Welcome!

News Feed Item

Cellebrite and Webroot Partner to Deliver Mobile Malware Diagnostics Capabilities to Cellular Retailers

BARCELONA, Spain, Mobile World Congress, February 25, 2014 /PRNewswire/ --

 - Cellebrite Offers First and Only Diagnostics Solution to Detect and Remove Malicious Applications and URLs from Mobile Devices with Webroot's Award-Winning Antimalware Solution

Cellebrite, the leading provider of retail mobile data solutions, and Webroot, a leader in cloud-based security intelligence solutions, today announced a technology partnership. The Webroot Mobile App Reputation Service and URL Classification Service will be integrated with Cellebrite's Diagnostics solution. The combination will enable mobile operators and mobile retailers deploying Cellebrite's Diagnostics to proactively identify and remediate security threats and performance problems on their customer's mobile device by leveraging the extensive Webroot threat database, which contains millions of mobile application and website antimalware signatures.  

     (Logo: http://photos.prnewswire.com/prnh/20140202/667552 )

The addition of antimalware capabilities from Webroot to Cellebrite's comprehensive mobile device diagnostics solution allows wireless retailers to increase customer smartphone satisfaction while avoiding costly repairs. The integrated solution addresses the emerging class of phone problems and threats caused by mobile malware-in addition to detecting and correcting problems resulting from a wide range of hardware faults and operating system malfunctions.  

With the delivery of the integrated Webroot solution, Cellebrite becomes the first and only multi-channel phone diagnostics solution provider to offer antimalware detection and removal to mobile carriers and retailers, and the first such vendor to provide this market with cloud-based mobile threat protection from Webroot. Webroot security intelligence services have analyzed more than 7.8 million mobile applications and categorized more than 10 billion web URLs with sophisticated website reputation scoring to identify and block mobile threats and malicious websites on iOS and Android devices.  

The combined offering will enable mobile retailers to immediately address customer problems related to mobile malware - in addition to problems emanating from other sources - at the point of sale by running Cellebrite Diagnostics on a device.  At the customer's direction, the suspicious applications, websites or malware can then be immediately removed from the device.  By identifying and removing threats, mobile retailers can limit reputational damage due to customer dissatisfaction and reduce costs due to malware-related issues, such as unnecessary returns, repairs, or network performance issues. The solution's general availability is scheduled for the second calendar quarter in 2014.

"Webroot is excited to team with Cellebrite to help mobile retailers and carriers protect their customers from quickly evolving mobile threats," said Scott Merkle, vice president of Enterprise and OEM Sales at Webroot. "By leveraging Webroot's best-in-class URL classification and mobile app reputation with its Diagnostics, Cellebrite provides a highly secure service that can grow their retailers' customer bases, maximize recurring revenue streams and enable consumers to get the most value from their mobile device investments."

"Malware detection, removal and resolution are vital components to an effective mobile diagnostics solution.  The source of consumers' complaints about smartphone problems is no longer confined to hardware and software faults, but also increasingly related to applications hurt by malware," said Amir Lehr, vice president of Cellular Products and Business Development at Cellebrite.  Lehr continued, "Combining our diagnostics with the Webroot solutions makes Cellebrite the first Diagnostics provider to deliver, at the point of sale, immediate access to best in class antimalware technology, focused on this critical application layer, from an industry leader that shares Cellebrite's commitment to research and continual improvement through innovation."

About Cellebrite

Cellebrite is a world leader in delivering data and diagnostics solutions for the mobile value chain. Operators and retailers are provided with advanced value-added services to enhance the customer's experience and improve satisfaction. The company's advanced retail mobile solutions are unique in offering in-store phone-to-phone content transfer, backup and restore, diagnostics, application and content delivery. In addition, Cellebrite offers retailers monitoring, statistics and analysis of sales activities. The company has more than 150,000 units deployed at more than 200 mobile carriers and retailers globally, representing well over 100,000 stores handling hundreds of millions of transactions a year.

Founded in 1999, Cellebrite is a subsidiary of the Sun Corporation, a publicly traded Japanese company (6736/JQ).

For more information, visit http://www.cellebrite.com/mobile-retail

About Webroot

Webroot is the market leader in cloud delivered security software as a service solutions for consumers, businesses and enterprises.  We have revolutionized internet security to protect all the ways you connect online.   Webroot delivers real-time advanced internet threat protection to customers through its BrightCloud® security intelligence platform, and its SecureAnywhere suite of security products for endpoints, mobile devices and corporate networks.  Over 7 million consumers, 1.5 million business users and 1.3 million mobile users are protected by Webroot.   Market leading security companies, including Palo Alto Networks, F5, Cisco, Aruba, NetCitadel, GateProtect, Microsoft and others choose Webroot to provide advanced internet threat protection for their products and services.  Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held Internet security company in the United States - operating globally across North America, Europe and the Asia Pacific region.  For more information on our products and services, visit http://www.webroot.com.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
SYS-CON Events announced today that CollabNet (www.collabnet.com) a global leader in enterprise software development and delivery solutions that help customers create high-quality applications at speed, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The CEO of CollabNet Flint Brenton will also present about DevOps challenges in today’s global, open, and heterogeneous world of software development.
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...