Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
LAS VEGAS, NV -- (Marketwire) -- 07/25/12 -- Appthority, The Authority in App Security, has announced a series of new partnerships with DreamLab Technologies, Fixmo, IronKey, PrivacyChoice, and Quixey to extend the reach of Mobile App Risk Management through the Appthority Platform. The Appthority Platform automatically identifies and manages security and privacy risks hidden in mobile apps, using static and dynamic analysis through its cloud-based behavioral analysis engine.
Named "Most Innovative Company of RSA® Conference 2012" at its early 2012 launch, Appthority has seen great demand for its app scanning technology. This new growth helped Appthority close a $6.25M Series A round with Venrock and US Venture Partners (USVP). Today, Appthority is showcasing exciting new partnerships at Black Hat 2012. The company will be meeting with customers, media and new partners at the security conference's expo floor in booth P3 at the Octavius Ballroom of Caesars Palace in Las Vegas.
The Appthority Platform provides App Risk Analysis feeds to Enterprise Mobility Management (EMM), Mobile Device Management (MDM), Mobile App Management (MAM), Enterprise App Catalogs (also known as Enterprise App Stores), and Enterprise App Developers. With these new partnerships, Appthority's Mobile App Risk Management will now also be available to security consultants, Mobile Risk Management (MRM) enterprise and government customers, as well as consumers who worry about mobile app risk.
Domingo Guerra, co-founder and president of Appthority, said the company's partner centric approach is paying off.
"Our partners are leaders in their space who already offer amazing products," Guerra said, "By adding Appthority's innovative Mobile App Risk Management to their services and solutions, our partners are giving their customers an insight into what apps really do. This enables a safer mobile experience in a convenient fashion; by integrating the Appthority Platform to the products customers are already using, users can now make more intelligent decisions on what apps they allow into their lives."
Appthority has announced the following new partnerships:
To schedule a meeting with Appthority at Black Hat, please email AppthorityPR@shiftcomm.com.
Follow Appthority on Twitter: http://www.twitter.com/getappthority.
About Appthority
Appthority -- The Authority in App Security helps the enterprise identify and manage the risks hidden in mobile apps. The cloud-based Appthority Platform automatically identifies and grades risky behavior in mobile apps including known and unknown malware, new malware used in targeted attacks, corporate data exfiltration, and intellectual property exposure. The Appthority Platform integrates with the enterprise's existing mobile solutions, adding app reputation and risk analysis capabilities to Enterprise Mobility Management (EMM), Mobile Device Management (MDM), Mobile App Management (MAM) Enterprise App Catalogs, and Enterprise Mobile App Developers' Software Development Lifecycle (SDLC) process. For more information on Appthority please visit www.appthority.com.
Appthority name and logo are either registered trademarks or trademarks of Appthority, Inc in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.
Contacts:
Appthority
Domingo Guerra
President & Co-Founder
+1 (415) 562-7233
Email Contact
Twitter: @GetAppthority
SHIFT Communications
Jennifer Usher
+1 (415) 591-8456
Email Contact
Twitter: @jmanos
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs