Hi @_Val_ and @Ed_Gonzalez and @Pamela_S__Lee
Interesting sales material but also having some technical aspect in it.
I had the possibility to test the app for a trial of 30 days on my mobile phone last year during my summer vacation.
Through this trial Sandblast Mobile was showing “GREEN” equal everything is all right. I did not experience any untrusted trying to do man-in-the-middle attack or if I had downloaded any malicious application or accessing any websites running hidden scripts to install any incriminating software.
Well I know this is good and I think it is also good that I did not experience any “RED” alerts because then it’s bad.
I totally understand the Sandblast Mobile idea and why one needs to cover this attack vector too whether it's in healthcare or any organisation. Me too have implemented it in our the organization too.
I haven’t yet found any or read or seen any PoC were it actually did prevent an attack and any actual breach report where Sandblast Mobile was involved in a data breach and prevented the attack.
I could image companies using WhatsApp and being vulnerable with the latest hack; The NSO WhatsApp Vulnerability. Attackers only need to issue specially crafted VoIP calls to the victim in order to infect it with no user interaction required for the attack to succeed. As WhatsApp is used by 1.5bn people worldwide, both on Android phones and iPhones, the messaging and voice application is known to be a popular target for hackers and governments alike.
Do you have any stories from the CIRT and CPR team where did prevent attack in this mobile vector?
I know Check Point are inviting people to Usertalks and they can hear real user stories but don’t you have any stories available online?
Any are one able to send logs to a centralized log server on-premise?
Best Regards
Kim