NXCloud, the first Mobile Security Management Platform in the Cloud !

Connect to our website for more information.

Secured Mobile Enterprise Platform

Time for mobile apps in your organization. Write once, securely run anywhere

Mobile Unified Threat Management™ (m-UTM™)

Multiplatform based mobile devices enterprise management server. Unique IT and security appliance server on the market, covering all devices.

Secure Voice, Video and Chat Solution (SVVCS)

Unique Non NSA/NIST Standardised Voice and Video Encryption Solution

First Instant Mobile Security Management Solution

The first appliance to give your enterprise’s devices instant security and integrated management they deserve !

Wednesday, December 11, 2013

Mobile Security Management



Mobiquant Technologies flagship product - Mobile NX Defender Suite empowers enterprises, governments and end-users in manageing security vulnerabilities of their mobile devices and applications in real-time. Mobile NX opens up potential for new use cases that will improve productivity & increase returns on mobile fleet & IT investments.

Monday, December 2, 2013

▶ LG G Flex, first Self Healing Phone from scratches and fully flexible !

At Mobiquant, we got the new LG G flex, and were impressed .

South Korean electronics company LG has launched its Flex smartphone with an intriguing “self-healing” coating that supposedly allows it to recovers from accidental scratches.

To put this claim to the test, YouTube tech personality Marques Brownlee has deliberately scratched his LG Flex phone with his keys, mimicking the way they would rub up against the phone in his pocket.

Surprisingly, after just a few minutes, the light scratches were already mostly cleared up and barely noticeable, thus demonstrating the self-healing power of LG’s special cover coating.

Brownlee also took a knife to his LG Flex—while its self-healing feature was less effective in this case, the knife cut did become far less obvious than it would have been with a regular phone. 


Whatch Bronwlee demo:




mPROAPPSTORE SMEAP : Mobile Enterprise Application, Write once, securely run anywhere

Mobiquant mProAppstore MEAP Mobile Enterprise Application Platform


Open environment, standard languages and tools with patented technologies and know-how to ease and simplify your line of business mobile applications development and deployment.
Centralized management enabling administrators to control which users can access an application and what enterprise databases that application can exploit data from.
simplify cross-platform development.

Friday, November 29, 2013

Google aurait envisagé de quitter les Etats-Unis après le scandale de la NSA



Google aurait longuement hésité à déplacer ses serveurs et à quitter les Etats-Unis. C'est Eric Schmidt, le PDG de Google qui l'a annoncé à l'occasion du sommet annuel du Paley Media Center à New-York. La firme, éclaboussée par le scandale de l’espionnage illégal de l’Agence Nationale de Sécurité (NSA), a décidé de rester aux Etats-Unis... pour lutter contre les programmes de surveillance.

Lire l'article :
Google aurait envisagé de quitter les Etats-Unis après le scandale de la NSA

NX Safevoice™: A Unique Non NSA/NIST Standardised Voice and Video Encryption Solution



Are there any good mobile secure voice, video and chat programs?
This reccurring question as global business environment is more and more insecure today has an answer now ! Mobiquant’s secure encrypted voice, visioconference and messenging chat solutions enable your business to bring your organization with a unique high level of mobile communication security. Today’s most efficient companies and public institutions want to ensure a high level of confidentiality and integrity in their communication. Mobiquant encrypted communication sessions enables your staff and employees to use existing systems for secure encrypted communications while maintaining compliance with PCI, HIPAA, and other regulations.

Discover more about NXSafeVoice by Mobiquant :
http://www.mobiquant.com/products/nx-safevoice/

Wednesday, November 27, 2013

NSA surveillance: Europe threatens to freeze US data-sharing arrangements | World news

NSA surveillance: Europe threatens to freeze US data-sharing arrangements

 

After Edward Snowden revelations, EU executive underlines US compliance with European law and 'how things have gone badly'
 The EU executive is threatening to freeze crucial data-sharing arrangements with the US because of the Edward Snowden revelations about the mass surveillance of the National Security Agency.
The US will have to adjust their surveillance activities to comply with EU law and enable legal redress in the US courts for Europeans whose rights may have been infringed, said Viviane Reding, the EU's justice and rights commissioner who is negotiating with the US on the fallout from the NSA scandal.
European businesses need to compete on a level playing field with US rivals, Reding told the Guardian.
Read more :
NSA surveillance: Europe threatens to freeze US data-sharing arrangements | World news | The Guardian

Tuesday, November 26, 2013

Mobiquant News: iPad and iPhone users urged to switch to Android by Eric Schmidt ~ Blog Mobiquant Technologies

Mobiquant Technologies - Mobile Security Management :


Google executive chairman issues how to leave Apple guide for new Android users. Google executive chairman Eric Schmidt has authored a guide to help Apple iPhone users make the switch to the Android mobile operating system. Mobiquant News: iPad and iPhone users urged to switch to Android by Eric Schmidt ~ Blog Mobiquant Technologies.

The post Mobiquant News: iPad and iPhone users urged to switch to Android by Eric Schmidt ~ Blog Mobiquant Technologies appeared first on Mobiquant Technologies.






from WordPress http://www.mobiquant.com/mobiquant-news-ipad-and-iphone-users-urged-to-switch-to-android-by-eric-schmidt-blog-mobiquant-technologies/?utm_source=rss&utm_medium=rss&utm_campaign=mobiquant-news-ipad-and-iphone-users-urged-to-switch-to-android-by-eric-schmidt-blog-mobiquant-technologies

via IFTTT

Mobiquant News: iPad and iPhone users urged to switch to Android by Eric Schmidt


 Google executive chairman issues how to leave Apple guide for new Android users.

