Get a demo

As a cybersecurity company, we care deeply about your privacy. We make every reasonable effort to safeguard your personal information. Only authorized individuals may access it, and all access attempts are logged and tracked. We do not, under any circumstances, sell your personal information to third parties.

We cannot access your personal data. We cannot access your cookies, your web history, or any of your device’s contents (e.g., your pictures, your email messages, your texts, your contacts, your call history - we can’t access any of it).

Personal information

We collect and store the following personal information for the explicit purpose of delivering the mobile threat detection service:

  • First name
  • Last name
  • Email address

Device data 

Note: Device data is not tied to personal identifiers.

From https://www.zimperium.com/zimperium-eula/:

Device Data collected may include but is not limited to the following:

  • The manufacturer and model of your device
  • Certain technical settings of your device, including the display size of your device and firmware version
  • Your IP address (which can indicate your country and geolocation)
  • Wireless carrier for your device
  • The type and version of operating system on your device
  • Certain configuration data of your device, such as whether your device is configured to allow root access or whether hardware restrictions of the device have been removed
  • In some cases, metadata of all applications installed on your device (including, but not limited to, the name of the app, the version of the app)
  • Metadata about networks your device connects to (including, but not limited to, the SSID of the network)
  • In certain circumstances, we may also collect a copy of the application
  • URLs or domains of links which may be derived from End User policies
  • Data from tracking tools used to analyze product performance on your device
  • System monitoring data such as memory utilization, process metrics, network statistics (but no data like web pages or emails), and other non-user-identifiable type monitoring values.

App runtime permissions

NOTE: Because of differences between iOS and Android development, the specific permissions requested at runtime are unique to the operating system.

Upon installation, the app requests the following permissions on your device:

iOS - RUNTIME PERMISSIONS

     

PERMISSION

REQUIRED?

PERSISTENCE

PURPOSE

Camera access

N

N/A

QR code scanning

Notification

Y

App's lifetime

Alerting user to potentially harmful activity & on-device responses

Local Wi-Fi Network Permission

Y

When threat occurs

Protection from Wi-Fi based attacks

Location

Y

App's lifetime

Obtain SSID and BSSID of the current Wi-Fi connection

VPN Link Verification permission

For phishing assistance: Y

When threat occurs

Phishing link verification

Android - PERMISSIONS      

PERMISSION

REQUIRED?

PERSISTENCE

PURPOSE

Camera access

N

N/A

QR code scanning

Notification

Y

App's lifetime

Alerting user to potentially harmful activity & on-device responses

Location

Y

App's lifetime

Obtain SSID and BSSID of the current Wi-Fi connection

VPN Link Verification permission

For phishing assistance: Y

When threat occurs

Phishing link verification

Battery Optimization

N

App's lifetime

Adds app to Android battery optimization exemption list; permits notifications

Device Storage

Y

App's lifetime

access your device storage areas

In the event of a cybersecurity incident, we record forensic data at the time of attack. The sections below describe the exact details of what we collect when a threat is detected.

Data collected for both Android and iOS devices

Location Data Detection Information

Location: 

  • Street

Device Data Detection Information 
Operating System: The operating system loaded on the device.

Model: The manufacturer and model of the device
IP Address: The IP address for the device.

Network Data Detection Information


Connection Details

  • SSID: device shows the network name (SSID) of the connected network.
  • BSSID: device shows the BSSID of the connected network
  • External IP Address: External IP address for the user’s device.
  • Gateway IP address: Gateway IP address for the user’s device.
  • Gateway MAC address: MAC address for the gateway for the user’s device.
  • Nearby Wi-Fi networks: device shows the network name (SSID) and BSSID of the nearby wi-fi networks.
  • ARP table of the device: This includes all local hosts in the LAN that interacted with the device.
  • Route table of the device: This includes every IP the device contacted with the default gateway for each one.
  • Carrier Information: Name of the carrier.
  • Attacker network details including IP and MAC addresses: IP address and MAC address of the attacker’s device.

App Data Detection Information

Application Forensics: 

The application forensics information is sent from the device only when an application threat is detected (for example, the developer name for the sideloaded app detected on the device).

Android-specific Detection Data

Device Data Detection Information

This device data is sent for Android devices:

Running Processes: The list of processes currently running on the device. (Optional) o Running Android services on the device.

App Data Detection Information

This app data is sent for Android devices:

  • Application Binaries: The application binaries are collected and sent.
    • Upload unknown APKs via Wi-Fi for app analysis.
  • Application Inventory: The application inventory information is collected and sent
    • List of applications installed on the Android device.