{"id":676,"date":"2020-01-28T00:01:35","date_gmt":"2020-01-28T00:01:35","guid":{"rendered":"http:\/\/ec2-34-209-118-10.us-west-2.compute.amazonaws.com\/?page_id=676"},"modified":"2022-03-22T10:49:55","modified_gmt":"2022-03-22T17:49:55","slug":"protect-mobile-users","status":"publish","type":"page","link":"https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users","title":{"rendered":"Protect Mobile Users"},"content":{"rendered":"\n<style>\n\t#hero-banner-block_5e2f7ea48b063 > .block-wrap{padding-bottom:50px;}#hero-banner-block_5e2f7ea48b063 > .block-wrap{padding-top:50px;}#hero-banner-block_5e2f7ea48b063{background-image: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/04\/27140857\/Protect-mobile-users-hero-banner_042720.jpg);}@media only screen and (min-width:761px){#hero-banner-block_5e2f7ea48b063 > .block-wrap{padding-bottom:80px;}#hero-banner-block_5e2f7ea48b063 > .block-wrap{padding-top:80px;}#hero-banner-block_5e2f7ea48b063 .heading-wrap{max-width:60%;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"hero-banner-block_5e2f7ea48b063\" class=\"hero-banner alignwide\">\n\n\t<div class=\"block-wrap\">\n\n\t\t<div class=\"heading-wrap\">\n\n\t\t\t<h1 class=\"area-title h1\">Protect mobile users everywhere<\/h1>\n\t\t\t\t\t\t\t<p class=\"area-subheading\">Cisco Umbrella and AMP for Endpoints extend protection anywhere users go<\/p>\n\t\t\t\n\t\t\t\n\t<div id=\"_umbrella_hero_buttons69ec020308ffa\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<a class=\"button button-0  pass-query\" href=\"https:\/\/learn-umbrella.cisco.com\/ebooks\/secure-anywhere-protect-everywhere?utm_content=UMB-FY20-Q3-Content-Ebook-Secure-Anywhere-Protect-Everywhere\">Get the eBook<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n\n\t\t<\/div>\n\n\t\t\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#double-column-block_5e2fb1b5816c5 > .block-wrap{padding-bottom:50px;}#double-column-block_5e2fb1b5816c5 > .block-wrap{padding-top:50px;}#double-column-block_5e2fb1b5816c5{background-color:#f5f5f5;}#double-column-block_5e2fb1b5816c5,#double-column-block_5e2fb1b5816c5 p,#double-column-block_5e2fb1b5816c5 .h1,#double-column-block_5e2fb1b5816c5 .h2,#double-column-block_5e2fb1b5816c5 .h3,#double-column-block_5e2fb1b5816c5 .h4,#double-column-block_5e2fb1b5816c5 .h5,#double-column-block_5e2fb1b5816c5 .h6{color:#333;}#double-column-block_5e2fb1b5816c5 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_5e2fb1b5816c5 > .block-wrap{padding-bottom:0px;}#double-column-block_5e2fb1b5816c5 .text-area, #double-column-block_5e2fb1b5816c5 .image-area, #double-column-block_5e2fb1b5816c5 .form-area{padding-bottom:80px;}#double-column-block_5e2fb1b5816c5 > .block-wrap{padding-top:0;}#double-column-block_5e2fb1b5816c5 .text-area, #double-column-block_5e2fb1b5816c5 .image-area, #double-column-block_5e2fb1b5816c5 .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_5e2fb1b5816c5\" class=\"double-column alignwide align-items--\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"image-area one-half first bg-image\">\n\n\t<div style=\"background-image: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/04\/27144127\/Secure-users-anytime-background-image_042720.jpg);\"><\/div>\n\t\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--\">\n\n\t\n\t<div class=\"content-wrap align-self--\"><p><\/br><\/p>\n<h2>Security that never sleeps<\/h2>\n<p>When users are working remotely, antivirus is not enough to keep them safe. Signature detection and preventative measures are no match for today\u2019s advanced threats. You need to see an attack before it comes, instead of waiting to respond to it after it breaks through your perimeter and endpoints. You need always-on security that works everywhere your mobile users go, both on and off the corporate network.<\/p>\n<p><\/br><\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#double-column-block_5f0cf7860ffd3 > .block-wrap{padding-bottom:50px;}#double-column-block_5f0cf7860ffd3 > .block-wrap{padding-top:50px;}#double-column-block_5f0cf7860ffd3{background-color:#fff;}#double-column-block_5f0cf7860ffd3,#double-column-block_5f0cf7860ffd3 p,#double-column-block_5f0cf7860ffd3 .h1,#double-column-block_5f0cf7860ffd3 .h2,#double-column-block_5f0cf7860ffd3 .h3,#double-column-block_5f0cf7860ffd3 .h4,#double-column-block_5f0cf7860ffd3 .h5,#double-column-block_5f0cf7860ffd3 .h6{color:#333;}#double-column-block_5f0cf7860ffd3 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_5f0cf7860ffd3 > .block-wrap{padding-bottom:0px;}#double-column-block_5f0cf7860ffd3 .text-area, #double-column-block_5f0cf7860ffd3 .image-area, #double-column-block_5f0cf7860ffd3 .form-area{padding-bottom:80px;}#double-column-block_5f0cf7860ffd3 > .block-wrap{padding-top:0;}#double-column-block_5f0cf7860ffd3 .text-area, #double-column-block_5f0cf7860ffd3 .image-area, #double-column-block_5f0cf7860ffd3 .