Google executive chairman Eric Schmidt has authored a guide to help Apple iPhone users make the switch to the Android mobile operating system.

Read more: ITPRO article


iPad and iPhone users urged to switch to Android by Eric Schmidt | IT PRO

Monday, November 25, 2013

Mobiquant, the mobile security leader, warns IT leaders against MDM only approach. - News -Mobiquant Technologies




Mobiquant products are being used successfully by leaders in diverse industries. Among our customers are global leading companies from fields such as Healthcare, Finance, Logistics, Manufacturing, Telecom and Government Institutions as well as French Department of Defense, Homeland in 20 countries, NATO, Geneva Police. Mobiquant solutions are only way to definitely secure any company data from external attacks.
As BYOD becoming a growing demand in most of the enterprises, Mobiquant prepared products that fully covers every aspect of Mobile Device Management and Mobile Security Management. This way our solutions definitely solves any problems related with BYOD process.


Mobiquant, the mobile security leader, warns IT leaders against MDM only approach. - News -Mobiquant Technologies

Friday, November 22, 2013

Mobiquant Slideshare. Mobile Security : Demystifying the Security Weaknesses of iOS and Android


Presentation addresses following table of content :
  • Mobile Usage Evolution 2008-2013
  • Mobile Threats Trends in 2013
  • iOSvs Android Platforms Analysis
  • MDM vs MSM (Mobile Security Management))
  • B2B mobility at risk
  • Future of Mobile Security
  • Internet object and Data leakage

Thursday, November 21, 2013

MOBIQUANT TECHNOLOGIES: Overview | LinkedIn

Checkout our new Linkedin Corporate version page !

MOBIQUANT TECHNOLOGIES: Overview | LinkedIn
 MOBIQUANT LINKEDIN CORPORATE PAGE

#mobilesecurity #mobiquant

NX Safevoice™: A Unique Non NSA/NIST Standardised Voice and Video Encryption Solution


Are there any good mobile secure voice, video and chat programs?
This reccurring question as global business environment is more and more insecure today has an answer now ! Mobiquant’s secure encrypted voice, visioconference and messenging chat solutions enable your business to bring your organization with a unique high level of mobile communication security. Today’s most efficient companies and public institutions want to ensure a high level of confidentiality and integrity in their communication. Mobiquant encrypted communication sessions enables your staff and employees to use existing systems for secure encrypted communications while maintaining compliance with PCI, HIPAA, and other regulations.

Mobiquant NXCloud, Certified mobile security platform in the cloud

Mobile Security and IT management in the Cloud. When traditional MDM solutions are not enough.

What is happening to our corporate devices, data or applications and services in the cloud ? .
Ever asked yourself those questions ? As more and more businesses are massively moving their mainstream Cloud-based I.T operations on Mobile-ready applications, it has opened the door for security vulnerabilities in organizations. These technologies, despite enormous advantages, are causing users and enterprises alike to lose control over various aspects of their data.
For example, who really owns data uploaded to Facebook, how does a user control accesses to her data on a stolen mobile device, and how can an enterprise enforce uniform security and privacy policies when its data is stored in the cloud and on its employees’ mobile devices?
Today’s most efficient companies and public institutions want to ensure a high level of confidentiality and integrity in their communication. Based on its multi-awarded technologies and after many years providing them to its customers, Mobiquant answers those challenges through NXCloud , the first mobile security management platform taking into account the mandatory security compliancies for most businesses.
NXCloud Mobile Security platform: A 100% cloud centric service easing your teams daily operations.

More details on our website : http://www.mobiquant.com

Monday, November 18, 2013

Q3 2013: mobile malware on the rise, 97% targets Android

An increasing number of malware threats are currently affecting the Android operating system.

According to Mobile Threat Report from FSecure in Q3 2013, around 259 total mobile threat families and variants have been detected across the popular mobile OS's, with 252 of them being found on Android. The remaining 7 are found on Nokia's aging Symbian OS, while no threats have been reported for iOS, BlackBerry, or Windows Phone.
The threat breakdown consists primarily of Trojans (more than 90% of all threats), the largest percentage of which are targeted at mobile banking. A large majority of mobile banking trojans are of the SMSSpy variety, which aim to intercept SMS messages sent from banks in the form of secondary or two-step authentication of user credentials or online transactions.
SMSSpy differs from other malware families as it does not descend from a single identifiable code source, and as such is more difficult to identify and intercept. F-Secure has also detected a rising count of PUAs (Potentially Unwanted Applications), which include undesirable or unwanted functionality, or inadvertently introduce security risks.
According to the source, a way for malware to find its way onto your device is by physically accessing your device, which is why locking your device or protecting it with an Anti-theft solution is recommended.



Read more: The paypers

Warnings about Android malware, more apps more flaws.



If you get into a conversation with an IT manager about BYOD policies, they’re often all for it – as
 long as the devices aren’t Android.
The Google-made operating system has a reputation for being open to malware, in part because Google wasn’t vigilant enough in the early going of its app store, and in part because as the number of Android phones began to swell malware makers began devoting more attention to the platform.
While Google has toughened up on apps being put into the Play Store, the focus of malware developers hasn’t.
In a column this month is SiliconValley.com, Troy Wolverton quotes security analysts saying that isn’t enough. Android users can download apps from anywhere, while Apple limits iPad and iPhone downloads to its App Store, and Microsoft forbids Windows Phone users from getting apps anywhere but the Windows Phone store.

