Application Protection for Desktop and Server

Your Organization Should Not Risk an Attack

Desktop (client) applications perform many critical business functions. However, they are susceptible to piracy, tampering, vulnerability probing, data and IP breach. Also, server app executables (while more protected when running behind a firewall) may be hosted by customers, run on external servers or be accessed directly via a misconfiguration of the server or a breach of the firewall. Applications running on remote servers can be subject to the same risks that occur with client applications. Hackers rely upon tools to probe, discover, and exploit mainstream vulnerabilities. For starters, hackers often pick apart and modify applications with application debuggers and reverse engineering tools. These “programmatic hacks” have led to many of today’s most devastating application and data exploits.

Thwarting the Hacker Business Model

Threats from Hackers

To disrupt the business of hacking means to increase the cost of the attacker’s business, erode their profits, and increase the time it takes to successfully execute an attack and monetize the IP and data captured. It is possible to harden your application before releasing it, making attacks more difficult by:

  • Increasing the talent required - it will take a hacker with much higher skill to be sucessful
  • Increasing the time to value - it will take a hacker much longer to be successful

Tens of thousands of development groups have already made the decision to include code protection in their development process. Loss of revenue, operational disruption and loss of intellectual property are real threats that can arise from the unprotected distribution of easily decompiled applications written to run on platforms such as .NET and Java.

Industry Risk

Prevent, detect, respond and report

Uncontrolled source code distribution holds varying degrees of risk that can be segmented by industry. Software vendors, financial service providers, telecommunications companies, manufacturers and other businesses that rely on applications to generate revenue, assure business continuity, and whose applications represent unique intellectual property, have specific risks and corresponding requirements.

A Sensible Layered Approach

PreEmptive Protection applies a layered approach to binary code protection using obfuscation, encryption, shielding, and tamper proofing, making your apps more difficult for people and machines to exploit. Our combination of turnkey and extensible functions ensure that you will get the right mix of protection, response and reporting features that you will need to sensibly protect your apps. And, because our protection is injected directly into your client or server based Java or .NET application (in its binary form), the protection goes wherever your app runs.

Our Products:
Require no changes to your source code
Seamlessly integrate in your build process
Provide both passive protection (against static analysis tools) and active protection (against run-time attacks)
Let you adjust the level of security