place to minimize disruption and data loss.

Global threats: These attacks highlight the borderless nature of cyberwarfare. An attack targeting one region can have ripple effects worldwide. Organizations should be prepared for potential spillover and have incident response plans in place.

Data at Rest is Data that is Vulnerable: Once attackers have infiltrated a phone they have complete access to the data that comes to rest on that device. Thus the data is no longer in the secure confines of the corporate network environment and is exposed and vulnerable on the device it is now residing on. Symmetrium negates this vulnerability by ensuring no data comes to rest on devices outside of the security of the corporate network.

 

Mobile Security — A New Battlefield Challenge

The digital realm is now an undeniable battleground, with the tentacles of malware created during conflicts stretching far beyond war zones to potentially impact organizations. This should be of major concern as most businesses have a fundamental flaw in their mobile security strategy and are vulnerable because they place an emphasis on users and devices rather than on data.

Symmetrium uses a walled-garden approach by transforming any mobile device, whether managed or unmanaged, into a virtual extension of the organization’s network, incorporating all compliance, security, and IT protocols. Once users enter this secure mobile workspace they only have access to approved apps, and any data accessed never comes to rest on their device. Symmetrium also protects against SMS phishing (Smishing), by scanning every message and integrating with existing email security tools before delivery to end users.

Businesses operating in the health services, finance, telecom and utilities sectors should be most aware of the dangers of mobile malware and potential flaws in their mobile security due to the valuable data they hold and their strategic importance.

For cybercriminals, a successful attack on any of these sectors can lead to financial gain through identity theft, extortion, or the disruption of critical services. The organizations attacked will also face large fines for regulatory violations due to any lapse in the security of the sensitive data they hold. This is why, as we navigate periods of global uncertainty, the lessons learned here by governments and corporations operating in highly regulated environments hold immense value.

Read more about the use of malware in conflicts in Google’s latest report.

The Complete Zero-Trust Mobile Security Manual for CISOs

The surge of remote and hybrid work has skyrocketed mobile device usage in businesses. While offering flexibility, they create a vast attack surface for cyber threats. Blending personal and work devices further exposes sensitive data to risks like unsecured networks, malware, and lost/stolen devices. Enforcing consistent security across various locations and devices adds another layer of complexity.

 

Zero Trust: The New Security Paradigm

Traditional perimeter-based security, with its “trust but verify” approach, is struggling in today’s interconnected world. Zero trust represents a fundamental shift in enterprise security where no user, device, or network component is inherently trusted. It assumes a breach is imminent or ongoing, emphasizing continuous verification and strict access controls, both inside and outside the network.

 

Implementing Zero-Trust Mobile Security

Zero trust has to be proactive, especially with the rise of remote workers and third-party contractors. Here are key best practices:

1. Continuous Authentication & Authorization: Use multi-factor authentication (MFA) and adaptive access controls to verify user identity, device health, and context before granting access.

2. Network Segmentation & Micro-Perimeters: Divide the network into isolated segments for different users/devices, limiting lateral movement and minimizing breach impact.

3. Data-Centric Security: Encrypt data at rest and in transit. Use data loss prevention (DLP) to control sensitive data movement.

4. Behavioral Analytics & Monitoring: Detect anomalies and suspicious activities on devices. Track device behavior, network traffic, and user interactions for real-time threat detection.

5. Endpoint Protection & Mobile Device Management (MDM): Implement robust endpoint protection and leverage MDM for granular device control, remote wipe capabilities, and policy enforcement.

6. Employee Training & Awareness: Educate employees on security best practices, recognizing phishing attempts, and reporting suspicious activities. Foster a culture of security awareness.

7. Regular Audits & Assessments: Identify vulnerabilities, evaluate security controls, and ensure compliance with industry standards.

8. Integration & Automation: Integrate various security tools for a unified ecosystem. Automate processes to streamline security, enhance response times, and reduce human error.

9. Adaptability & Evolution: Continuously improve and adapt to evolving threats. Stay informed about emerging technologies, threats, and best practices to refine your mobile security strategy.

 

Challenges & Considerations

Despite its promise of increased protection and resilience against cyber threats, establishing a zero-trust mobile environment presents numerous challenges and considerations that organizations must carefully navigate, such as:

1. Balancing User Experience vs. Security: Finding the right balance between stringent security and a seamless user experience is crucial.

2. Device Diversity & BYOD Policies: Managing diverse devices, operating systems, and security configurations under BYOD policies adds complexity.

