Zimperium

Two people discussing what's shown on a tablet screen

Protect customer data, your brand reputation and your bottom line

The Zimperium Intrusion Protection System (zIPS™) is a mobile application built from the ground up to protect your iOS and Android devices. Seamlessly running in the background of your device, it detects security threats as they occur and warns your users quickly.

Zimperium logo

Key features

Dynamic threat detection

Monitor the whole of your device for malicious behavior and dynamically detect known and unknown device, network and application threats with the on-device z9™ detection engine.

Machine learning threat analysis

The zIPS solution uses machine learning to analyse changes in device behavior to accurately identify specific types of attacks and classify zero-day vulnerabilities.

Quickly secure your devices

The zIPS app provides fast incident-response recommendations to users when malicious activity is discovered to comprehensively protect corporate or employee-owned devices.

Benefits

man teaching to classroom of students on computers

Improved visibility of your device security

Your security team has the ability to monitor and manage your fleet of mobile devices from a dynamic threat dashboard, so you improve visibility and automate your response to threats.

Presentation in office

Get deeper security understanding

Benefit from deeper security insights from network, device and malware forensic data, so your security team understands the who, what, where, when and how of a threat.

man using calculator

Protect your business

Feel confident that your users are secure by defining policies to protect your organisation and implementing them when you are attacked.

How it works

The app runs in the background of mobile devices, detects security threats and warns end users when ​a security threat is detected. Threats can come from many angles and typically take the form of:​

Application based threats – ​(for example, malware) or​

Network based threats – (for example, ​‘man-in-the-middle’ attacks) or​

Device based threats – (for example, ​elevated device privileges).​

These can put both device and sensitive data at risk. When integrated with the Telstra Mobile Device Management platform (T-MDM) and installed on devices, end users can embrace mobile working ​and IT teams can have confidence that corporate information is safer and better protected.​

Workflow diagram for Zimperium solution

Frequently asked questions

Why Telstra?

null alt

Security Intelligence

Get integrated, end-to-end visibility of your mobile devices for a faster, more coordinated response to security threats.

null alt

Simplifying security management

We make protecting your business easy with a range of security features and services, so you get the security you need at the right price.

null alt

Benefit from the best of global technology

Telstra partners with leading security providers to make sure your business gets the best the industry has to offer.

Getting started

null alt

Request a call back

Register here and we'll get back to you.

Register here

null alt

Find a customer contact expert

Get in touch with the right expert for you.

Find an expert here

Get support

Get help and answers to your questions

Get support here