NXCloud, the first Mobile Security Management Platform in the Cloud !

Connect to our website for more information.

Secured Mobile Enterprise Platform

Time for mobile apps in your organization. Write once, securely run anywhere

Mobile Unified Threat Management™ (m-UTM™)

Multiplatform based mobile devices enterprise management server. Unique IT and security appliance server on the market, covering all devices.

Secure Voice, Video and Chat Solution (SVVCS)

Unique Non NSA/NIST Standardised Voice and Video Encryption Solution

First Instant Mobile Security Management Solution

The first appliance to give your enterprise’s devices instant security and integrated management they deserve !

Showing posts with label iPhone. Show all posts
Showing posts with label iPhone. Show all posts

Monday, August 26, 2013

Mobiquant Invited by Japan Government to Exhibit IT pro EXPO

 Mobiquant has been invited by Japan Governmen to exhibit at leading IT innovation event IT pro EXPO 2013 in Tokyo between 9-11 October 2013.Run by the Jetro (Japan External Trade Organization) and Japan Government, the event aims to accelerate Japanese economic growth by stimulating business-led innovation and opening up international trade opportunities.

The event will bring together over 60,000 people from Asia, international IT business, Government and academia. Mobiquant has been selected by the Japan External Trade Organization to exhibit at the event as one of the Mobile Security most innovative companies.
In 2007, Mobiquant was first company in the world to provide comprehensive solution for Mobile Security Management. For most innovated solutions Mobiquant was rewarded with many awards, including Frost & Sullivan European Technology Innovation Award for Mobile Security Management System.

Now, Mobiquant has been hand-picked to showcase some of its most innovative technologies and further embed the company reputation for mobile security business and technological solutions.

Reda Zitouni, Mobiquant's CEO: “We are really pleased that Mobiquant has been invited to exhibit at IT pro EXPO 2013. It’s a fantastic platform to demonstrate the company's ambition and commitment to security and innovation. It’s also a good opportunity to highlight our activity in Asian region."

Mozilla Releases First Two Firefox OS Smartphones

Mozilla released the first two smartphones to carry the new Firefox operating system today.  After early details were unveiled at the Mobile World Congress in Barcelona in February, the new operating system began to generate serious buzz.  Mozilla partnered with Telefonica for the initial release.

ZTE and Alcatel provided the design for the first two phones to carry the new Firefox HTML open source OS, each sporting slim touchscreen designs and very affordable price points.  Both the ZTE Open and Alcatel One Touch Fire come standard with all of the normal smartphone amenities, including email, phone calls, text messaging, maps, camera (3.15 and 3.2 MP respectively), and naturally, Web browsing with Firefox.  Users can also download apps, although they may not get too far on the internal memory.  Fortunately, both phones have expandable MicroSD memory as well.

Neither phone exceeds 512 MB of internal memory, and neither has an HD screen, but the €69 (~$90) price point, which includes €30 of credit for pre-paid users, more than makes up for the lack of sizzle.  Both phones have highly respectable Adreno 200 graphics cards and 1 GHz Qualcomm processors.

The Firefox OS is an open-source system, intended to compete with Android for developer attention, and the experience is reportedly similar to using an Android device.  It was developed using HTML5, the language of the Web, which Mozilla hopes will make it easier for third party developers to produce apps.  With HTML5 integrated onto an open source operating system, there's definitely a possibility that Firefox could catch on with that crowd, although it remains to be seen if the software has the performance or longevity to make a splash.

'Kill switch' on smartphones takes a step forward

Federal prosecutors want kill switches on smartphones as part of the Secure Our Smartphones initiative

A call by federal prosecutors for phone manufacturers to install a "kill switch" to discourage smartphone theft has taken a step forward, with Apple and Samsung providing handsets whose security features will be put to the test.

As part of the "Secure Our Smartphones" initiative announced by U.S. prosecutors and other groups in June, phone makers are being asked to find technological solutions to prevent smartphone theft. U.S. law enforcement is dealing with growing crime -- including murder -- related to smartphone theft, especially iPhones, and one of the ideas put forward was the installation of kill switches to disable smartphones completely.