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_5f0cf7860ffd3\" class=\"double-column alignwide swap align-items--\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"text-area one-half first buttons-alignment--\">\n\n\t<h2 class=\"area-title h2 align-self--\">Security doesn\u2019t have to be complicated<\/h2>\n\t<div class=\"content-wrap align-self--\"><p>You need to be able to connect to the internet with confidence, on any device, anywhere. Learn how you can simplify security with a fast, easy to deploy solution that provides a safe way to secure users everywhere. Find out how you can block malware, ransomware, and phishing attacks before they strike your network.<\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--\">\n\n\t\n\t<div class=\"content-wrap align-self--\"><p><script src=\"https:\/\/fast.wistia.com\/embed\/medias\/ej5beocrjf.jsonp\" async><\/script><script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><span class=\"wistia_embed wistia_async_ej5beocrjf popover=true popoverAnimateThumbnail=true popoverContent=link\" style=\"display:inline;position:relative\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2021\/08\/09123637\/dns-layer-security-video-still.png\" alt=\"Watch the DNS-layer security video\" width=\"760\" height=\"428\" class=\"alignncenter drop-shadow size-full wp-image-56233\" srcset=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2021\/08\/09123637\/dns-layer-security-video-still.png 760w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2021\/08\/09123637\/dns-layer-security-video-still-300x169.png 300w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2021\/08\/09123637\/dns-layer-security-video-still-200x113.png 200w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2021\/08\/09123637\/dns-layer-security-video-still-400x225.png 400w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><a href=\"#\"><\/a><\/span><\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#double-column-block_5e2fb77f816c7 > .block-wrap{padding-bottom:50px;}#double-column-block_5e2fb77f816c7 > .block-wrap{padding-top:50px;}#double-column-block_5e2fb77f816c7{background-color:#f5f5f5;}#double-column-block_5e2fb77f816c7,#double-column-block_5e2fb77f816c7 p,#double-column-block_5e2fb77f816c7 .h1,#double-column-block_5e2fb77f816c7 .h2,#double-column-block_5e2fb77f816c7 .h3,#double-column-block_5e2fb77f816c7 .h4,#double-column-block_5e2fb77f816c7 .h5,#double-column-block_5e2fb77f816c7 .h6{color:#333;}#double-column-block_5e2fb77f816c7 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_5e2fb77f816c7 > .block-wrap{padding-bottom:0px;}#double-column-block_5e2fb77f816c7 .text-area, #double-column-block_5e2fb77f816c7 .image-area, #double-column-block_5e2fb77f816c7 .form-area{padding-bottom:80px;}#double-column-block_5e2fb77f816c7 > .block-wrap{padding-top:0;}#double-column-block_5e2fb77f816c7 .text-area, #double-column-block_5e2fb77f816c7 .image-area, #double-column-block_5e2fb77f816c7 .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_5e2fb77f816c7\" class=\"double-column alignwide align-items--\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"image-area one-half first bg-image\">\n\n\t<div style=\"background-image: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/04\/13105605\/International-documents-background-image_041320-.jpg);\"><\/div>\n\t\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--\">\n\n\t<h2 class=\"area-title h5 align-self--\">Case study<\/h2>\n\t<div class=\"content-wrap align-self--\"><h3 class=\"banner__heading\" data-reactid=\"144\">How Vicinity Centres protects their users<\/h3>\n<h4>\u201cNo matter where our employees work, we know they\u2019re protected when they\u2019re connecting directly to the internet, and we have full visibility into all the web traffic from Umbrella\u2019s secure web gateway.