News Feed Item

Smarter Mobile Security Is Finally Here: viaProtect Unveiled at RSA Conference

Now, Anyone Can Harness Enterprise-Grade Technology to Protect Their Privacy and Avoid Identity Theft

SAN FRANCISCO, CA--(Marketwired - February 25, 2014) - Your mobile device knows everything about you. But how well do you know your mobile device?

Beginning today, savvy consumers can truly take control of their personal information on their devices -- by installing viaProtect. This new app is from viaForensics, which has helped global companies, government organizations, and four of the five largest financial institutions in the U.S. secure their devices for years.

With viaProtect, the same enterprise grade technology can protect anyone's phone or tablet. The app, which will be showcased at booth #2627 at RSA Conference 2014, is free of charge for personal use. A public preview can be downloaded beginning today from Apple's App Store or Android's Google Play Store.

Unlike traditional mobile security apps, which utilize a database of known malicious apps to screen for viruses and malware, viaProtect monitors all apps for mobile risks. For instance, viaProtect can detect if an app handles your personal data insecurely by transmitting it unencrypted or to servers located overseas. viaForensics estimates that as many as 75 percent of apps are "leaky", or insecure.

"We believe that everyone is entitled to state-of-the-art protection from threats like identity theft and loss of privacy," explained viaForensics CEO and co-founder Andrew Hoog. "viaProtect utilizes the same technology that our enterprise customers rely on to protect mission-critical data. It's a more sophisticated approach for a world that is becoming more mobile by the day and one that an informed consumer will want. We're very proud to make it available."

"It's amazing how much data is shared by apps without users knowing. A tool that gives end-users and enterprise visibility into the issues is what the market has been waiting for," said Jarad Carleton, Principal Consultant, Frost & Sullivan. "viaForensics decided to leverage its experience on the enterprise side to benefit all consumers, and that's great for the industry."

How viaProtect Works

While malware and computer viruses are the primary threats for the PCs, leaky and insecure apps are the true risks to personal data on mobile devices. These apps transmit information in various risky manners -- e.g. without encryption or to overseas servers which allows data to be intercepted by unwanted parties. The harsh consequences can include identity theft, financial theft and loss of privacy.

viaProtect gathers mobile forensic, system, network, security and sensor data from devices, then utilizes statistical analysis and risk indicators to detect suspicious events or behavior. This means that an app can be monitored in real-time to predict potential risks or problems -- rather than just checking for known malicious apps. viaProtect uses real time analytics to detect behavior that is suspicious or potentially risky.

Users will:

  • Get a device risk rating - a simple score that lets them know if their data is safe
  • Learn how phones and tablets are sending data - including what data is sent insecurely
  • Discover exactly where their data is being sent
  • Be informed of risky device modifications including root detection
  • Be alerted about leaky and insecure apps

In addition, a browser-based dashboard lets multiple devices be monitored from a single account -- perfect for families.

viaProtect was also built from the ground up to support both iOS and Android platforms. Since iOS is less vulnerable to virus attacks, it has historically been under-served by mobile security solutions. However, leaky apps are just as common on iOS as Android, making viaProtect an essential tool for either platform.

For more information about viaProtect, please visit www.viaprotect.com. For more information about viaForensics, please visit www.viaforensics.com.

The world is mobile. It is how we go about our day to day life; from the way we do business to how we share with our friends and family. At viaForensics, we are making a difference by advancing mobile security worldwide, with nearly 300 million app downloads protected by viaForensics technology to date. Our groundbreaking research leads to products that turn mobile security inside out. Mobile moves fast and so do we. 

The following files are available for download:

For more information contact:
Ethan Rasiel
Lightspeed PR
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
DXWorldEXPO LLC announced today that Dez Blanchfield joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Dez is a strategic leader in business and digital transformation with 25 years of experience in the IT and telecommunications industries developing strategies and implementing business initiatives. He has a breadth of expertise spanning technologies such as cloud computing, big data and analytics, cognitive computing, m...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
The IoT Will Grow: In what might be the most obvious prediction of the decade, the IoT will continue to expand next year, with more and more devices coming online every single day. What isn’t so obvious about this prediction: where that growth will occur. The retail, healthcare, and industrial/supply chain industries will likely see the greatest growth. Forrester Research has predicted the IoT will become “the backbone” of customer value as it continues to grow. It is no surprise that retail is ...