Read more: http://www.itworldcanada.com/post/warnings-about-android-malware#ixzz2kzqDj7PV
or visit http://www.itworldcanada.com for more Canadian IT News 

More :
Warnings about Android malware | IT World Canada Syndicated

Saturday, November 16, 2013

Mobiquant News: BlackBerry Abandons Plan to Sell Company

Mobiquant Technologies - Mobile Security Management in Motion


BlackBerry Ltd. is abandoning a plan to find a buyer and will instead raise $1-billion of new funds and replace its chief executive and some directors, sources said. The Waterloo, Ont.-based smartphone company had spent the past two and a half months seeking a buyer, and had received a letter of intent from investor Fairfax Financial Holdings Ltd. to purchase the company for $4.7-billion. Fairfax had until today to complete its detailed examination of BlackBerry’s books.


The post Mobiquant News: BlackBerry Abandons Plan to Sell Company appeared first on Mobiquant Technologies.






from WordPress http://www.mobiquant.com/mobiquant-news-blackberry-abandons-plan-to-sell-company?utm_source=rss&utm_medium=rss&utm_campaign=mobiquant-news-blackberry-abandons-plan-to-sell-company

via IFTTT

Friday, November 15, 2013

Snowden's Impact on the Enterprise: How Mobile Security is Evolving Post-NSA Leak |

The country is abuzz with the controversy stirred-up by the public release of the first hints of four laptops worth of top-secret, government documents by former NSA contractor, Edward Snowden. In a recent email exchange with New Hampshire Senator, Gordon Humphrey, Snowden assures the Senator that our national secrets are safe with him. He writes that “no intelligence service — not even our own — has the capacity to compromise the secrets I continue to protect.” While public opinion has shifted slightly in Snowden’s favor (55% whistle-blower to 34% traitor respectively according to Quinnipiac University poll released July 10), only time will tell what else is on those laptops, what information will be released, and how severe the damage will be. There is already deep introspection concerning current practices for document collaboration between contractors and government agencies; practices that resulted in the unintentional exposure of the secrets of the country to the scrutiny of the world.
Snowden's Impact on the Enterprise: How Mobile Security is Evolving Post-NSA Leak | Innovation Insights | Wired.com

Sunday, November 10, 2013

Singapore team helps plug flaws in Apple devices

Mobiquant Technologies - Mobile Security Management in Motion


SINGAPORE had a hand in making the popular iPhones and iPads safer from malicious software programmers. A group of eight researchers here found three security flaws in tech giant Apple's iOS operating system used in its mobile phones and tablets. The vulnerabilities would have allowed hackers to design third-party applications which could crack the devices' passcode, block incoming calls or post unauthorised tweets.


The post Singapore team helps plug flaws in Apple devices appeared first on Mobiquant Technologies.






from WordPress http://www.mobiquant.com/singapore-team-helps-plug-flaws-in-apple-devices?utm_source=rss&utm_medium=rss&utm_campaign=singapore-team-helps-plug-flaws-in-apple-devices

via IFTTT

Wednesday, October 16, 2013

Conrad Longmore crap security for dirty money. Dynamoo UPDATED

UPDATE: 
We learnt  (by different security friends) that the CONRAD LONGMORE loves denigrating people, revealing their personal life for free BUT DON T LIKE THIS FOR HIMSELF. ;-) YES ! in fact he asked GOOGLE to remove his post from the results in the Google search. Crazy ! that our White security Knight don t like what he does to (some) honest people and companies to ensure the Buzz and traffic on his eCommerce Blog where he is still selling crap things that Have nothing related about security.
So here we are again guys !!

Earlier, in August we were informed  by some partners of a strange post from a guy claiming being a "security expert". This dude called Conrad Longmore from a blog we never heard about (dynamoo), posted an article about Mobiquant Technologies. He maybe got his freeware antivirus warning him about a malicious javascript resulting of an infection on our hoster files. The strange thing here is fully about the behaviour of the guy claiming to belong to the security community. After 20 years in the sec arena we never seen a hacked victim behing blamed and denigrated having its website infected. What about the hackers? sure it requires a real true technical work. Not given to everyone.

We  made a quick search about this unknown blogger.
We got a location: [hidden] Bedford BedfordshireMK42, with another occupant : Samantha J Morrison.
He is using a personal blog space on google blogspot, after apparently having tried several corp domain (www.Conrad-longmore.co.uk 404 error, no files) and a wordpress free space (http://en.wordpress.com/tag/conrad-longmore/ 404 error , no files).)


No company, no professional profile. Jobless or Yet another freelancer. Website : dynamoo.com seems to be a fake or outdated (last update 2003) website as many links are broken. Kind of blogsite quickly setup and stopped by this myserious guy.
We found some related facebook link :https://www.facebook.com/conrad.longmore‎ ,  with a profile picture of a guy having a walk in the british countryside holding a bag with a kiddy puppet  in the back :


and a twitter account with some strange twitts taking position for the  homosexual community :



After having contacted the guy , our team did not have any answer from him.

Seems that this guy is using various ways to drive some traffic to his blog by denigrating different websites and people with no reasons claiming they are all hackers or malicious internets users and has already many enemies apparently:


This is clearly to make some business about mobile items sold on his web and by using this  technique of degritation to do some buzz ( audience is poor) he is  selling mobile accessories. Security ? ecommerce ? mobile accessories ? strange guy ;-). People are complaining on forums about receiving spam email from him to buy mobiles parts : "
Conrad Longmore does appear to sell all kinds of things,  including mobile phones, and portable air conditioners, so the guy must have read the site and added the PS for shits and giggles" :  Forum of victims describing what happened to them.