\u201d<\/h4>\n<h5><em>David Wang<\/em><br \/>\n<em>Network and Security Engineering Manager<\/em><br \/>\n<em>Vicinity Centres<\/em><\/h5>\n<\/div>\n\t\n\t<div id=\"_umbrella_columns_second_buttons69ec02030d174\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<style>\n\t\t\t\t\t\t#_umbrella_columns_second_buttons69ec02030d174 .button-0:not(:hover):not(:focus){color:#333333;}\t\t\t\t\t<\/style>\n\t\t\t\t\t\t\t\t<a class=\"check-link button-0  pass-query\" href=\"https:\/\/learn-umbrella.cisco.com\/case-studies\/vicinity-centres-customer-story\">Read the case study<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#double-column-block_5e2fb299816c6 > .block-wrap{padding-bottom:50px;}#double-column-block_5e2fb299816c6 > .block-wrap{padding-top:50px;}#double-column-block_5e2fb299816c6{background-color:#ffffff;}#double-column-block_5e2fb299816c6,#double-column-block_5e2fb299816c6 p,#double-column-block_5e2fb299816c6 .h1,#double-column-block_5e2fb299816c6 .h2,#double-column-block_5e2fb299816c6 .h3,#double-column-block_5e2fb299816c6 .h4,#double-column-block_5e2fb299816c6 .h5,#double-column-block_5e2fb299816c6 .h6{color:#333;}#double-column-block_5e2fb299816c6 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_5e2fb299816c6 > .block-wrap{padding-bottom:0px;}#double-column-block_5e2fb299816c6 .text-area, #double-column-block_5e2fb299816c6 .image-area, #double-column-block_5e2fb299816c6 .form-area{padding-bottom:80px;}#double-column-block_5e2fb299816c6 > .block-wrap{padding-top:0;}#double-column-block_5e2fb299816c6 .text-area, #double-column-block_5e2fb299816c6 .image-area, #double-column-block_5e2fb299816c6 .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_5e2fb299816c6\" class=\"double-column alignwide swap align-items--\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"text-area one-half first buttons-alignment--\">\n\n\t<h2 class=\"area-title h2 align-self--\">Avoid malware blind spots<\/h2>\n\t<div class=\"content-wrap align-self--\"><p>Sensitive data and applications have moved beyond the protection of the firewall and the data center. Perimeter security appliances and VPNs are not enough to protect your devices and data. And now you have more devices to protect than ever before, in more locations.<\/p>\n<p>Backhauling traffic to corporate is expensive, leading to an increase in more direct-to-internet connections for branch offices and mobile users. This creates more gaps in visibility and coverage for IT security professionals, and users are more likely to get infected with malware.<\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--\">\n\n\t\n\t<div class=\"content-wrap align-self--\"><p><img decoding=\"async\" src=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170349\/Blind-to-malware-illustration.png\" alt=\"Blind to malware illustration\" width=\"450\" height=\"auto\" class=\"aligncenter size-full wp-image-3687\" srcset=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170349\/Blind-to-malware-illustration.png 1362w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170349\/Blind-to-malware-illustration-300x257.png 300w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170349\/Blind-to-malware-illustration-1024x877.png 1024w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170349\/Blind-to-malware-illustration-768x657.png 768w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170349\/Blind-to-malware-illustration-1140x976.png 1140w\" sizes=\"(max-width: 1362px) 100vw, 1362px\" \/><\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#single-column-block_5e2fbaf2816c9 > .block-wrap{padding-bottom:12.5px;}#single-column-block_5e2fbaf2816c9 > .block-wrap{padding-top:50px;}#single-column-block_5e2fbaf2816c9{background-color:#f5f5f5;}#single-column-block_5e2fbaf2816c9,#single-column-block_5e2fbaf2816c9 p,#single-column-block_5e2fbaf2816c9 .h1,#single-column-block_5e2fbaf2816c9 .h2,#single-column-block_5e2fbaf2816c9 .h3,#single-column-block_5e2fbaf2816c9 .h4,#single-column-block_5e2fbaf2816c9 .h5,#single-column-block_5e2fbaf2816c9 .h6{color:#333333;}#single-column-block_5e2fbaf2816c9 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (min-width:761px){#single-column-block_5e2fbaf2816c9 > .block-wrap{padding-bottom:20px;}#single-column-block_5e2fbaf2816c9 > .block-wrap{padding-top:80px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_5e2fbaf2816c9\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 900px;\">\n\n\t\t\t\t\t<h2 class=\"area-title h2 align-self--\">Effective protection for endpoints<\/h2>\n\t\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<style>\n\t#flex-banner-block_5e2fbb2e816cb > .block-wrap{padding-bottom:50px;}#flex-banner-block_5e2fbb2e816cb > .block-wrap{padding-top:12.5px;}#flex-banner-block_5e2fbb2e816cb {background-color:#f5f5f5;}#flex-banner-block_5e2fbb2e816cb,#flex-banner-block_5e2fbb2e816cb p,#flex-banner-block_5e2fbb2e816cb .h1,#flex-banner-block_5e2fbb2e816cb .h2,#flex-banner-block_5e2fbb2e816cb .h3,#flex-banner-block_5e2fbb2e816cb .h4,#flex-banner-block_5e2fbb2e816cb .h5,#flex-banner-block_5e2fbb2e816cb .h6{color:#333333;}#flex-banner-block_5e2fbb2e816cb .flex-area a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (min-width:761px){#flex-banner-block_5e2fbb2e816cb > .block-wrap{padding-bottom:80px;}#flex-banner-block_5e2fbb2e816cb > .block-wrap{padding-top:20px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"flex-banner-block_5e2fbb2e816cb\" class=\"flex-banner alignwide two-columns\">\n\t<div class=\"block-wrap\">\n\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"flex-area one-half svg\">\n\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"77\" height=\"77\" src=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/01\/25171023\/AMPUMB-Icons-UMB.svg\" class=\"attachment-umbrella-flex-icon size-umbrella-flex-icon\" alt=\"AMP and Umbrella icon\" \/>\t\n\t<div class=\"content-copy\">\n\n\t\t<div class=\"main-content\">\n\n\t\t\t\t\t\t\t<h3 class=\"area-title h3\">Cisco Umbrella<\/h3>\n\t\t\t\n\t\t\t\n\t\t\t<p>A cloud-delivered service, Umbrella provides the first line of defense against threats on the internet, giving organizations visibility to protect users across all network devices, office locations, and beyond. With Umbrella, customers can stop malware infections earlier, identify already infected devices faster, and prevent data exfiltration.<\/p>\n\n\t\t<\/div>\n\n\t\t\n\t<\/div>\n\n<\/div>\n\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"flex-area one-half svg\">\n\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"77\" height=\"77\" src=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/01\/25171023\/AMPUMB-Icons-AMP.svg\" class=\"attachment-umbrella-flex-icon size-umbrella-flex-icon\" alt=\"AMP malware icon\" \/>\t\n\t<div class=\"content-copy\">\n\n\t\t<div class=\"main-content\">\n\n\t\t\t\t\t\t\t<h3 class=\"area-title h3\">Cisco AMP for Endpoints<\/h3>\n\t\t\t\n\t\t\t\n\t\t\t<p>AMP for Endpoints is a cloud-managed, next generation endpoint security solution that not only prevents cyber attacks, but also rapidly detects, contains, and remediates malicious files if they evade defenses and infiltrate endpoints \u2014 before damage can be done.<\/p>\n\n\t\t<\/div>\n\n\t\t\n\t<\/div>\n\n<\/div>\n\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n<\/div>\n\n\n\n<style>\n\t#double-column-block_5e2fbcec816cc > .block-wrap{padding-bottom:25px;}#double-column-block_5e2fbcec816cc > .block-wrap{padding-top:25px;}#double-column-block_5e2fbcec816cc{background-color:#fff;}#double-column-block_5e2fbcec816cc,#double-column-block_5e2fbcec816cc p,#double-column-block_5e2fbcec816cc .h1,#double-column-block_5e2fbcec816cc .h2,#double-column-block_5e2fbcec816cc .h3,#double-column-block_5e2fbcec816cc .h4,#double-column-block_5e2fbcec816cc .h5,#double-column-block_5e2fbcec816cc .h6{color:#333;}#double-column-block_5e2fbcec816cc a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_5e2fbcec816cc > .block-wrap{padding-bottom:0px;}#double-column-block_5e2fbcec816cc .text-area, #double-column-block_5e2fbcec816cc .image-area, #double-column-block_5e2fbcec816cc .form-area{padding-bottom:40px;}#double-column-block_5e2fbcec816cc > .block-wrap{padding-top:0;}#double-column-block_5e2fbcec816cc .text-area, #double-column-block_5e2fbcec816cc .image-area, #double-column-block_5e2fbcec816cc .form-area{padding-top:40px;}}<\/style>\n\n<div id=\"double-column-block_5e2fbcec816cc\" class=\"double-column alignwide swap align-items--\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"text-area one-half first buttons-alignment--\">\n\n\t<h2 class=\"area-title h2 align-self--\">Better together<\/h2>\n\t<div class=\"content-wrap align-self--\"><p>Working at different yet complementary layers, Cisco Umbrella and Cisco AMP for Endpoints together provide the first and last line of defense to help you prevent, detect, and respond to attacks before damage can be done.<\/p>\n<p>Umbrella prevents connections to malicious destinations and command-and-control callbacks at the DNS layer, while AMP works at the file level to prevent the initial malware execution and track file behavior over time. Together, these solutions help organizations protect mobile users against blended threats that use email, web, and other more sophisticated techniques.