Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Top Stories > CYBER ADAPT RELEASES CLOUD-BASED MOBILE SECURITY PLATFORM
    Top Stories

    CYBER ADAPT RELEASES CLOUD-BASED MOBILE SECURITY PLATFORM

    Published by Gbaf News

    Posted on November 11, 2016

    6 min read

    Last updated: January 22, 2026

    This image illustrates the rise in UK gas production by 26% in H1 2022, emphasizing the country's shift towards energy independence in response to global events.
    Gas production growth in the UK highlights energy independence amid global tensions - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Cyber adAPT 2.0: Round-Trip Security for Mobile and IoT Now Available As A Secure Cloud Service

    Cyber adAPTä today announced the introduction and availability of an industry-first cloud-based solution that provides mobile device security, attack detection, and automated remediation for devices outside of the core network.

     The risk of catastrophic outcomes from unsecure devices is becoming a weekly cover story. Juniper Research says that we will see 160 TRILLION messages transmitted annually by mobile and Internet of Things (IoT) technologies as early as 2019.[1] Cyber adAPT continues to deliver comprehensive security to federated enterprises that manage the risk of countless devices connecting to their network.

     A simple, three-click enrollment process now enables this “round-trip” security:

    1. Secures network communications with advanced device traffic encryption and authentication.
    2. Detects malware and anomalous network traffic in real-time.
    3. Pin-points precise users and devices that activate each attack alarm.
    4. Triggers immediate action to ensure compromised devices are isolated by automatic quarantine or wipe.
    5. Provides detailed forensic clarity to security analysts, allowing the fastest possible manual response.

    With this new release, more devices and more operating systems can be protected and enabled within seconds, without hardware being shipped or software installed. Cyber adAPT is now available in a 100% virtualized environment – meaning all deployment options are now open to the security architects:  multi-tenant cloud service, private cloud and hybrid solutions, a virtual machine delivered onto the client’s infrastructure, and the dedicated Cyber adAPT appliance.

    “Cyber adAPT brings customers visibility and control, something they have yet to experience from a security platform that focuses on behavior outside of the traditional ‘core network’,” says Michael Weinberger, senior vice president of product development at Cyber adAPT.

     “Imagine having a brand new Ferrari in the driveway that you are scared to drive at any speed because you can’t see through the warped windshield. That’s what it’s like for many chief information security officers (CISOs) who feel they have to hold back on the mobile-throttle because they have no way of detecting and isolating dangerous traffic that flies past.”

     Many companies have made initial progress enabling users and devices in the field, outside of the core network. Tools such as mobile device management (MDM) and the wider enterprise mobility management (EMM) provide a degree of control and data access, but are woefully short of being a secure solution.

     Reluctance to deploy genuine security can be down to an underestimation of the ease and impact of an attack. Adversaries that target entry through an unsecured device like a smart phone can cause more damage, more quickly than through attack surfaces behind the protection of the traditional perimeter.

     Even when this threat is understood, the perceived mitigation requirements of cost, infrastructure, management overhead and user experience can be overwhelming. Cyber adAPT’s new cloud service has been released to combat this issue directly.

     Cyber adAPT now offers:

    • Highest-grade security for data processing in a software as a service (SaaS) environment.
    • No on-premises hardware required means lower cost and even faster protection.
    • Full virtualization brings flexibility to react quickly to customer needs.
    • Deployment options and low cost entry models including Amazon Web Services and Azure.
    • Supports trial and pilot customers by providing simple, ring-fenced environments.

    Cyber adAPT 2.0: Round-Trip Security for Mobile and IoT Now Available As A Secure Cloud Service

    Cyber adAPTä today announced the introduction and availability of an industry-first cloud-based solution that provides mobile device security, attack detection, and automated remediation for devices outside of the core network.

     The risk of catastrophic outcomes from unsecure devices is becoming a weekly cover story. Juniper Research says that we will see 160 TRILLION messages transmitted annually by mobile and Internet of Things (IoT) technologies as early as 2019.[1] Cyber adAPT continues to deliver comprehensive security to federated enterprises that manage the risk of countless devices connecting to their network.

