Solutions that Fit. Protection that Works.

  • Our App Protection (Shielding / Hardening) is innovative and current – with an equal emphasis on simplicity and scalability
  • Our solutions provide integration and configuration flexibility, automation, and scale. If an app protection solution is too complex to reliably implement, requires too much manual intervention, or cannot integrate into your deployment tool chain – then the cost of development will either increase to an unacceptable rate or your service levels will plummet.
  • We follow the “the principle of least surprise.” Our technologies are invasive – and if not meticulously designed and implemented, app hardening might cause performance, stability or even verification problems with the apps we process.
  • We offer timely updates to counter advances in disassembler, rooting (for mobile), and debugging technologies. As these tools evolve to better support bad acting hackers, we have to develop counter measures.

Protection and Security that Travels with your App

Traditional hardware or network cyber-security protection does not work for high value apps running in untrusted environments. As a result, these applications may be your least secured attack vector.

PreEmptive’s Protection Solutions infuse protection and security functionality directly into applications to detect and defend against application-level intrusions. We harden your application by infusing Anti-Reverse Engineering, Anti-Tampering, and Anti-Inspection technologies directly into your applications.

Industry Examples:

Financial:
  • Prevent the inspection of regulated or sensitive information (PCI DSS, General Cobit)
  • Prevent unauthorized access
  • Validate that the app is running in a safe environment
  • Prevent application tampering
Manufacturing -- Smart Devices:
  • Prevent unauthorized use and access to gated functionality on device
  • Defend against insertion of malicious code
  • Protect valuable intellectual property (trade secrets)
  • Protect cryptographic keys
Medical:
  • Prevent the inspection of regulated or sensitive information (HIPAA, etc.)
  • Protect valuable intellectual property (trade secrets)
  • Validate that the app is running in a safe environment
  • Prevent application tampering
Government:
  • Prevent unauthorized use and access of applications
  • Protect privacy and access to sensitive data
  • Defense of infrastructure and homeland
  • Prevent application tampering
Software Vendors:
  • Hinder piracy
  • Prevent unauthorized access
  • Protect valuable intellectual property (trade secrets)
  • Prevent application repackaging and malware insertion