<\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--\">\n\n\t\n\t<div class=\"content-wrap align-self--\"><p><img decoding=\"async\" src=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration.png\" alt=\"Umbrell and Amp - Better together illustration\" width=\"400\" height=\"auto\" class=\"aligncenter size-full wp-image-3696\" srcset=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration.png 1100w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-300x300.png 300w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-1024x1022.png 1024w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-150x150.png 150w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-768x767.png 768w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-75x75.png 75w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-40x40.png 40w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-80x80.png 80w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-90x90.png 90w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170344\/Better-together-illustration-180x180.png 180w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/><\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#single-column-block_5e2fc0a7816d2 > .block-wrap{padding-top:50px;}#single-column-block_5e2fc0a7816d2{background-color:#0d274d;}#single-column-block_5e2fc0a7816d2,#single-column-block_5e2fc0a7816d2 p,#single-column-block_5e2fc0a7816d2 .h1,#single-column-block_5e2fc0a7816d2 .h2,#single-column-block_5e2fc0a7816d2 .h3,#single-column-block_5e2fc0a7816d2 .h4,#single-column-block_5e2fc0a7816d2 .h5,#single-column-block_5e2fc0a7816d2 .h6{color:#ffffff;}#single-column-block_5e2fc0a7816d2 a:not(.button):not(:focus):not(:hover){color:#333333;}@media only screen and (min-width:761px){#single-column-block_5e2fc0a7816d2 > .block-wrap{padding-top:80px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_5e2fc0a7816d2\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 900px;\">\n\n\t\t\t\t\t<h2 class=\"area-title h2 align-self--\">Gaps in security<\/h2>\n\t\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<style>\n\t#stats-block-block_5e2fbeb1816cd > .block-wrap{padding-bottom:50px;}#stats-block-block_5e2fbeb1816cd {background-color:#0d274d;}#stats-block-block_5e2fbeb1816cd,#stats-block-block_5e2fbeb1816cd p,#stats-block-block_5e2fbeb1816cd .h1,#stats-block-block_5e2fbeb1816cd .h2,#stats-block-block_5e2fbeb1816cd .h3,#stats-block-block_5e2fbeb1816cd .h4,#stats-block-block_5e2fbeb1816cd .h5,#stats-block-block_5e2fbeb1816cd .h6{color:#ffffff;}#stats-block-block_5e2fbeb1816cd .single-stat{border-color:#ffffff;}#stats-block-block_5e2fbeb1816cd a:not(.button):not(:focus):not(:hover){color:#007493;}#stats-block-block_5e2fbeb1816cd .area-content{max-width:900px;}@media only screen and (min-width:761px){#stats-block-block_5e2fbeb1816cd > .block-wrap{padding-bottom:80px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"stats-block-block_5e2fbeb1816cd\" class=\"stats-block alignwide three-columns\">\n\t<div class=\"block-wrap\">\n\n\t\t\n\t\t\n\t\t\t<div class=\"stats-area\">\n\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"single-stat one-third\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"data\">40%<\/p>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"data-content\">of the workforce is roaming today but growing to 50% by&nbsp;2020<sup>1<\/sup><\/p>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"single-stat one-third\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"data\">56%<\/p>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"data-content\">of organizations say that mobile devices are one of the most challenging areas to defend <sup>2<\/sup><\/p>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"single-stat one-third\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"data\">85%<\/p>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"data-content\">of corporate users bypass VPN <sup>3<\/sup><\/p>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t\n\t<\/div>\n<\/div>\n\n\n\n<style>\n\t#double-column-block_5e2fc1ab816d3 > .block-wrap{padding-bottom:37.5px;}#double-column-block_5e2fc1ab816d3 > .block-wrap{padding-top:50px;}#double-column-block_5e2fc1ab816d3{background-color:#f5f5f5;}#double-column-block_5e2fc1ab816d3,#double-column-block_5e2fc1ab816d3 