Our customers build a lot of really innovative apps that enable their users and customers to do new and cool things. These apps frequently run on untrusted client computers/devices and they control access to customer’s sensitive data or critical devices.
And after all the effort of designing, building, debugging, and deploying their applications, the last thing they want is for an attacker to steal their work or use it to look for vulnerabilities to break into their system.
Code obfuscation is the process of modifying an executable so that it is no longer useful to a hacker but remains fully functional. While the process may modify actual method instructions or metadata, it does not alter the output of the program. To be clear, with enough skills, time and effort, almost all code can be reverse engineered. However, on some platforms (such as Java, Android, iOS and .NET) free decompilers can easily reverse-engineer source code from an executable or library in virtually no time and with no effort. Automated code obfuscation makes reverse-engineering a program difficult and economically unfeasible at scale.
Because of free and easily available tools, reverse engineering and probing of code has become a common practice for outsiders wanting to steal IP. They understand how to compromise an application, how to bypass security checks and ultimately how to gain control of data. For some applications, unmanaged access to source code can also pose material risks including application vulnerability exposure, increased likelihood of system attack, theft of intellectual property, privacy violations, and revenue loss through circumvention of usage and other metering enforcements. Techniques such as obfuscation and encryption can make it materially harder to reverse engineer code by breaking the reverse engineering tools and/or making the output extremely hard for a human to follow.
Yes. Obfuscation is only a part of what our tools do. PreEmptive Protection also implements encryption transforms and injects active runtime checks to make applications resistant to tampering, debugging, running on compromised devices, running in emulators, etc. This might involve automatically inserting overlapping and redundant checks to determine if an application was modified in any way. Or detecting if an application is running in a jailbroken or rooted device that might compromise some of the safety guarantees. Exploitation of applications can take many forms, so our protection techniques must as well.
Desktop, mobile, IoT and server applications.
If you are running an application on a local server fully under your control (and you assume no one will ever break in), you might be perfectly fine not protecting it. But, now imagine you are asked to run that same server application in a foreign country or on servers controlled by a client or partner. Now, it might be running in an untrusted environment and you might choose to protect it.
The first is obvious – our solutions provide solid protection that is battle hardened and always evolving to keep up with the latest threats. With 4-6 updates per year, we stay on top of the necessary maintenance required to keep our customer’s applications protected.
The second differentiator is integration. Our customers appreciate our configuration flexibility, automation, set-up Wizard and the ability to scale. If an app hardening solution is too complex to reliably implement, requires too much manual intervention, or cannot integrate into your deployment tool chain – then the cost of development will either increase to an unacceptable amount or your service levels will plummet. It is a complex and expensive undertaking to ensure that we seamlessly fit into the rapidly expanding flavors of DevOps, but we invest in it, so our customers don’t have to bear that cost alone.
The third reason that sets are products apart is that we approach obfuscation from a “do no harm” perspective. Through this principle, we provide a professional-grade quality tool, without slowing down or compromising the application. Our technologies are invasive – and we meticulously design and implement app hardening to NOT cause performance, stability or even verification problems. We verify all of the above against OS versions, development frameworks, etc. Our customers love that our PreEmptive products do not require 3rd party consultants, or the need to send their source code away for implementation.
Another thing very important to our customers, but not usually found in free tools, is ease of integration. Many times free tools have a high cost of implementation and you need to factor that in.
We harden and shield applications to make them more resistant and resilient to hacking and tampering – protecting a company’s brand, intellectual property, data and revenue.
The value of in-app protection is connected to the
We really have a range of clients. Big and small. All of them are building really neat things that are worth protecting.
We are proud that we have had some corporate clients for decades, and equally excited when an entrepreneur comes to us with a good idea. Our clients include government agencies, financial institutions, leading manufacturers, healthcare and medical device manufacturers, aerospace, and, in fact, every other mission critical industry segment.
We provide a great time-to-value for organizations serious about enhancing secure development with in-app protection.
We are easy to work with and we have simple-to-understand pricing.
We have a free trial and are ready to help you protect your apps running in zero trust environments today.