End-User Privacy and Mobile Security Coexist in Q-Scout

End-User Privacy and Mobile Security Coexist in Q-Scout

By Greg Tavarez

The use of personal devices to conduct business creates a cause for concern among employers and employees, even in this “work from anywhere” world. Employers and their security teams fear unauthorized devices accessing corporate resources that can potentially result in a data breach. At the same time, end users fear private information from personal devices being leaked out to the company.

Mobile security and privacy solutions company Quokka believes end-user privacy and mobile security can – and should –  coexist in a secure BYOD network, so it launched Q-Scout to provide proactive, privacy-first protection to individuals and businesses.

Operating in the cloud with zero intrusion into personal data, Q-Scout leverages an AI-based deep analytics model based to identify emerging vulnerabilities in near real time. Q-Scout features three main components.

The mobile app is the first. It informs end users about the security and privacy risks on their devices with ways to remediate these risks before anything bad happens.

The enterprise portal for administrators allows the enterprise’s IT or security team to create, manage and enforce corporate security policies, alert end users about non-compliance and policy/behavioral failures and oversee the security posture of the fleet.

Third the security and data broker analyzes mobile devices in the enterprise fleet and the apps on those devices, communicates with the end-user devices and the enterprise portal, keeps end-user personal information private, alerts the enterprise of at-risk devices and maintains an inventory of the risks and compliance.

Here is an example. In a business scenario, someone is conducting business on a personal device that is non-compliant with corporate security policies. Q-Scout will send out an alert to the end user with instructions on how to fix the issue. Simultaneously, a message is sent to the enterprise portal to block the risky device from accessing corporate resources until the device has been made compliant.

“Q-Scout helps people strengthen their security position while maintaining user privacy, creating peace of mind for the businesses, communities and individuals taking part in an unprecedented digital convergence,” said Dana Waldman, CEO of Quokka, formerly Kryptowire.

Quokka’s solution removes the device and application security enigma by identifying which apps are vulnerable to security events, which permissions expose them to data leaks, which data is being collected and where it is being sent. Q-Scout’s patented proactive remediation engine takes practical and easy steps to mitigate risks, keeping users safe, happy and secure in today’s digital world.




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

MSPToday Editor

SHARE THIS ARTICLE
Related Articles

ICYMI: News Around the MSP Industry

By: Greg Tavarez    5/17/2024

Here are a few articles compiled into one for readers interested in developments around the MSP space.

Read More

Wildix UK and Ireland Shake Up Leadership for Growth and Innovation

By: Greg Tavarez    5/16/2024

Wildix announced a strategic leadership transition designed to propel the company's market growth.

Read More

Are Resellers Leaving Money on the Table?

By: Special Guest    5/16/2024

The expert and correct installation of network infrastructure and other components is crucial to every IT project's success, adding tangible value by …

Read More

Bitwarden's New Standalone App Makes Two-Factor Authentication Simple

By: Greg Tavarez    5/15/2024

Bitwarden recently launched a standalone app for two-factor authentication to protect online services and applications from unauthorized access.

Read More

Cyware Quarterback: The AI Playmaker for Advanced Security Operations

By: Greg Tavarez    5/15/2024

Cyware Quarterback is a user-friendly, AI-powered interface that streamlines security tasks for enterprise clients and security information sharing gr…

Read More