     A simple, three-click enrollment process now enables this “round-trip” security:

    1. Secures network communications with advanced device traffic encryption and authentication.
    2. Detects malware and anomalous network traffic in real-time.
    3. Pin-points precise users and devices that activate each attack alarm.
    4. Triggers immediate action to ensure compromised devices are isolated by automatic quarantine or wipe.
    5. Provides detailed forensic clarity to security analysts, allowing the fastest possible manual response.

    With this new release, more devices and more operating systems can be protected and enabled within seconds, without hardware being shipped or software installed. Cyber adAPT is now available in a 100% virtualized environment – meaning all deployment options are now open to the security architects:  multi-tenant cloud service, private cloud and hybrid solutions, a virtual machine delivered onto the client’s infrastructure, and the dedicated Cyber adAPT appliance.

    “Cyber adAPT brings customers visibility and control, something they have yet to experience from a security platform that focuses on behavior outside of the traditional ‘core network’,” says Michael Weinberger, senior vice president of product development at Cyber adAPT.

     “Imagine having a brand new Ferrari in the driveway that you are scared to drive at any speed because you can’t see through the warped windshield. That’s what it’s like for many chief information security officers (CISOs) who feel they have to hold back on the mobile-throttle because they have no way of detecting and isolating dangerous traffic that flies past.”

     Many companies have made initial progress enabling users and devices in the field, outside of the core network. Tools such as mobile device management (MDM) and the wider enterprise mobility management (EMM) provide a degree of control and data access, but are woefully short of being a secure solution.

     Reluctance to deploy genuine security can be down to an underestimation of the ease and impact of an attack. Adversaries that target entry through an unsecured device like a smart phone can cause more damage, more quickly than through attack surfaces behind the protection of the traditional perimeter.

     Even when this threat is understood, the perceived mitigation requirements of cost, infrastructure, management overhead and user experience can be overwhelming. Cyber adAPT’s new cloud service has been released to combat this issue directly.

     Cyber adAPT now offers:

    • Highest-grade security for data processing in a software as a service (SaaS) environment.
    • No on-premises hardware required means lower cost and even faster protection.
    • Full virtualization brings flexibility to react quickly to customer needs.
    • Deployment options and low cost entry models including Amazon Web Services and Azure.
    • Supports trial and pilot customers by providing simple, ring-fenced environments.
    More from Top Stories

    Explore more articles in the Top Stories category

    Image for Lessons From the Ring and the Deal Table: How Boxing Shapes Steven Nigro’s Approach to Banking and Life
    Lessons From the Ring and the Deal Table: How Boxing Shapes Steven Nigro’s Approach to Banking and Life
    Image for Joe Kiani in 2025: Capital, Conviction, and a Focused Return to Innovation
    Joe Kiani in 2025: Capital, Conviction, and a Focused Return to Innovation
    Image for Marco Robinson – CLOSE THE DEAL AND SUDDENLY GROW RICH
    Marco Robinson – CLOSE THE DEAL AND SUDDENLY GROW RICH
    Image for Digital Tracing: Turning a regulatory obligation into a commercial advantage
    Digital Tracing: Turning a regulatory obligation into a commercial advantage
    Image for Exploring the Role of Blockchain and the Bitcoin Price Today in Education
    Exploring the Role of Blockchain and the Bitcoin Price Today in Education
    Image for Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Image for Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Image for PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    Image for A Notable Update for Employee Health Benefits:
    A Notable Update for Employee Health Benefits:
    Image for Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Image for Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Image for ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    View All Top Stories Posts
    Previous Top Stories PostFIRST CROSS-BORDER REWARDS PLATFORM UTU LAUNCHES, AIMS TO RE-IMAGINE THE LOYALTY ECOSYSTEM
    Next Top Stories PostCITY FINANCIAL APPOINTS LOU THORNE AS GLOBAL CHIEF OPERATING OFFICER