3. Integration & Interoperability: Integrating various security solutions and ensuring seamless interoperability requires meticulous planning and execution.

4. Third-Party Integration & Supply Chain Security: Extending zero trust to third-party integrations and supply chain partners presents additional considerations.

5. Regulatory Compliance & Legal Implications: Adhering to regulations while implementing zero trust is crucial.

6. Cultural Shift & User Awareness: Educating employees about the “never trust, always verify” principle is essential. Resistance to change and lack of awareness can impede adoption.

7. Resource & Expertise Constraints: Deploying and managing zero-trust architectures requires specialized skills and resources.

8. Complexity in Monitoring & Analysis: Managing and analyzing vast amounts of data generated by mobile devices can be complex.

9. Scalability & Adaptability: Ensuring scalability and adaptability to accommodate organizational growth and evolving threat landscapes is vital.

 

Addressing the Challenges: A Different Approach

Implementing and managing zero-trust environments can be daunting. While most solutions focus on securing the devices, this exposes data when it moves outside the secure network to reside on the mobile devices accessing it.

To address the vulnerability of diverse endpoints and the inherent risk of exposing sensitive data outside the secure corporate network, Symmetrium created an innovative zero-trust data mobile access solution. This unique approach transforms all mobile devices into secure virtual extensions of an organization’s network, prioritizing compliance, security, and IT protocols.

Symmetrium achieves this by creating virtual mobile devices (VMDs) that remain within the organization’s network perimeter. Through peer-to-peer encrypted streaming, authorized users can securely access and view data without the need to transfer it to external devices. This ‘no data at rest’ methodology significantly reduces the risk of data breaches.

Offering a seamless transition to a secure zero-trust environment, Symmetrium’s solution eliminates the need for a complete technology overhaul. By adopting VMDs, organizations can uphold existing enterprise security protocols while effectively safeguarding data and resources. In a dynamic landscape where data and employees extend beyond traditional perimeters, Symmetrium’s VMDs embody the essence of a zero-trust approach — ensuring robust data security without compromising productivity.

Are you ready to reevaluate your approach to zero-trust mobile security? Experience the power of Symmetrium firsthand by scheduling a demo today.

2023: The Year of Mobile Data Protection

The full-time return to office work has been declared dead. While this most likely has pleased most employees, Chief Security Officers (CSOs) and their teams will be less than ecstatic. They know remote working increases the possibility of security attacks and data breaches. And with the growing use of mobile expanding their attack surface, they are finding out firsthand that current solutions, relying on VPNs and user IDs, for example, are simply not enough. 

The resulting data breaches and attacks can be costly and damaging to organizations, exposing them to reputational damage and significant fines. Over 2023, the healthcare and financial sectors both paid a heavy price for data breaches. In fact, according to research by Proxyrack, the average cost of a data breach incident in healthcare is estimated at $9.23 million — the highest of any industry surveyed. The financial sector comes in second, with an average cost of $5.27 million.

Industries subject to rigorous regulation, like healthcare and finance, are encountering growing challenges with staff’s usage of applications, such as WhatsApp and Slack, for file sharing. This practice can violate stringent regulations pertaining to data confidentiality and security.

To tackle these growing concerns surrounding mobile data security, Symmetrium focused on upgrading its offering during 2023 to directly address and provide a solution to the security flaws CSOs were encountering.

Here are the standout highlights:

An Instant Messaging (IM) and SMS Data Protection Solution

With messaging apps now commonplace in the work environment, Symmetrium released its  unique IM and SMS suite. This innovation empowers organizations to promptly counter these security risks by implementing Virtual Mobile Devices (VDMs) within their network. 

Symmetrium’s VDMs offer users dedicated work mobile numbers, serving as unique identifiers, all without requiring separate physical devices. This shields employees against SMS phishing (Smishing), actively preventing fraudulent activities and malicious links by meticulously scanning every message. It seamlessly integrates with existing email security tools to ensure secure message delivery to end users. 

The solution also addresses compliance concerns by efficiently capturing and storing all work-related messages, establishing an agentless IM and SMS archive. This capability enables organizations to consistently meet the stringent regulatory data requirements imposed on their specific sector.

Creating a True Zero-Trust Solution to Reduce Attack-Surface Area

To limit the amount of touch points to public networks, Symmetrium delivered a cutting-edge zero-trust data mobile access solution. This facilitates productive collaboration while significantly reducing the attack-surface area and the chances of data breaches. 

