EZShield launches Mobile Defense Suite

EZShield protects Personally Identifiable Information (PII) through the Mobile Defense Suite.

“Mobile devices positively influence and impact our personal and business lives, but they are also a gateway to identity theft and corporate data breaches,” said Rich Scott, Chief Commercial Officer at EZShield + IdentityForce. “Today, we are redefining how we all think about identity protection. And, how Information Technology (IT) and Information Security (InfoSec) stakeholders can further pave the way to drive and defend mobile-first cultures.”

EZShield is extending the value of ID theft protection to IT and InfoSec teams. This is achieved through Mobile Defense Suite’s ability to provide visibility into mobile devices accessing the network, alerting both the individuals and the enterprise of threats that may warrant further action. The Mobile Defense Suite arms all audiences with the power to thwart digital and cyber threats by delivering peace-of-mind for individuals and empowering organizations to protect against a potential security incident or data breach.

“By embracing a new, powerful combination of identity theft protection with mobile security – where previously protecting mobile devices was only seen through the lenses of vulnerability management, anomaly detection, and intrusion prevention – EZShield is delivering on its promise to safeguard the entire individual identity digital footprint,” Scott added.

EZShield’s Mobile Defense Suite focuses on four key components to mitigate threats both for the individual digital footprint and the enterprise through:

  • A mobile app | Providing anywhere, anytime access to all the monitoring and reporting behind protecting an individual’s personal information and identity.
  • Mobile attack control | A newly built solution from EZShield, which signals through device scanning if an individual’s mobile device has been compromised. These threats may include rogue applications, spyware, and alerting around unsecured Wi-Fi connections (another way to distribute malware) and even fake networks (i.e., network spoofing).
  • Mobile attack view | An enterprise dashboard for IT and InfoSec teams provides a single-source view of mobile threats to your customer or employee population accessing your network that may need action in order to lock down specific devices and identify a potential security risk or incident.
  • Mobile attack recovery | Provides consumers and individual users with steps for remediation and restoration if an incident does lead to an identity theft event.



Share this