p,#double-column-block_5e2fc1ab816d3 .h1,#double-column-block_5e2fc1ab816d3 .h2,#double-column-block_5e2fc1ab816d3 .h3,#double-column-block_5e2fc1ab816d3 .h4,#double-column-block_5e2fc1ab816d3 .h5,#double-column-block_5e2fc1ab816d3 .h6{color:#333;}#double-column-block_5e2fc1ab816d3 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_5e2fc1ab816d3 > .block-wrap{padding-bottom:0px;}#double-column-block_5e2fc1ab816d3 .text-area, #double-column-block_5e2fc1ab816d3 .image-area, #double-column-block_5e2fc1ab816d3 .form-area{padding-bottom:60px;}#double-column-block_5e2fc1ab816d3 > .block-wrap{padding-top:0;}#double-column-block_5e2fc1ab816d3 .text-area, #double-column-block_5e2fc1ab816d3 .image-area, #double-column-block_5e2fc1ab816d3 .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_5e2fc1ab816d3\" class=\"double-column alignwide align-items--\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"text-area one-half first buttons-alignment--\">\n\n\t\n\t<div class=\"content-wrap align-self--\"><p><img decoding=\"async\" src=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints.png\" alt=\"AMP for Enpoints illustration\" width=\"300\" height=\"auto\" class=\"aligncenter size-full wp-image-3704\" srcset=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints.png 1000w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-300x300.png 300w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-150x150.png 150w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-768x768.png 768w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-75x75.png 75w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-40x40.png 40w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-80x80.png 80w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-90x90.png 90w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170343\/AMP-for-Endpoints-180x180.png 180w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--\">\n\n\t<h2 class=\"area-title h2 align-self--\">Get a free trial of Cisco Secure Endpoint<\/h2>\n\t<div class=\"content-wrap align-self--\"><\/div>\n\t\n\t<div id=\"_umbrella_columns_second_buttons69ec0203134c7\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<style>\n\t\t\t\t\t\t#_umbrella_columns_second_buttons69ec0203134c7 .button-0:not(:hover):not(:focus){background-color:transparent;border-color:#333333;}#_umbrella_columns_second_buttons69ec0203134c7 .button-0{background-color:transparent;color:#333333;}\t\t\t\t\t<\/style>\n\t\t\t\t\t\t\t\t<a class=\"button outline button-0  pass-query\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/free-trial.html\" target=\"_blank\">Get a free trial<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#double-column-block_5e32083861727 > .block-wrap{padding-top:50px;}#double-column-block_5e32083861727{background-color:#f5f5f5f;}#double-column-block_5e32083861727,#double-column-block_5e32083861727 p,#double-column-block_5e32083861727 .h1,#double-column-block_5e32083861727 .h2,#double-column-block_5e32083861727 .h3,#double-column-block_5e32083861727 .h4,#double-column-block_5e32083861727 .h5,#double-column-block_5e32083861727 .h6{color:#333333;}#double-column-block_5e32083861727 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_5e32083861727 > .block-wrap{padding-top:0;}#double-column-block_5e32083861727 .text-area, #double-column-block_5e32083861727 .image-area, #double-column-block_5e32083861727 .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_5e32083861727\" class=\"double-column alignwide swap align-items--\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"text-area one-half first buttons-alignment--\">\n\n\t<h2 class=\"area-title h2 align-self--\">Sign up for a Cisco Umbrella 14-day free trial<\/h2>\n\t<div class=\"content-wrap align-self--\"><h4>Just point your DNS to the Umbrella global network and any device that connects to it is instantly protected. It&#8217;s that easy. Get powerful and effective protection against threats today.<\/h4>\n<\/div>\n\t\n\t<div id=\"_umbrella_columns_first_buttons69ec020313c74\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<a class=\"button button-0  pass-query\" href=\"https:\/\/signup.umbrella.com?utm_content=automated-free-trial\">Start your free trial<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--\">\n\n\t\n\t<div class=\"content-wrap align-self--\"><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2393\" src=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170724\/Free-Trial-Laptop-800-3.png\" alt=\"Umbrella dashboard photo\" width=\"800\" height=\"470\" srcset=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170724\/Free-Trial-Laptop-800-3.png 800w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170724\/Free-Trial-Laptop-800-3-300x176.png 300w, https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170724\/Free-Trial-Laptop-800-3-768x451.