To maintain a secure and private zero-trust environment for data, while minimizing external touch points to the internet, Symmetrium uses its groundbreaking VMDs. These reside within the organization’s network, so when accessed by employees remotely via their mobile phones or laptops, they serve as extensions of the company’s comprehensive security and compliance policies. 

By leveraging end-to-end encrypted streaming, these VMDs ensure a seamless, completely native mobile experience with effortless deployment and management. Sensitive data is accessed virtually and therefore at no time sits on the user’s actual device. The result is a true zero-trust environment, a radically reduced attack surface to ensure that data remains secure and is never put at risk.

Upgrading to Support 5G Networks to Deliver Security and Speed

During 2023, Symmetirum upgraded its streaming technology to support 5G networks. This uses AWS Wavelength Zones to enable organizations deploying Symmetrium’s high-performance Virtual Mobile Devices to benefit from a near real-time experience.

AWS Wavelength integrates the high bandwidth and ultralow latency capabilities of 5G networks with AWS compute and storage services. So, rather than using the public internet, AWS Wavelength Zones enable users to have a telco-grade connection between the cloud and the telco, and between the device and the telco. This shortens the overall time point-to-point, providing a super fast native experience for Symmetrium’s users.

Revolutionizing Zero-Trust Capabilities for Mobile Devices

In the quest for zero trust, Symmetrium’s provision of Virtual Mobile Devices functioning within the organization’s network perimeter, coupled with P2P encrypted streaming, guarantees data security without storing data on external devices. This innovative approach negates the necessity for extensive technological overhauls, enabling seamless integration of Symmetrium into existing infrastructure.

In 2024 Symmetrium will continue to empower organizations to confidently confront zero-trust challenges, facilitating a secure digital transformation. Organizations implementing Symmetrium will shield their data from both established and emerging security threats, including spyware, thereby enabling them to maintain a competitive edge in today’s dynamic landscape.

Safeguard your workspaces by establishing a genuine zero-trust environment for your mobile devices. Schedule a demo with Symmetrium today.

Symmetrium’s Launches Instant Messaging (IM) and SMS Data Protection Solution to Eliminate Corporate Security and Compliance Risks

TEL AVIV Israel, November 8, 2023 — Symmetrium, the zero-trust, mobile data governance, and security platform designed to turn any mobile device into a virtual extension of the enterprise, inheriting all its compliance, security and IT protocols, has unveiled its Instant messaging (IM) and SMS data protection solution, which eliminates the corporate security and compliance risks associated with IM usage by employees.

With messaging apps now part of daily life in many workplaces, Hackers can exploit their vulnerabilities and use phishing texts to infiltrate data systems, increasing the risk of ransomware and other cyberattacks.

By integrating with existing email security tools Symmetrium’s new IM and SMS solution enables organizations to instantly protect against these security threats by deploying virtual mobile devices within the organization’s network that provide users with dedicated work mobile numbers (which act as unique identifiers) without the need for dedicated devices. This ensures protection against SMS phishing (Smishing), preventing fraud and fraudulent links by scanning every message and integrating with existing email security tools before delivery to end users.

Symmetrium also mitigates compliance risks by capturing and storing all work-related messaging, instantly creating an agentless IM and SMS archive. This allows organizations to constantly meet regulatory data requirements imposed on their sector.

“The rapid rise of corporate IM and SMS usage has made it far more challenging for businesses to ensure corporate IT security and preserve electronic communications for regulatory purposes,” says Omer Cohen, founder and CEO of Symmetrium. “We solve these two challenges by delivering a native mobile experience for end users while allowing organizations to deploy a minimal resource allocation solution, which eliminates the need for costly device management solutions.”

When Symmetrium’s VMDs are accessed by employees using their mobile phones, they act as extensions of all organizational security and compliance policies using end-to-end encrypted streaming. The result is a completely secure but native mobile experience with seamless deployment and management.

 

About Symmetrium

Symmetrium is a zero-trust, mobile data governance and security platform designed to turn any mobile device into a virtual extension of the enterprise, inheriting all its compliance, security and IT protocols. Symmetrium keeps no data at risk by allowing no data at rest, all while delivering users a completely native mobile access solution that can be quickly and easily deployed.

 

Media Contact

Roni Dagan
roni@symmetrium.io

 

How a Defence Agency Deployed Symmetrium to Secure its Reserve Units’ Members Access to Sensitive Data

The rollout of Symmetrium ensures the highly confidential data reserve members access remotely never leaves the security of the agency’s network and therefore never resides on external devices. 

