Mobility, News

Digital Shadows expands offering for mobile threat reponse

Digital Shadows has announced new enhancements to its SearchLight digital risk management service helping organisations detect and respond to mobile application threats against their employees and consumers.

Alastair Paterson, Digital Shadows
Alastair Paterson, Digital Shadows

According to the company, SearchLight now offers identification of malicious and unsanctioned applications in official and third-party application stores. This new capability also identifies impersonated or spoofed mobile applications that could damage an organisations’ brands or compromise sensitive information. The new capability around mobile application protection extends the capabilities of Digital Shadows’ flagship service which monitors the Internet to identify digital risks to organisations, including cyber threats, data leakage, and reputational risks.

“Mobile is no longer a niche or isolated part of an organisations’ digital footprint. New devices and applications are the status quo and organisations must be able to identify the digital risks associated with them,” said Alastair Paterson, CEO and co-founder, Digital Shadows.

“But we know that a large percentage of mobile applications will fail basic security tests and this digital risk presents enterprises everywhere with brand protection and data risk threats. In an increasingly mobile-first world, our customers now have the ability to precisely account for evolving threats jeopardising irreplaceable reputations and information.”

Digital Shadows has been trialing the new service with some key clients and within one week, for just one financial services client, we identified 39 incidents of mobile applications posing a risk to their organisation.

With Digital Shadows’ mobile application monitoring, customers can detect a wide range of threats including: Suspect application behaviour and code, such as self-signed certificates or the presence of malware; versions of application that have been modified by a third-party; copies of application on stores that are not actively managed; impersonating or spoof application that mimic brands and affiliate links that mislead or confuse users. Monitoring even extends beyond customer mobile application, to internal company mobile apps.

Last year, the US Federal Trade Commission warned that ‘as more consumers are shopping with mobile apps, fraudsters are following the money. There are fake phone apps popping up that impersonate well-known retailers to steal your personal information. Their names were like well-known brands, and their descriptions promise enticing deals or features.

Updates to SearchLight and Digital Shadows’ capabilities include enhanced features such as mobile app monitoring, asset registration of mobile apps and improved dashboard for executives and security teams.


Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.


The free newsletter covering the top industry headlines