The malware a classical non critical  HH. JS, among thousands variants of this kind,  have spreaded thoughout the web since years, and it has infected again this summer up to 252 000 website among which Apple.com and some others which were unavailable for nearly one week for some of them.
Our dude find that on our website, which is obviously technically hosted on a distinct independent infrastructure than the corporate one, thought it was a valid and major reason to drive a deep dive study about : the company, its financial status (with French reading bad expertise ;-)) , our management, our domain .... and yes absolutely not about this malware, the security countermeasures etc . In short nothing related with security and IT.


The funny thing is that he did criticize our website about having a temporary non critical js malware and we thought we should find a perfect website on his side. This was aboslutely not the case:
- broken links(25/70), outdated references( last update is 2003),blogsite is  badly designed, coded and graphically disgusting. We even find 5 vulnerabilities and it  looks like a beginner web blogger.

By the way we decided not to take any action again this anonymous strange blogger which apparently is using strange techniques to exists and shine on the web to make money on our back.

Finnally, after some discussion with famous security real bloggers on the web most of them told us they never heard of him and few who did know him,  had some negative feedback about his behaviour. As in any case a security professional will  blame a hacked victim for being infect or hacked. Our company never decided to be infected for some days earlier during summer time. This mix of corporate, financial -(he is also a financial expert ;-)) and personal elements in a security analysis demonstrate clearly the guy is somehow not in the security space but just personnally blogging using security as an excuse.

This is how the web is going nowadays :  giving some space  to unknown people, having lot of freetime to blog on all and nothing.






Wednesday, August 28, 2013

U.S. security agencies - "Android mobile main target for malware".

Google Inc's Android, the dominant mobile operating system, is by far the primary target for malware attacks, mostly because many users are still using older versions of the software, according to a study by the Department of Homeland Security and the Federal Bureau of Investigation.
Android was a target for 79 percent of all malware threats to mobile operating systems in 2012 with text messages representing about half of the malicious applications, according to the study from the government agencies, which was published by Public Intelligence website.
By comparison, about 19 percent of malware attacks were targeted at Nokia's Symbian system and less than 1 percent each at Apple Inc's iOS software, Microsoft Corp's Windows and BlackBerry Ltd.
Android continues to be a "primary target for malware attacks due to its market share and open source architecture," said the study, which was addressed to police, fire, emergency medical and security personnel.


source Reuters.com

Monday, August 26, 2013

Mobiquant Invited by Japan Government to Exhibit IT pro EXPO

 Mobiquant has been invited by Japan Governmen to exhibit at leading IT innovation event IT pro EXPO 2013 in Tokyo between 9-11 October 2013.Run by the Jetro (Japan External Trade Organization) and Japan Government, the event aims to accelerate Japanese economic growth by stimulating business-led innovation and opening up international trade opportunities.

The event will bring together over 60,000 people from Asia, international IT business, Government and academia. Mobiquant has been selected by the Japan External Trade Organization to exhibit at the event as one of the Mobile Security most innovative companies.
In 2007, Mobiquant was first company in the world to provide comprehensive solution for Mobile Security Management. For most innovated solutions Mobiquant was rewarded with many awards, including Frost & Sullivan European Technology Innovation Award for Mobile Security Management System.

Now, Mobiquant has been hand-picked to showcase some of its most innovative technologies and further embed the company reputation for mobile security business and technological solutions.

Reda Zitouni, Mobiquant's CEO: “We are really pleased that Mobiquant has been invited to exhibit at IT pro EXPO 2013. It’s a fantastic platform to demonstrate the company's ambition and commitment to security and innovation. It’s also a good opportunity to highlight our activity in Asian region."

Mozilla Releases First Two Firefox OS Smartphones

Mozilla released the first two smartphones to carry the new Firefox operating system today.  After early details were unveiled at the Mobile World Congress in Barcelona in February, the new operating system began to generate serious buzz.  Mozilla partnered with Telefonica for the initial release.

ZTE and Alcatel provided the design for the first two phones to carry the new Firefox HTML open source OS, each sporting slim touchscreen designs and very affordable price points.  Both the ZTE Open and Alcatel One Touch Fire come standard with all of the normal smartphone amenities, including email, phone calls, text messaging, maps, camera (3.15 and 3.2 MP respectively), and naturally, Web browsing with Firefox.  Users can also download apps, although they may not get too far on the internal memory.  Fortunately, both phones have expandable MicroSD memory as well.

Neither phone exceeds 512 MB of internal memory, and neither has an HD screen, but the €69 (~$90) price point, which includes €30 of credit for pre-paid users, more than makes up for the lack of sizzle.  Both phones have highly respectable Adreno 200 graphics cards and 1 GHz Qualcomm processors.

The Firefox OS is an open-source system, intended to compete with Android for developer attention, and the experience is reportedly similar to using an Android device.  It was developed using HTML5, the language of the Web, which Mozilla hopes will make it easier for third party developers to produce apps.  With HTML5 integrated onto an open source operating system, there's definitely a possibility that Firefox could catch on with that crowd, although it remains to be seen if the software has the performance or longevity to make a splash.

Researchers find another Android attack that can get past signature checks

The vulnerability allows attackers to modify legitimate Android apps without breaking their digital signatures

A second vulnerability that can be exploited to modify Android apps without breaking their digital signatures has been identified and publicly documented.

Technical details about the vulnerability were published Wednesday by a security researcher in a Chinese language blog post.
The flaw is different from the so-called "masterkey" vulnerability, though both allows attackers to inject malicious code into digitally signed Android application packages (APKs) without breaking their signatures.

Android records the digital signature of an application when it is first installed and a sandbox is created for it. All subsequent updates for that application need to be cryptographically signed by the same author in order to verify that they haven't been tampered with.

