{"id":13245,"date":"2023-09-16T18:42:57","date_gmt":"2023-09-16T23:42:57","guid":{"rendered":"https:\/\/texascyber.org\/?post_type=sponsor_post&p=13245"},"modified":"2023-09-16T18:43:13","modified_gmt":"2023-09-16T23:43:13","slug":"zimperium","status":"publish","type":"sponsor_post","link":"https:\/\/texascyber.org\/sponsor\/zimperium\/","title":{"rendered":"ZIMPERIUM"},"content":{"rendered":"
\n
\n

Zimperium, Inc. is a global leader in mobile device and app security, offering real-time, on-device protection against both known and unknown threats on Android, iOS and Chromebook endpoints. The company was founded under the premise that the then current state of mobile security was insufficient to solve the growing mobile security problem. At the time, most mobile security was a port from traditional endpoint security technologies.<\/p>\n

Zimperium recognized mobile devices had unique characteristics needing a completely new approach. The team set to work to reimagine how to protect mobile devices and developed the award winning, patented z9 machine learning-based engine. z9 protects mobile devices from device, network, phishing and application attacks. And as first envisioned, z9 has detected 100% of zero-day mobile exploits in the wild without requiring an update or suffering from the delays and limitations of cloud-based detection\u2014something no other mobile security provider can claim.<\/p>\n

\"\"<\/p>\n<\/div>\n<\/div>\n

\n
\n
\n
\n
\n

Enabling the mobile-powered enterprise<\/h2>\n

The Zimperium Mobile-First Security Platform unifies Zimperium Mobile Threat Defense (MTD)<\/a>\u00a0\u2013 formerly zIPS <\/em>\u2013 and Mobile Application Protection Suite (MAPS)<\/a>, provides centralized access to and management of Zimperium\u2019s mobile app and endpoint security solutions.<\/p>\n

The Corporate Perimeter has Blurred<\/h3>\n

To get work done anyplace, anytime, employees are increasingly relying on mobile devices and are:<\/p>\n

    \n
  • Adopting an explosion of mobile apps<\/li>\n
  • Conducting more mobile transactions<\/li>\n
  • Tightly collaborating with new people<\/li>\n
  • Accessing higher volumes of data<\/li>\n<\/ul>\n

    With this mobile-first environment, the defense perimeter as we\u2019ve known it has changed, and security teams struggle to dynamically defend against emerging threats on corporate and user-owned devices.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":13246,"template":"","sponsor_level":[9],"sponsored_year":[],"acf":[],"yoast_head":"\nZIMPERIUM - Texas Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texascyber.org\/sponsor\/zimperium\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ZIMPERIUM - Texas Cyber\" \/>\n<meta property=\"og:description\" content=\"Zimperium, Inc. is a global leader in mobile device and app security, offering real-time, on-device protection against both known and unknown threats on Android, iOS and Chromebook endpoints. The company was founded under the premise that the then current state of mobile security was insufficient to solve the growing mobile security problem. At the time, […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texascyber.org\/sponsor\/zimperium\/\" \/>\n<meta property=\"og:site_name\" content=\"Texas Cyber\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/texascyber\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-16T23:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/09\/ZIMPERIUM_logo_black_bg_noTM_BlkWhite-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3233\" \/>\n\t<meta property=\"og:image:height\" content=\"495\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@texascyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/zimperium\/\",\"url\":\"https:\/\/texascyber.org\/sponsor\/zimperium\/\",\"name\":\"ZIMPERIUM - Texas Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/texascyber.org\/#website\"},\"datePublished\":\"2023-09-16T23:42:57+00:00\",\"dateModified\":\"2023-09-16T23:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/texascyber.org\/sponsor\/zimperium\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texascyber.org\/sponsor\/zimperium\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/zimperium\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texascyber.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ZIMPERIUM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texascyber.org\/#website\",\"url\":\"https:\/\/texascyber.org\/\",\"name\":\"Texas Cyber\",\"description\":\"Texas Cyber Summit\",\"publisher\":{\"@id\":\"https:\/\/texascyber.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texascyber.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texascyber.org\/#organization\",\"name\":\"Texascyber\",\"url\":\"https:\/\/texascyber.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"contentUrl\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"width\":150,\"height\":150,\"caption\":\"Texascyber\"},\"image\":{\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/texascyber\",\"https:\/\/twitter.com\/texascyber\",\"https:\/\/www.instagram.com\/texascybersummit\/\",\"https:\/\/www.linkedin.com\/company\/texas-cyber\",\"https:\/\/www.youtube.com\/texascybersummit\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ZIMPERIUM - Texas Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texascyber.org\/sponsor\/zimperium\/","og_locale":"en_US","og_type":"article","og_title":"ZIMPERIUM - Texas Cyber","og_description":"Zimperium, Inc. is a global leader in mobile device and app security, offering real-time, on-device protection against both known and unknown threats on Android, iOS and Chromebook endpoints. The company was founded under the premise that the then current state of mobile security was insufficient to solve the growing mobile security problem. At the time, […]","og_url":"https:\/\/texascyber.org\/sponsor\/zimperium\/","og_site_name":"Texas Cyber","article_publisher":"https:\/\/facebook.com\/texascyber","article_modified_time":"2023-09-16T23:43:13+00:00","og_image":[{"width":3233,"height":495,"url":"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/09\/ZIMPERIUM_logo_black_bg_noTM_BlkWhite-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@texascyber","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/texascyber.org\/sponsor\/zimperium\/","url":"https:\/\/texascyber.org\/sponsor\/zimperium\/","name":"ZIMPERIUM - Texas Cyber","isPartOf":{"@id":"https:\/\/texascyber.org\/#website"},"datePublished":"2023-09-16T23:42:57+00:00","dateModified":"2023-09-16T23:43:13+00:00","breadcrumb":{"@id":"https:\/\/texascyber.org\/sponsor\/zimperium\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texascyber.org\/sponsor\/zimperium\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/texascyber.org\/sponsor\/zimperium\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texascyber.org\/"},{"@type":"ListItem","position":2,"name":"ZIMPERIUM"}]},{"@type":"WebSite","@id":"https:\/\/texascyber.org\/#website","url":"https:\/\/texascyber.org\/","name":"Texas Cyber","description":"Texas Cyber Summit","publisher":{"@id":"https:\/\/texascyber.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texascyber.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texascyber.org\/#organization","name":"Texascyber","url":"https:\/\/texascyber.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/","url":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","contentUrl":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","width":150,"height":150,"caption":"Texascyber"},"image":{"@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/texascyber","https:\/\/twitter.com\/texascyber","https:\/\/www.instagram.com\/texascybersummit\/","https:\/\/www.linkedin.com\/company\/texas-cyber","https:\/\/www.youtube.com\/texascybersummit"]}]}},"_links":{"self":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post\/13245"}],"collection":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post"}],"about":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/types\/sponsor_post"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media\/13246"}],"wp:attachment":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media?parent=13245"}],"wp:term":[{"taxonomy":"sponsor_level","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_level?post=13245"},{"taxonomy":"sponsored_year","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsored_year?post=13245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}