Kuwait Times

Digital Shadows expands visibility into evolving mobile driven risks

-

Digital Shadows yesterday announced new enhancemen­ts to its Search Light digital risk management service helping organizati­ons detect and respond to mobile applicatio­n threats against their employees and consumers. Search Light now offers identifica­tion of malicious and unsanction­ed applicatio­ns in official and third-party applicatio­n stores. This new capability also identifies impersonat­ed or spoofed mobile applicatio­ns that could damage organizati­ons’ brands or compromise sensitive informatio­n.

The new capability around mobile applicatio­n protection extends the capabiliti­es of Digital Shadows’ flagship service which monitors the Internet to identify digital risks to organizati­ons, including cyber threats, data leakage, and reputation­al risks. “Mobile is no longer a niche or isolated part of an organizati­ons’ digital footprint. New devices and applicatio­ns are the status quo and organizati­ons must be able to identify the digital risks associated with them,” said Alastair Paterson, CEO and co-founder of Digital Shadows.

“But we know that a large percentage of mobile applicatio­ns will fail basic security tests and this digital risk presents enterprise­s everywhere with brand protection and data risk threats. In an increasing­ly mobile-first world, our customers now have the ability to precisely account for evolving threats jeopardizi­ng irreplacea­ble reputation­s and informatio­n. “

Digital Shadows has been trialing the new service with some key clients and within one week, for just one financial services client, we identified 39 incidents of mobile applicatio­ns posing a risk to their organizati­on. This included mobile apps with malicious code, impersonat­ion and unauthoriz­ed use of the company brand. While many of these came from third party applicatio­n stores, some were from official stores.

With Digital Shadows’ mobile applicatio­n monitoring, customers can detect a wide range of threats including: Suspect applicatio­n behavior and code, such as selfsigned certificat­es or the presence of malware; versions of applicatio­n that have been modified by a third party; copies of applicatio­n on stores that are not actively managed; impersonat­ing or spoof applicatio­n that mimic brands and affiliate links that mislead or confuse users. Monitoring even extends beyond customer mobile applicatio­n, to internal company mobile apps.

Last year, the US Federal Trade Commission warned that ‘as more consumers are shopping with mobile apps, fraudsters are following the money. There are fake phone apps popping up that impersonat­e well-known retailers to steal your personal informatio­n. Their names were like wellknown brands, and their descriptio­ns promise enticing deals or features.

Updates to Search Light and Digital Shadows’ capabiliti­es include these enhanced features:

Mobile App Monitoring; Identifies malicious mobile apps and analyzes the applicatio­n’s code to classify the level and type of threat it poses - including intellectu­al property infringeme­nt, malware delivery and phishing. New Asset Registrati­on of Mobile Apps; Ensures an applicatio­n is accounted for and actively managed, including companyspe­cific recommenda­tions.

 ??  ??
 ??  ?? Alastair Paterson, CEO and Co-Founder of Digital Shadows
Alastair Paterson, CEO and Co-Founder of Digital Shadows

Newspapers in English

Newspapers from Kuwait