Being able to modify legitimately signed apps means that attackers can trick users into installing fake updates for their already installed applications that would get access to all the potentially sensitive data stored by those applications. If the targeted applications are system apps, such as those pre-installed by device manufacturers, the malicious code in the rogue updates can even be executed with system privileges.

The new vulnerability allows attackers to inject code into particular files that exist in APKs, specifically in their headers, in a way that bypasses the signature verification process. The files that can be modified are called classes.dex, but in order for the attack to work, the size of the targeted files needs to be under 64KB, which somewhat limits the attack.

'Kill switch' on smartphones takes a step forward

Federal prosecutors want kill switches on smartphones as part of the Secure Our Smartphones initiative

A call by federal prosecutors for phone manufacturers to install a "kill switch" to discourage smartphone theft has taken a step forward, with Apple and Samsung providing handsets whose security features will be put to the test.

As part of the "Secure Our Smartphones" initiative announced by U.S. prosecutors and other groups in June, phone makers are being asked to find technological solutions to prevent smartphone theft. U.S. law enforcement is dealing with growing crime -- including murder -- related to smartphone theft, especially iPhones, and one of the ideas put forward was the installation of kill switches to disable smartphones completely.

As part of the SOS initiative, Apple will provide an iPhone 5 with the "Activation Lock" enabled, while Samsung will provide a Galaxy S4 smartphone with the LoJack for Android feature. The smartphones will be tested for security features and attempts will be made to circumvent the anti-theft features.

The prosecutors expect smartphones with kill switches to be released by early 2014, and discussions about the initiative have been held with Apple, Google, Samsung and Microsoft. The SOS initiative is also backed by state officials, police chiefs, district attorneys, attorneys general and consumer advocacy groups.

Apple's "Activation Lock" feature in iOS 7 requires an iPhone owner to enter a username and password to enable a locked or wiped phone. The feature is intended to make it difficult to resell a lost or stolen iPhone.

It is estimated that about 1.6 million people were victims of smartphone theft in the U.S. last year. Around 30% to 40% of all robberies are smartphone theft, according to the U.S. prosecutors.

BYOD - Bring your own disaster

According to the latest Mobiquant research BYOD is becoming a standard policy in a large number of companies. Although security of mobile devices is still a main problem for employers. Research confirms that BYOD is one of the main trends and challenges for entrepreneurs.
Companies wondering whether allow employees bring their own mobile devices to work can now stop asking that question. If proper security solution are applied, BYOD can give them an advantage over the competition by strengthening innovations and creativity in the workplace and reducing overall costs of an organization. Establishing cooperation with IT security partner who understands how important it is to provide proper security level for the whole network allows enterprises to gain benefits from BYOD process and protects them from drowning in the onslaught of information.
Primary feature of BYOD is a wide range of mobile devices, technologies and software what may cause problems with providing consistent and hermetic security system. Therefore, it is essential to introduce and implement an integrated security policy - at this point companies also have to control and monitor activity on mobile devices and prevent any internal information leakage.
From the point of view of an employer, data security should be a key feature of BYOD. Every organization decided to encourage employees to use private devices should take care of rational and functional security policy including:
  • list of devices that use the company network along with assigned users and their user access level to the enterprise data
  • data storage rules and the terms of downloading data on employees’ mobile devices
  • procedures in case of a theft, loss and termination of the contract with an employee that will allow to erase company’s data from a mobile device
  • terms and procedures for operating systems and software update
  • requirements for password usage.
80% of enterprises allows their employees to use their private mobile devices for work. Over 50% of the companies reports cases of data theft and security breaches. What is more shocking, all cases are connected with access to the network from private mobile devices of employees.
Taking into account that over 50% of employees are using they private devices for work, Mobiquant Technology research shows that over a half of companies from Media, Technology and Telecommunication sectors are not investing enough resources in their mobile fleet security. BYOD policy is advantageous and can bring considerable gains but companies introducing this policy should remember that without tailor-made security procedures it can do more harm than good as far as data protection is concerned.

Wednesday, April 3, 2013

Site Mobiquant.com

http://www.mobiquant.com/fr: Site Mobiquant France Leader du Mobile Security Management - MDMD et BYOD

Blog Mobiquant Technologies: interview-de-reda-zitouni-par-mobiquant_6.html

Blog Mobiquant Technologies: interview-de-reda-zitouni-par-mobiquant_6.html: Le MDM est incontestablement un nouvel axe stratégique pour les entreprises. La mise en place d’un projet de mobilité ne peut souffrir d’u...

Tuesday, February 26, 2013

interview-de-reda-zitouni-par-mobiquant_6.html


Le MDM est incontestablement un nouvel axe stratégique pour les entreprises. La mise en place d’un projet de mobilité ne peut souffrir d’une gestion de la sécurité approximative voire absente. Il est donc utile de bien structurer sa démarche projet et d’adopter de bonnes pratiques. Nous allons aborder ces dernières dans une série d’articles d’Opinion et débuter cette initiative avec une première analyse sur l’importance de la maîtrise des terminaux utilisés par les collaborateurs.


