{"id":79637,"date":"2018-06-14T13:30:06","date_gmt":"2018-06-14T20:30:06","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=79637"},"modified":"2019-05-08T13:30:27","modified_gmt":"2019-05-08T20:30:27","slug":"introducing-traps-android","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2018\/06\/introducing-traps-android\/","title":{"rendered":"Introducing Traps for Android"},"content":{"rendered":"<p>In March, we announced Traps 5.0 and the Traps management service, a cloud-based service designed to simplify administration and management of your endpoint security. One of the benefits of the Traps management service is the ability to innovate and introduce new features, faster. Today, we are excited to announce the Traps for Android client.<\/p>\n<p>In 2017, global mobile subscriptions reached a total of 7.8 billion. By 2023, there will be more than 30 billion connected devices, including 20 billion IoT devices. Cybercriminals have taken note of this massive growth and turned their malicious activity toward mobile and IoT devices and networks, as well as accelerated their development of Android-based malware. Considering <a href=\"https:\/\/www.statista.com\/statistics\/266219\/global-smartphone-sales-since-1st-quarter-2009-by-operating-system\/\" rel=\"nofollow,noopener\" >85 percent of new mobile devices sold worldwide are Android-based<\/a>, and there are more vulnerabilities in the Android ecosystem than ever, it\u2019s no surprise Android has become a favorable target for malicious actors.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Traps for Android<\/span><\/p>\n<p>The new Traps app for Android extends malware detection and prevention to Android endpoints. Traps for Android leverages both local analysis and threat intelligence from WildFire to detect and prevent malware from running. The Traps app enforces security policies to determine whether to block known malware and unknown files, as well as perform local analysis to determine the likelihood an unknown file is malware. Administrators have additional controls to allow or block unknown apps before Traps receives an official verdict for the app.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"306\"><span class=\"ar-custom\" style=\"padding-bottom:178.1%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-79640 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_1.png\" alt=\"android_1\" width=\"306\" height=\"545\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_1.png 306w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_1-230x410.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_1-168x300.png 168w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_1-22x40.png 22w\" sizes=\"auto, (max-width: 306px) 100vw, 306px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Traps for Android can also optionally submit the unknown apps to the Traps management service for in-depth analysis by WildFire. From the Traps management service, you can monitor the health of the Traps app and view details about security events that occur on the Android endpoints in your organization. Traps for Android is supported on Android 4.4 and later releases.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:43.17%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-79679 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2.png\" alt=\"android_2\" width=\"600\" height=\"259\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2.png 974w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2-230x99.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2-768x331.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2-500x216.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2-510x220.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2-93x40.png 93w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2-650x280.png 650w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/div><\/p>\n<p><strong>Why is this important?<\/strong><\/p>\n<ul>\n<li>In 2017, global mobile subscriptions reached a total of 7.8 billion and are expected to reach 10 billion by 2023.<\/li>\n<li>90 percent of new mobile devices sold are Android-based, and as there are more vulnerabilities in the ecosystem, it is the favorite target for malicious actors.<\/li>\n<li>Despite protections and controls implemented by Google, malicious Android samples sent to WildFire have increased 101 percent between 2016 and 2017.<\/li>\n<\/ul>\n<p>Palo Alto Networks recently released a report that presents in-depth research findings and dives into the threat landscape specific to mobile devices. Download the \u201c<a href=\"http:\/\/go.paloaltonetworks.com\/riding-network\">Look What\u2019s Riding Your Network<\/a>\u201d report to learn more about mobile-based threats.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-endpoint\/traps\">Learn more about Traps advanced endpoint protection<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introducing Traps for Android: detection and prevention to Android endpoints.<\/p>\n","protected":false},"author":483,"featured_media":79718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598,6717,6765],"tags":[603,172,4078,383,778],"coauthors":[5049],"class_list":["post-79637","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint-2","category-products-and-services","category-secure-the-enterprise","tag-advanced-endpoint-protection","tag-android","tag-endpoint-protection","tag-endpoint-security","tag-traps"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/06\/android_2_blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/79637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/483"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=79637"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/79637\/revisions"}],"predecessor-version":[{"id":79760,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/79637\/revisions\/79760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/79718"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=79637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=79637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=79637"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=79637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}