Welcome!

News Feed Item

Smarter Mobile Security Is Finally Here: viaProtect Unveiled at RSA Conference

Now, Anyone Can Harness Enterprise-Grade Technology to Protect Their Privacy and Avoid Identity Theft

SAN FRANCISCO, CA--(Marketwired - February 25, 2014) - Your mobile device knows everything about you. But how well do you know your mobile device?

Beginning today, savvy consumers can truly take control of their personal information on their devices -- by installing viaProtect. This new app is from viaForensics, which has helped global companies, government organizations, and four of the five largest financial institutions in the U.S. secure their devices for years.

With viaProtect, the same enterprise grade technology can protect anyone's phone or tablet. The app, which will be showcased at booth #2627 at RSA Conference 2014, is free of charge for personal use. A public preview can be downloaded beginning today from Apple's App Store or Android's Google Play Store.

Unlike traditional mobile security apps, which utilize a database of known malicious apps to screen for viruses and malware, viaProtect monitors all apps for mobile risks. For instance, viaProtect can detect if an app handles your personal data insecurely by transmitting it unencrypted or to servers located overseas. viaForensics estimates that as many as 75 percent of apps are "leaky", or insecure.

"We believe that everyone is entitled to state-of-the-art protection from threats like identity theft and loss of privacy," explained viaForensics CEO and co-founder Andrew Hoog. "viaProtect utilizes the same technology that our enterprise customers rely on to protect mission-critical data. It's a more sophisticated approach for a world that is becoming more mobile by the day and one that an informed consumer will want. We're very proud to make it available."

"It's amazing how much data is shared by apps without users knowing. A tool that gives end-users and enterprise visibility into the issues is what the market has been waiting for," said Jarad Carleton, Principal Consultant, Frost & Sullivan. "viaForensics decided to leverage its experience on the enterprise side to benefit all consumers, and that's great for the industry."

How viaProtect Works

While malware and computer viruses are the primary threats for the PCs, leaky and insecure apps are the true risks to personal data on mobile devices. These apps transmit information in various risky manners -- e.g. without encryption or to overseas servers which allows data to be intercepted by unwanted parties. The harsh consequences can include identity theft, financial theft and loss of privacy.

viaProtect gathers mobile forensic, system, network, security and sensor data from devices, then utilizes statistical analysis and risk indicators to detect suspicious events or behavior. This means that an app can be monitored in real-time to predict potential risks or problems -- rather than just checking for known malicious apps. viaProtect uses real time analytics to detect behavior that is suspicious or potentially risky.

Users will:

  • Get a device risk rating - a simple score that lets them know if their data is safe
  • Learn how phones and tablets are sending data - including what data is sent insecurely
  • Discover exactly where their data is being sent
  • Be informed of risky device modifications including root detection
  • Be alerted about leaky and insecure apps

In addition, a browser-based dashboard lets multiple devices be monitored from a single account -- perfect for families.

viaProtect was also built from the ground up to support both iOS and Android platforms. Since iOS is less vulnerable to virus attacks, it has historically been under-served by mobile security solutions. However, leaky apps are just as common on iOS as Android, making viaProtect an essential tool for either platform.

For more information about viaProtect, please visit www.viaprotect.com. For more information about viaForensics, please visit www.viaforensics.com.

The world is mobile. It is how we go about our day to day life; from the way we do business to how we share with our friends and family. At viaForensics, we are making a difference by advancing mobile security worldwide, with nearly 300 million app downloads protected by viaForensics technology to date. Our groundbreaking research leads to products that turn mobile security inside out. Mobile moves fast and so do we. 

The following files are available for download:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The Art of DevOps provides a fun overview to help teams understand DevOps. Written in the style of the famous 6th century Chinese manuscript “The Art of War,” this eBook describes DevOps in the form of a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. It’s a fun read with valuable insights.
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
The Quantified Economy represents the total global addressable market (TAM) for IoT that, according to a recent IDC report, will grow to an unprecedented $1.3 trillion by 2019. With this the third wave of the Internet-global proliferation of connected devices, appliances and sensors is poised to take off in 2016. In his session at @ThingsExpo, David McLauchlan, CEO and co-founder of Buddy Platform, will discuss how the ability to access and analyze the massive volume of streaming data from mil...
WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion w...
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what do...
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
Silver Spring Networks, Inc. (NYSE: SSNI) extended its Internet of Things technology platform with performance enhancements to Gen5 – its fifth generation critical infrastructure networking platform. Already delivering nearly 23 million devices on five continents as one of the leading networking providers in the market, Silver Spring announced it is doubling the maximum speed of its Gen5 network to up to 2.4 Mbps, increasing computational performance by 10x, supporting simultaneous mesh communic...
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, will discuss using predictive analytics to ...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, will discuss how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved effi...
Sensors and effectors of IoT are solving problems in new ways, but small businesses have been slow to join the quantified world. They’ll need information from IoT using applications as varied as the businesses themselves. In his session at @ThingsExpo, Roger Meike, Distinguished Engineer, Director of Technology Innovation at Intuit, showed how IoT manufacturers can use open standards, public APIs and custom apps to enable the Quantified Small Business. He used a Raspberry Pi to connect sensors...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...