La suite de l article: http://www.globalsecuritymag.fr/Reda-Zitouni-fondateur-de,20130223,35629.html

editorial-de-reda-zitouni-par-mobiquant_6.html


Par Reda Zitouni, fondateur de Mobiquant Technologies
editorial-de-reda-zitouni-par-mobiquant_6.htmlLe MDM est incontestablement un nouvel axe stratégique pour les entreprises. La mise en place d’un projet de mobilité ne peut souffrir d’une gestion de la sécurité approximative voire absente. Il est donc utile de bien structurer sa démarche projet et d’adopter de bonnes pratiques. Nous allons aborder ces dernières dans une série d’articles d’Opinion et débuter cette initiative avec une première analyse sur l’importance de la maîtrise des terminaux utilisés par les collaborateurs.
Dans ce contexte, il est nécessaire de suivre sept étapes pour arriver à bon port, afin de maîtriser la sécurité des terminaux mobiles et d’encadrer le phénomène du BYOD (bring your own device).
Analyse de Risque : Planifiez le parcours, formez lʼéquipage
L’analyse des risques donne le cap. Elle permet de cerner le périmètre fonctionnel requis, de définir les étapes et les éléments de confiance en fonction des activités métiers. Votre task force réunit DSI, support technique, DRH et responsable dʼéquipe nomade, tous parés à encadrer leurs collègues aux usages conformes des terminaux mobiles.


La suite de l article : http://www.channelbiz.fr/2013/02/22/le-mdm-ne-suffit-pas/

Wednesday, February 20, 2013

Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone



As Samsung pushes to be 'enterprise class' and BlackBerry seeks renewed business buy-in, which platform provides the security you need?



http://www.mobiquant.com/en/news/mobile-security-ios-vs-android-vs-blackberry-vs-windows-phone

Mobiquant Technologies: Il est impossible de pirater l'iPad de Barack Obama...



Ce n'est un secret pour personne, Barack Obama est un fan des produits Apple. Et pour ces activités de ''Mister Président'', l'iPad est un outil de travail, dont il ne se sépare jamais.

Sa tablette est toutefois différente du modèle que nous pouvons avoir nous même. L'iPad est en effet dépourvu des capteurs photo, du réseau 3G et Wi-Fi.

Lire la suite sur Next 51:


http://www.mobiquant.com/fr/actualites/mobiquant-technologies-il-est-impossible-de-pirater-l-ipad-de-barack-obamahttp://www.mobiquant.com/fr/actualites/mobiquant-technologies-il-est-impossible-de-pirater-l-ipad-de-barack-obama

HACK: Une méthode pour déverrouiller un iPhone sous iOS 6.1



Critiqué depuis une semaine, le système d'exploitation mobile fait de nouveau parler de lui avec l'apparition d'une méthode pour accéder aux données de l'iPhone en contournant le verrouillage du smartphone. Apple a promis un correctif. Il existe un moyen d'avoir accès à plusieurs données privées sur un iPhone sous iOS 6.1, même si le smartphone est verrouillé par un code. Cette méthode a commencé a circulé hier matin. Une vidéo sur YouTube est disponible depuis le 31 janvier dernier.

http://www.mobiquant.com/fr/actualites/hack-une-methode-pour-deverrouiller-un-iphone-sous-ios-6-1

Saturday, February 9, 2013

Mobiquant publie son livre blanc : Le MDM ne suffit pas ou quand la sécurité mobile n est pas un gadget !

http://www.mobiquant.com/fr/actualites/mobiquant-publie-son-livre-blanc-le-mdm-ne-suffit-pas-ou-quand-la-securite-mobile-n-est-pas-un-gadget

Monday, February 4, 2013

Les webinars de Mobiquant : prochain le 07.02.2013


Mobiquant organise des webinars sur les thèmes du mobile device management et du mobile device security. Pour plus de renseignement, contactez nous directement à travers notre page dédié : Webinar.

Mobiquant augmente sa présence sur la toile


Mobiquant, leader de la sécurité des terminaux mobile, ou mobile device management, a été à de nombreuses reprises cités par les médias pour la qualité de son offre.

Nous revenons sur les articles qui font notre succès :

Mobiquant renforce son mode de distribution indirect
21 janvier - Actionco
22 janvier - Sécurité DSIsionnel
23 janvier - Global Security Mag
28 janvier - BFM TV

Par ailleurs, Mobiquant sort son livre blanc à la disposition des décideurs informatiques.

Friday, February 1, 2013

Mobiquant recrute des intégrateurs

Mobiquant Technologies est le leader des plateformes de gestion et de sécurisation des terminaux mobiles en Europe. Ses solutions ont reçu plusieurs prix de l'innovation.

Mobiquant souhaite s'entourer d'intégraturs français et internationaux pour distribuer ses produits. Dans le cadre de ses recrutements, il met à la disposition de ses partenaires un programme d'accompagnement (Global Alliance Partner Program), différentes formations, un extranet, ainsi qu'un ensemble d'outils d'aide à la vente. Mobiquant privilégie les hébergeurs, SSII et intégrateurs sensibles aux problématiques de la sécurité et de la mobilité. Le programme de certification s'appuie sur trois niveaux : Silver, Gold, Platinium

Reda Zittouni, PDG de Mobiquant, commente cette annonce : " Notre channel nous permet de nous positionner rapidement auprès de nouvelles entités et d'offrir aux utilisateurs des technologies de gestion et de sécurisation de terminaux mobiles de pointe."

Thursday, January 31, 2013

Chinese hackers break into the New York Times, steal every employee's password

The New York Times has reported that for the last four months Chinese hackers have been infiltrating its networks, broken into the email accounts of senior staff, stolen the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees.

According to the report, the first attack came in mid-September 2012 as the newspaper prepared to publish an investigation into the family of Chinese prime minister Wen Jiabao, who are said to have accumulated billions of dollars through business dealings.
Malware was planted on users' computers which opened backdoors for the hackers to gain remote access to connected systems - including a domain controller that contained usernames and hashed passwords for all of the New York Times' employees.

Read more informations.

L’usage des terminaux mobiles impacte durablement le fonctionnement de l’entreprise

Selon une étude d’Avanade, pour que l’usage des terminaux mobile soit efficace, l’entreprise se doit de s’adapter en faisant évoluer leurs processus métiers.

