Smart App Protection

Application Protection for an Unsafe World

Apps running in untrusted environments are vulnerable to exploitation and attacks that traditional security does not prevent. Effective protection requires “preempting” those threats to secure against reverse engineering, tampering, and IP & data theft.

Protection and Security that Travels with your App

  • Our App Protection (Shielding / Hardening) is innovative and current – with an equal emphasis on simplicity and scalability.
  • Our solutions provide integration and configuration flexibility, automation, and scale. If an app protection solution is too complex to reliably implement, requires too much manual intervention, or cannot integrate into your deployment tool chain – then the cost of development will either increase to an unacceptable rate or your service levels will plummet.
  • We follow the “the principle of least surprise.” Our technologies are invasive – and if not meticulously designed and implemented, app hardening might cause performance, stability or even verification problems with the apps we process.
  • We offer timely updates to counter advances in disassembler, rooting, emulator, hooking and debugging technologies. As these tools evolve to better support bad acting hackers, we have to develop counter measures.

Protect Your Apps & Data and Reduce Risk Today

Industry Examples:

Financial:

  • Prevent the inspection of regulated or sensitive information (PCI DSS, General Cobit)
  • Prevent unauthorized access
  • Validate that the app is running in a safe environment
  • Prevent application tampering
  • Prevent runtime behavior modification

Manufacturing — Smart Devices:

  • Prevent unauthorized use and access to gated functionality on device
  • Defend against insertion of malicious code
  • Protect valuable intellectual property (trade secrets)
  • Protect cryptographic keys

Medical:

  • Prevent the inspection of regulated or sensitive information (HIPAA, etc.)
  • Protect valuable intellectual property (trade secrets)
  • Validate that the app is running in a safe environment
  • Prevent application tampering

Government:

  • Prevent unauthorized use and access of applications
  • Protect privacy and access to sensitive data
  • Defense of infrastructure and homeland
  • Prevent application tampering

Software Vendors:

  • Hinder piracy
  • Prevent unauthorized access
  • Protect valuable intellectual property (trade secrets)
  • Prevent app usage inside emulators