As part of the SOS initiative, Apple will provide an iPhone 5 with the "Activation Lock" enabled, while Samsung will provide a Galaxy S4 smartphone with the LoJack for Android feature. The smartphones will be tested for security features and attempts will be made to circumvent the anti-theft features.

The prosecutors expect smartphones with kill switches to be released by early 2014, and discussions about the initiative have been held with Apple, Google, Samsung and Microsoft. The SOS initiative is also backed by state officials, police chiefs, district attorneys, attorneys general and consumer advocacy groups.

Apple's "Activation Lock" feature in iOS 7 requires an iPhone owner to enter a username and password to enable a locked or wiped phone. The feature is intended to make it difficult to resell a lost or stolen iPhone.

It is estimated that about 1.6 million people were victims of smartphone theft in the U.S. last year. Around 30% to 40% of all robberies are smartphone theft, according to the U.S. prosecutors.

BYOD - Bring your own disaster

According to the latest Mobiquant research BYOD is becoming a standard policy in a large number of companies. Although security of mobile devices is still a main problem for employers. Research confirms that BYOD is one of the main trends and challenges for entrepreneurs.
Companies wondering whether allow employees bring their own mobile devices to work can now stop asking that question. If proper security solution are applied, BYOD can give them an advantage over the competition by strengthening innovations and creativity in the workplace and reducing overall costs of an organization. Establishing cooperation with IT security partner who understands how important it is to provide proper security level for the whole network allows enterprises to gain benefits from BYOD process and protects them from drowning in the onslaught of information.
Primary feature of BYOD is a wide range of mobile devices, technologies and software what may cause problems with providing consistent and hermetic security system. Therefore, it is essential to introduce and implement an integrated security policy - at this point companies also have to control and monitor activity on mobile devices and prevent any internal information leakage.
From the point of view of an employer, data security should be a key feature of BYOD. Every organization decided to encourage employees to use private devices should take care of rational and functional security policy including:
  • list of devices that use the company network along with assigned users and their user access level to the enterprise data
  • data storage rules and the terms of downloading data on employees’ mobile devices
  • procedures in case of a theft, loss and termination of the contract with an employee that will allow to erase company’s data from a mobile device
  • terms and procedures for operating systems and software update
  • requirements for password usage.
80% of enterprises allows their employees to use their private mobile devices for work. Over 50% of the companies reports cases of data theft and security breaches. What is more shocking, all cases are connected with access to the network from private mobile devices of employees.
Taking into account that over 50% of employees are using they private devices for work, Mobiquant Technology research shows that over a half of companies from Media, Technology and Telecommunication sectors are not investing enough resources in their mobile fleet security. BYOD policy is advantageous and can bring considerable gains but companies introducing this policy should remember that without tailor-made security procedures it can do more harm than good as far as data protection is concerned.

Tuesday, February 26, 2013

interview-de-reda-zitouni-par-mobiquant_6.html


Le MDM est incontestablement un nouvel axe stratégique pour les entreprises. La mise en place d’un projet de mobilité ne peut souffrir d’une gestion de la sécurité approximative voire absente. Il est donc utile de bien structurer sa démarche projet et d’adopter de bonnes pratiques. Nous allons aborder ces dernières dans une série d’articles d’Opinion et débuter cette initiative avec une première analyse sur l’importance de la maîtrise des terminaux utilisés par les collaborateurs.


La suite de l article: http://www.globalsecuritymag.fr/Reda-Zitouni-fondateur-de,20130223,35629.html

Wednesday, February 20, 2013

Mobiquant Technologies: Il est impossible de pirater l'iPad de Barack Obama...



Ce n'est un secret pour personne, Barack Obama est un fan des produits Apple. Et pour ces activités de ''Mister Président'', l'iPad est un outil de travail, dont il ne se sépare jamais.