Un phénomène qui a poussé l’intégrateur de solutions Microsoft à mesurer l’utilisation des terminaux mobiles au sein des entreprises à travers une étude réalisée entre août et septembre dernier auprès de 600 décideurs IT dans 19 pays, dont la France.

En la matière, celle-ci est « globalement en phase avec la moyenne mondiale » tout en notant des avances ou retards selon les points de l’étude.
Ainsi, 43% des entreprises françaises reconnaissent que la majorité de leurs employés utilisent leur propre matériel informatique à des fins professionnelles, contre 61% à l’échelle mondiale.

Et 50% des sondés en France font le même constat pour l’usage élémentaire (consultation des e-mails, de documents, etc.) des smartphones sur le lieu de travail, contre 54% en moyenne.

Les tablettes personnelles sont présentes chez 33% des entreprises françaises interrogées. Soit autant que pour le reste du monde. Et, parmi celles-ci, 37% des employés utilisent leurs ardoises numériques pour accomplir des tâches avancées telles que du CRM (gestion de la relation client), la gestion de projets, de la BI, de la production de contenus, etc., contre 33% en moyenne.

Lire la suite.

Pinpointing Your Security Risks


Vulnerability scanning got its start as a tool for the bad guys; now it's helping companies find exposed network ports and at-risk applications.

For something that can be such an effective weapon against those who want to do damage to a network it’s ironic that vulnerability scanning got its start as a tool for the bad guys. Before they can get into networks hackers need to know where the most vulnerable spots are in an enterprise’s security. That means using scanning tools to trawl for such things as open network ports or poorly secured applications and operating systems.

In the past few years these intentions have been turned around, to where scanning tools now give the guys in the white hats a good idea of where the vulnerabilities are and a chance to repair them before the hackers get there.

At least they provide the potential for that. The fact is, many companies don’t seem to be taking advantage of these tools or if they do have them, they are not making much use of them.
Gartner Research believes as many as 85% of the network attacks that successfully penetrate network defenses are made through vulnerabilities for which patches and fixes have already been released.

Read more informations.

Wednesday, January 30, 2013

Mobiquant définit le mobile security management

Pionnier de ce marché, nous avons voulu participer à l'augmentation des connaissances globales du mobile security management. Pour ce faire, nous avons mis en ligne un wiki avec le célébrissime site wikipédia. 

Consciente des carences réelles des entreprises en termes de stratégie mobile, Mobiquant Technologies répond à une véritable problématique de gestion et de sécurisation des flottes mobiles professionnelles. Le MSM relèvent d'enjeux stratégiques majeurs au sein de l'infrastructure des entreprises, tant du point de vue technique que concurrentiel. Ils représentent un véritable engagement des équipes IT sur la qualité de service global auprès des utilisateurs en matière de mobilité d'entreprise.

C'est sur constat visionnaire que la société à développé après de deux ans de recherches et développement une solution unifiée de gestion et de sécurités des appareils mobiles professionnels. Ainsi Mobiquant s'est créé une double compétence encore inédite sur le marché, par sa capacité à proposer un produit capable à la fois de gérer les données des mobiles et leurs sécurités.

La qualité des innovations de Mobiquant a été particulièrement bien reçu. La société à reçu des prix et distinctions de jury spécialiste du mobile security management. En 2008, la solution de Mobiquant, Mobile NX Enterprise Suite1, à reçu le prix de l'innovation du Ministère de la Recherche et de l'Enseignement Supérieur, ainsi que celui des Assises de la Sécurité2. Par la suite, le cabinet d'étude Frost & Sullivan décerne la place de leader à Mobiquant, dans le secteur du Mobile Device & Security Management. En 2009 et 2010, la start-up est cité dans les 100 et 200 meilleurs européennes par le magazines Red Herring.

Découvrir la suite de notre définition du mobile security management.

Tuesday, January 29, 2013

Retrouvez le fil info du Mobile Security Management de Mobiquant

Nous permettons à nos visiteurs de s'informer, de s'interroger et d'en apprendre d'avantages sur les solutions de security management. En plus de notre site et de ce blog, nous mettons à la disposition du public notre fil info disponible ici.

Cette page regroupera des infos sur le secteur et sera au carrefour des nouvelles du mobile security management du monde. Nous rappelons que le succès de notre offre repose aussi sur une large dimension internationale, appuyé par un channel partenaires très dynamique. Cette énergie nous permet aujourd'hui d'annoncer de très bons résultats 2012 et de démarrer l'année avec de belles perspectives.

Dans le cadre du Mobiquant Connect Tour, notre équipe sera présente dans les événements mondiaux les plus importants, à commencer par le Mobile World Wide Congress à Barcelone les 25 et 28 février prochain. Ce sera l'occasion pour les acteurs de la sécurité mobiles, DSI, RSSI, de découvrir les nouvelles innovations et applications de Mobiquant en matière de security mobile management.

Monday, January 28, 2013

Bilan 2012 très positif pour Mobiquant

Mobiquant, fournisseur de solutions de gestion et de sécurisation des terminaux mobiles, annonce une croissance de ses résultats avec une progression de plus de 30 % de son chiffre d’affaires.

Dans un environnement concurrentiel, au cours de l’année 2012, Mobiquant a poursuivi sa dynamique commerciale et ses investissements qui lui ont permis d’obtenir ces résultats et de distribuer ses produits à l’international.

Mobiquant Technologies se positionne désormais comme le leader des plateformes de gestion et de sécurisation des terminaux mobiles en Europe. Ses solutions, qui ont reçu plusieurs prix de l'innovation, s'inscrivent dans les services de nouvelle génération. Mobiquant entend renforcer en 2013 sa stratégie d’investissement qui l’amènera à poursuivre l’enrichissement de ses solutions, à accroître sa présence auprès de ses clients, et à renforcer sa dynamique commerciale.