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<\/div>\n\t\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#single-column-block_5e2fc4a1816d6 > .block-wrap{padding-bottom:12.5px;}#single-column-block_5e2fc4a1816d6 > .block-wrap{padding-top:25px;}#single-column-block_5e2fc4a1816d6{background-color:#ffffff;}#single-column-block_5e2fc4a1816d6,#single-column-block_5e2fc4a1816d6 p,#single-column-block_5e2fc4a1816d6 .h1,#single-column-block_5e2fc4a1816d6 .h2,#single-column-block_5e2fc4a1816d6 .h3,#single-column-block_5e2fc4a1816d6 .h4,#single-column-block_5e2fc4a1816d6 .h5,#single-column-block_5e2fc4a1816d6 .h6{color:#333333;}#single-column-block_5e2fc4a1816d6 a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (min-width:761px){#single-column-block_5e2fc4a1816d6 > .block-wrap{padding-bottom:20px;}#single-column-block_5e2fc4a1816d6 > .block-wrap{padding-top:40px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_5e2fc4a1816d6\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 900px;\">\n\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t<div class=\"content-wrap align-self--flex-start\">\n\t\t\t\t\t\t\t<p style=\"font-size: 10px;line-height:1.2 em;\">*1 Cisco Secure Internet Gateway Survey, ESG Research Survey, January 2019; *2 Cisco 2020 CISO Benchmark Study; *3 Cisco Secure Internet Gateway Survey, ESG Research Survey, January 2019<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":48,"featured_media":0,"parent":194,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":true,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"umbrella-keywords":[],"coauthors":[6417],"class_list":{"0":"post-676","1":"page","2":"type-page","3":"status-publish","5":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Best Mobile Cybersecurity Solution - Cisco Umbrella<\/title>\n<meta name=\"description\" content=\"Protect your mobile users everywhere and stop today&#039;s advanced threats before they become a problem with Cisco Umbrella&#039;s mobile cybersecurity solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/umbrella.cisco.com\/de\/solutions\/protect-mobile-users\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Mobile Cybersecurity Solution - Cisco Umbrella\" \/>\n<meta property=\"og:description\" content=\"Protect your mobile users everywhere and stop today&#039;s advanced threats before they become a problem with Cisco Umbrella&#039;s mobile cybersecurity solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users\" \/>\n<meta property=\"og:site_name\" content=\"Cisco Umbrella\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CiscoUmbrella\/\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-22T17:49:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2022\/03\/22160233\/cisco-umbrella-social-share.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CiscoUmbrella\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/protect-mobile-users\",\"url\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/protect-mobile-users\",\"name\":\"Best Mobile Cybersecurity Solution - Cisco Umbrella\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#website\"},\"datePublished\":\"2020-01-28T00:01:35+00:00\",\"dateModified\":\"2022-03-22T17:49:55+00:00\",\"description\":\"Protect your mobile users everywhere and stop today's advanced threats before they become a problem with Cisco Umbrella's mobile cybersecurity solution.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/protect-mobile-users#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/protect-mobile-users\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/protect-mobile-users#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/umbrella.cisco.com\\\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/umbrella.cisco.com\\\/de\\\/solutions\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protect Mobile Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#website\",\"url\":\"https:\\\/\\\/umbrella.cisco.com\\\/\",\"name\":\"Cisco Umbrella\",\"description\":\"Enterprise network security\",\"publisher\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/umbrella.cisco.