End-User Privacy and Mobile Security Coexist in Q-Scout


End-User Privacy and Mobile Security Coexist in Q-Scout

By Greg Tavarez

The use of personal devices to conduct business creates a cause for concern among employers and employees, even in this “work from anywhere” world. Employers and their security teams fear unauthorized devices accessing corporate resources that can potentially result in a data breach. At the same time, end users fear private information from personal devices being leaked out to the company.

Mobile security and privacy solutions company Quokka believes end-user privacy and mobile security can – and should –  coexist in a secure BYOD network, so it launched Q-Scout to provide proactive, privacy-first protection to individuals and businesses.

Operating in the cloud with zero intrusion into personal data, Q-Scout leverages an AI-based deep analytics model based to identify emerging vulnerabilities in near real time. Q-Scout features three main components.

The mobile app is the first. It informs end users about the security and privacy risks on their devices with ways to remediate these risks before anything bad happens.

The enterprise portal for administrators allows the enterprise’s IT or security team to create, manage and enforce corporate security policies, alert end users about non-compliance and policy/behavioral failures and oversee the security posture of the fleet.

Third the security and data broker analyzes mobile devices in the enterprise fleet and the apps on those devices, communicates with the end-user devices and the enterprise portal, keeps end-user personal information private, alerts the enterprise of at-risk devices and maintains an inventory of the risks and compliance.

Here is an example. In a business scenario, someone is conducting business on a personal device that is non-compliant with corporate security policies. Q-Scout will send out an alert to the end user with instructions on how to fix the issue. Simultaneously, a message is sent to the enterprise portal to block the risky device from accessing corporate resources until the device has been made compliant.

“Q-Scout helps people strengthen their security position while maintaining user privacy, creating peace of mind for the businesses, communities and individuals taking part in an unprecedented digital convergence,” said Dana Waldman, CEO of Quokka, formerly Kryptowire.

Quokka’s solution removes the device and application security enigma by identifying which apps are vulnerable to security events, which permissions expose them to data leaks, which data is being collected and where it is being sent. Q-Scout’s patented proactive remediation engine takes practical and easy steps to mitigate risks, keeping users safe, happy and secure in today’s digital world.

Edited by Erik Linask

MSPToday Editor

Related Articles

Cyberattack Protection, Detection, and Recovery with SaaS

By: Greg Tavarez    11/23/2022

DataHawk from Cohesity is a data security SaaS solution that helps customers protect, detect and recover from cyberattacks and ransomware attacks.

Read More

Cloud Marketplace Innovator Pax8 Ranks 131 on the Deloitte Technology Fast 500

By: Juhi Fadia    11/23/2022

Pax8 has been named in the Deloitte Technology Fast 500 among the fastest-growing technology, media, telecommunications, life sciences, fintech, and e…

Read More

Arizona Department of Homeland Security Picks Tanium for Cybersecurity

By: Stefania Viscusi    11/22/2022

With a new, state-of-the-art cybersecurity solution from Tanium, AZDOHS is able to better share key information in real time, creating a stronger secu…

Read More

IT Teams Fall Short in Microsoft 365 Security Protections

By: Greg Tavarez    11/21/2022

A surprising number of enterprises have major gaps in the Microsoft security policies and practices, leading to unnecessary risks.

Read More

Phishing Attacks Sprout from Unexpected Places

By: Greg Tavarez    11/21/2022

Users more frequently click on phishing links that arrive through other channels, including personal websites and blogs, social media, and search engi…

Read More