Appthority, the global provder of enterprise mobile threat protection, announced the product of close collaboration with Google to offer seamless integration of its mobile threat defense solution and managed Google Play. The new integrated solution enables enterprises to use Appthority Mobile Threat Protection (MTP) to easily ensure compliance with security, privacy and regulatory policies for apps deployed through managed Google Play on Android.

Enterprises can now set policy and enable Appthority MTP to automatically scan apps in managed Google Play to ensure those apps meet their compliance criteria. For example, the solution includes features to test for data leakage threats or vulnerabilities and privacy risks that might endanger compliance with the EU's new General Data Protection Regulation (GDPR) or other regulations.

Appthority MTP brings the benefits of automation and proactive risk management to security teams

Apps for employees

Businesses can now make smarter decisions about which apps to offer employees and safely and efficiently whitelist apps from managed Google Play for employee use on Android, including in BYOD deployments that use Android work profiles.

Appthority MTP brings the benefits of automation and proactive risk management to security teams setting and enforcing policies for their Android fleets. With the integration, businesses can automate the app vetting process directly in the tools used to configure managed Google Play, eliminating long bottlenecks and costly manual app security testing and approval. 

Appthority monitors apps

The integration gives companies granular abilities to write policies and specifically define the types of app threats they want to scan for before apps are approved for employee use. Companies write their policies once and, from that point forward, Appthority automatically monitors every app in their managed Google Play deployment and ensures that the apps available to employees comply with company requirements. Using Google's powerful recommendation engine, Appthority MTP can even suggest other apps for employee use that meet the company's security criteria.

Enterprises will also be able to test their internally developed apps for vulnerabilities and threats

"We're thrilled to collaborate with Google and integrate managed Google Play with the threat intelligence from our mobile threat defense solution" said Domingo Guerra, president and co-founder of Appthority. "Google has put a tremendous amount of thought and energy into making the Android Platform secure and enterprise friendly, while always protecting user privacy. Enterprises now can have additional peace of mind, knowing that the apps their employees use for work meet their company's security and compliance criteria." 

Vulnerabilities and threats

Enterprises will also be able to test their internally developed apps for vulnerabilities and threats. This is critical because many companies use third-party libraries and SDKs in their own apps which can inadvertently introduce vulnerabilities that put corporate data and employee privacy at risk and may cause them to run afoul of compliance regulations.

Find out about secure physical access control systems through layered cybersecurity practices.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...