Sa tablette est toutefois différente du modèle que nous pouvons avoir nous même. L'iPad est en effet dépourvu des capteurs photo, du réseau 3G et Wi-Fi.

Lire la suite sur Next 51:


http://www.mobiquant.com/fr/actualites/mobiquant-technologies-il-est-impossible-de-pirater-l-ipad-de-barack-obamahttp://www.mobiquant.com/fr/actualites/mobiquant-technologies-il-est-impossible-de-pirater-l-ipad-de-barack-obama

HACK: Une méthode pour déverrouiller un iPhone sous iOS 6.1



Critiqué depuis une semaine, le système d'exploitation mobile fait de nouveau parler de lui avec l'apparition d'une méthode pour accéder aux données de l'iPhone en contournant le verrouillage du smartphone. Apple a promis un correctif. Il existe un moyen d'avoir accès à plusieurs données privées sur un iPhone sous iOS 6.1, même si le smartphone est verrouillé par un code. Cette méthode a commencé a circulé hier matin. Une vidéo sur YouTube est disponible depuis le 31 janvier dernier.

http://www.mobiquant.com/fr/actualites/hack-une-methode-pour-deverrouiller-un-iphone-sous-ios-6-1

Saturday, February 9, 2013

Mobiquant publie son livre blanc : Le MDM ne suffit pas ou quand la sécurité mobile n est pas un gadget !

http://www.mobiquant.com/fr/actualites/mobiquant-publie-son-livre-blanc-le-mdm-ne-suffit-pas-ou-quand-la-securite-mobile-n-est-pas-un-gadget

Monday, February 4, 2013

Les webinars de Mobiquant : prochain le 07.02.2013


Mobiquant organise des webinars sur les thèmes du mobile device management et du mobile device security. Pour plus de renseignement, contactez nous directement à travers notre page dédié : Webinar.

Mobiquant augmente sa présence sur la toile


Mobiquant, leader de la sécurité des terminaux mobile, ou mobile device management, a été à de nombreuses reprises cités par les médias pour la qualité de son offre.

Nous revenons sur les articles qui font notre succès :

Mobiquant renforce son mode de distribution indirect
21 janvier - Actionco
22 janvier - Sécurité DSIsionnel
23 janvier - Global Security Mag
28 janvier - BFM TV

Par ailleurs, Mobiquant sort son livre blanc à la disposition des décideurs informatiques.

Friday, February 1, 2013

Mobiquant recrute des intégrateurs

Mobiquant Technologies est le leader des plateformes de gestion et de sécurisation des terminaux mobiles en Europe. Ses solutions ont reçu plusieurs prix de l'innovation.

Mobiquant souhaite s'entourer d'intégraturs français et internationaux pour distribuer ses produits. Dans le cadre de ses recrutements, il met à la disposition de ses partenaires un programme d'accompagnement (Global Alliance Partner Program), différentes formations, un extranet, ainsi qu'un ensemble d'outils d'aide à la vente. Mobiquant privilégie les hébergeurs, SSII et intégrateurs sensibles aux problématiques de la sécurité et de la mobilité. Le programme de certification s'appuie sur trois niveaux : Silver, Gold, Platinium

Reda Zittouni, PDG de Mobiquant, commente cette annonce : " Notre channel nous permet de nous positionner rapidement auprès de nouvelles entités et d'offrir aux utilisateurs des technologies de gestion et de sécurisation de terminaux mobiles de pointe."

Thursday, January 31, 2013

Chinese hackers break into the New York Times, steal every employee's password

The New York Times has reported that for the last four months Chinese hackers have been infiltrating its networks, broken into the email accounts of senior staff, stolen the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees.

According to the report, the first attack came in mid-September 2012 as the newspaper prepared to publish an investigation into the family of Chinese prime minister Wen Jiabao, who are said to have accumulated billions of dollars through business dealings.
Malware was planted on users' computers which opened backdoors for the hackers to gain remote access to connected systems - including a domain controller that contained usernames and hashed passwords for all of the New York Times' employees.

Read more informations.