Allowing access to confidential information to empower collaboration and data sharing forced a major rethink by a defense agency in Israel. This was not a problem for its full-time staff, who were only authorized to view this data securely from within the organizational IT network through approved and authorized devices. The big concern was how it could guarantee the same levels of security when giving access to its reserve members, which numbered in the tens of thousands and used their own private devices. 

These reserves are in essence third-party contractors that routinely require access to confidential data and systems within the defense agency’s IT network. Third-party vendors are known as the weakest link in enterprise security, and these reserve members were identified as a significant vulnerability. 

 

Vulnerability Due to Use of Non-Secure Instant Messaging Apps 

While most of the agency’s communication is already digital, access to confidential data for reserves was restricted to physical access. This is because it had no solution to maintain its security posture when dealing with reserve members accessing network data using their own devices. Each reserve member is a private individual who from time to time is called to be a part of the agency’s activities. They have their own private device and these are often managed by their employer. Supplying each reservist with a secure and approved device was not practical from a logistical perspective.

The result was that reserve commanders were communicating with their peers  and soldiers over open instant messaging apps without taking into account the confidentiality and security requirements of the defense agency. 

A solution was required that allowed the defense agency to seamlessly manage third-party access in a Bring Your Own Device environment allowing reservists to:

  • Access a secured data sharing system 
  • Seamlessly comply with all confidential data requirements
  • Collaborate in a zero-trust digital environment
  • Create a total separation between their virtual workspace and their personal device

 

Creating a Minimum-Resources Mobile Management Environment 

Symmetrium was the ideal solution as it does not rely on the user profile, device, network or hardware to make sure that the confidentiality of military data is maintained in line with national security requirements.

It sits protected within the perimeter of an organization’s network, adhering to all existing enterprise network security protocols. It can be fully on-prem or in the cloud — the organization decides where. The Symmetrium server is managed from here via a control panel that creates virtual mobile devices (VMDs) as needed. 

These VMDs are hosted on a second Symmetrium server, again deployed inside the organization’s network, which uses P2P encrypted streaming to allow authorized external devices to view data via a portal. This view-only data never leaves the protected organizational network and therefore is never transferred to an external device. This ensures the data at all times remains secure. This helps to reduce and minimize the attack surface, because the assets are not publicly accessible over the internet. 

 

A Fast, Secure Solution for Data Access for Reserve Units 

The defense agency has begun the rollout with high ranking reserve soldiers in one platoon with the setup of 100 VMDs, which will quickly grow up to 10,000 devices as the project expands. It took just three days to set up the entire infrastructure within the agency’s IT network to allow the data to be shared through one portal, with all access managed through the Symmetrium app.

The defense agency’s IT team is now able to create a single virtual device in less than five minutes without any support from the Symmetrium team. This includes assigning it to reserve unit members during their specific service period.

Reservists use a username and password to access the virtual device via a secure portal using their personal phone. While at present they have their two-factor authentication if needed in the future they could also activate biometric authentication (using an eye scan) for an extra layer of authentication. 

If an authorized user (for example, one whose reserve duty has ended) tries to use his phone’s native browser and not using the Symmetrium app installed on their device to access the reserve portal, the data will not be visible. 

 

The Result: An Easy-to-Manage Zero-Trust Environment

The defense agency now benefits from the creation of an easy-to-manage zero-trust environment, which automatically adheres to all existing network security protocols, reducing the headache for its CIO and IT department, saving time, money and resources. 

If there are any violations, such as a reservist or adversary capturing the screen of data, an alert will pop up in the Symmetrium management console. This console also allows administrators to block or allow specific requests for specific users, and change the information they are approved to access. It can also limit access to specific locations or specific networks. This is achieved regardless of the hardware being used to access the data.

Symmetrium’s minimum-resources mobile management solution has very light operational requirements and allows for the quick onboarding and offboarding of reserve users with one single app. This allows productive collaboration with reserves when they are serving with the defense agency, while dramatically minimizing the risk of data breaches. 

Ultimately the complete roll out of Symmetrium will empower secure data sharing and collaboration among the agency’s tens of thousands of reservists.

Isn’t it time you reconsidered your approach to zero-trust data access? Book a demo with Symmetrium here.

close-tag

We’re proud to be the ones making TPRO, CISO, IT and vendors - happy

by ramping up zero-trust mobile access.