Mobiquant se fixe comme objectif en 2013 de poursuivre la croissance de son chiffre d’affaires et de se positionner sur de nouveaux pays grâce à son réseau de partenaires commerciaux. Suivant sa stratégie de développement, Mobiquant a renforcé sa présence sur ses marchés de référence, creusé l’écart par rapport à ses concurrents et accédé à de nouveaux marchés.

Caroline Boyaval, Sales Manager Europe chez Mobiquant « En accédant à de nouveaux marchés, nous nous sommes positionnés comme un acteur de choix pour nos partenaires et nos clients. A ce jour, de grands groupes utilisent au quotidien nos outils pour gérer efficacement leurs terminaux mobiles. Nous allons continuer de nous développer et proposer des solutions toujours aussi innovantes et performantes. »

Prenez rendez-vous avec l'équipe Mobiquant en quelques clics


Vous souhaitez vous entretenir avec notre équipe ? Avoir des conseils sur une solution de mobile security ?  Rien de plus simple. Remplissez le formulaire de prise de rendez-vous sur la partie droite de toutes les pages de notre blog.

Après validation, un membre de l'équipe Mobiquant reçois immédiatement un Email de votre part, et vous rappelle selon les disponnibilités que vous avez préalablement remplies. Vous recevrez également une Email de confirmation de l'envoi de votre demande.

Mobiquant reste à votre disposition pour répondre à toutes vos demandes.

Friday, January 25, 2013

Sécurisez vos iPhones et iPad avec la solutions unifié iPhortress

iPhortress est le premier boîtier serveur de gestion et de sécurisation totalement dédié aux flottes mobiles Iphones et Ipad. Sa console d'administration très ergonomique propose de multiples fonctionnalités et mises à jour régulièrement. Iphortress gère de façon optimale des données confidentielles circulant par le terminal. Alors que Mobiquant prépare de nouvelles innovations, c'est l'occasion pour nous de revenir sur les solutions novatrices de mobile security management dédié aux OS qui font le bonheur de nos client.


Une couverture complète des solutions MDM & MSM pour terminaux Apple



Auto-enrôlement et Auto Discovery

Les administrateurs ont désormais la possibilité de provisionner les terminaux via un certificat reconnu de confiance par l’entreprise. Ils peuvent donc aisément et rapidement intégrer l’ensemble de leurs terminaux dans la chaine de confiance.


Gestion Over-The-Air totale

iPhortress TM permet l’installation et la configuration des iPhones – iPads à distance. Les paramétrages et règles définis par l’administrateur seront donc déployés à distance et toujours sans l’intervention de l’utilisateur final dans le processus de synchronisation.


Déploiement sur une partie ou l’ensemble des utilisateurs

L’administrateur peut créer des groupes d’utilisateurs à sa convenance. Il pourra de cette manière déployer uniformément les profils et politiques de sécurité sur les terminaux, selon les besoins des équipes : métier, sécurité, déplacements, etc...


Plateforme d’administration accessible depuis le Web

Interface de gestion accessible par l’ensemble des navigateurs WEB. C’est l‘outil visible assurant directement l’accès aux nombreuses fonctionnalités de iPhortress™.


Installation Plug and Play ultra rapide

L'installation du boîtier iPhortress a été pensé pour être la plus simple possible. Un module Plug and Play intégré lance un wizzard d'installation pas à pas très simple à suivre. La mise en marche opérationnel de l'appareil prend seulement 3h.


Gestion des certificats

iPhortress™ propose un centre de gestion de certificat afin de gérer la chaine de confiance qui permet l’auto enrôlement de l’ensemble des iPhones et iPads de l’entreprise.


Paramétrages Iphone

Mot de passe, Accès Wifi, VPN, configuration de la messagerie, un nombre important de fonctionnalités sont disponibles pour le paramétrage des iPhones et iPads.


Politiques de sécurité

Connectivité, authentification webservices, l’administrateur définit les politiques de sécurité à mettre en oeuvre pour les déployer sur un terminal ou groupe de terminaux OTA.

Thursday, January 24, 2013

Explication du mobile security management façon Mobiquant

Mobiquant est l'inventeur et l'apporteur du Mobile Security Management (MSM) sur le marché. Seul leader sur ce créneau, Mobiquant a révéler par ses innovations que l'expertise en gestion mobile ne se limite pas qu'au Mobile Device Management (MDM), pour concerner au premier plan les questions de sécurité.

Intégré à sa solution de gestion unifié de flotte de terminaux mobiles, la mobile NX Enterprise Suite, Mobiquant propose un rapprochement inédit du management et de la sécurité des mobiles.
Ses services sont assurés par un ensemble de solutions offrant de nouvelles fonctionnalités aux utilisateurs :
  • Gestion PKI
  • Mise en place d'un réseau VPN
  • Audit de sécurité
  • Chiffrement des données
  • Chiffrement de la voix

Avec la mise sur le marché de ces nouvelles solutions, Mobiquant devient en même temps le créateur du mobile unified threat management (M-UTM), solutions de gestions des menaces et des failles de sécurité que peuvent recevoir les mobiles.

Avec ces nouvelles solutions, Mobiquant est en mesure de répondre à la demande de ses clients en leur apportant ses services à forte valeur ajoutée dans la gestion de la sécurité mobiles. Ainsi nous sommes convaincu d'améliorer le confort d'utilisation de nos clients et de participer à l'amélioration de leur productivité.