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#organization\",\"name\":\"Cisco Umbrella\",\"url\":\"https:\\\/\\\/umbrella.cisco.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cdn.umbrella.marketops.umbrella.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/25162456\\\/umbrella-logo.png\",\"contentUrl\":\"https:\\\/\\\/cdn.umbrella.marketops.umbrella.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/25162456\\\/umbrella-logo.png\",\"width\":400,\"height\":47,\"caption\":\"Cisco Umbrella\"},\"image\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CiscoUmbrella\\\/\",\"https:\\\/\\\/x.com\\\/CiscoUmbrella\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opendns\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCqZ3pD7tVVcfUj8k5MYcp0Q\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best Mobile Cybersecurity Solution - Cisco Umbrella","description":"Protect your mobile users everywhere and stop today's advanced threats before they become a problem with Cisco Umbrella's mobile cybersecurity solution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/umbrella.cisco.com\/de\/solutions\/protect-mobile-users","og_locale":"de_DE","og_type":"article","og_title":"Best Mobile Cybersecurity Solution - Cisco Umbrella","og_description":"Protect your mobile users everywhere and stop today's advanced threats before they become a problem with Cisco Umbrella's mobile cybersecurity solution.","og_url":"https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users","og_site_name":"Cisco Umbrella","article_publisher":"https:\/\/www.facebook.com\/CiscoUmbrella\/","article_modified_time":"2022-03-22T17:49:55+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2022\/03\/22160233\/cisco-umbrella-social-share.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CiscoUmbrella","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users","url":"https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users","name":"Best Mobile Cybersecurity Solution - Cisco Umbrella","isPartOf":{"@id":"https:\/\/umbrella.cisco.com\/#website"},"datePublished":"2020-01-28T00:01:35+00:00","dateModified":"2022-03-22T17:49:55+00:00","description":"Protect your mobile users everywhere and stop today's advanced threats before they become a problem with Cisco Umbrella's mobile cybersecurity solution.","breadcrumb":{"@id":"https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/umbrella.cisco.com\/solutions\/protect-mobile-users#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/umbrella.cisco.com\/de"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/umbrella.cisco.com\/de\/solutions"},{"@type":"ListItem","position":3,"name":"Protect Mobile Users"}]},{"@type":"WebSite","@id":"https:\/\/umbrella.cisco.com\/#website","url":"https:\/\/umbrella.cisco.com\/","name":"Cisco Umbrella","description":"Enterprise network security","publisher":{"@id":"https:\/\/umbrella.cisco.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/umbrella.cisco.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/umbrella.cisco.com\/#organization","name":"Cisco Umbrella","url":"https:\/\/umbrella.cisco.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/umbrella.cisco.com\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/03\/25162456\/umbrella-logo.png","contentUrl":"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/03\/25162456\/umbrella-logo.png","width":400,"height":47,"caption":"Cisco Umbrella"},"image":{"@id":"https:\/\/umbrella.cisco.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CiscoUmbrella\/","https:\/\/x.com\/CiscoUmbrella","https:\/\/www.linkedin.com\/company\/opendns","https:\/\/www.youtube.com\/channel\/UCqZ3pD7tVVcfUj8k5MYcp0Q"]}]}},"_links":{"self":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages\/676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/comments?post=676"}],"version-history":[{"count":0,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages\/676\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages\/194"}],"wp:attachment":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/media?parent=676"}],"wp:term":[{"taxonomy":"umbrella-keywords","embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/umbrella-keywords?post=676"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/coauthors?post=676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}