skip to Main Content

Promon SHIELD™

Application Protection and Security for IoT & Connected Devices

Secure your customers data and minimize the threat from malicious attacks.

Promon Shield IOT

Protect your customers data!

Vulnerable apps connected to IoT devices can create safety issues, expose sensitive customer information and raise the risk for ID theft and fraud. Promon SHIELD™ prevent Malware and hackers from getting to your sensitive data, and secure apps from a range of attack vectors, such as:

  • Malware attempting a low-level takeover of a device
  • Cloning scenarios for keys or unique identifiers
  • Unauthorized access and Hijacking of application processes and functions
  • Overlay malware and hacker-developed copies of the app login
  • Fraudulent transactions
  • OS Vulnerabilities
IOT - Self Protecting App

Runtime App Self-Protection (RASP)

Promon SHIELD™ is a security add-on providing self-protection abilities to services and app(lication)s. This is the category that GARTNER defines as Runtime Application Self-Protection (RASP) / Application Shielding.

With Promon SHIELD™ the app is self-protecting and protection is restricted to the application only. With Promon SHIELD™ the attack is blocked by the application itself and the application continues to operate securely.

  • Secure data at rest
  • Blocks both known and unknown threats
  • Detect and defend against the evolving mobile threats
  • Respond immediately to attacks to prevent mobile breaches
Our customers buy because

Unchanged User Experience

Promon SHIELD™ protects multiple business apps while maintaining an optimal user experience. You won’t even notice it’s there!

Quick to deploy

Promon SHIELD™ provides an automated implementation process. This allows organizations to quickly release protected apps, without affecting the development timeline!

Stay Compliant

Promon SHIELD™ upholds the strictest international compliance requirements (GDPR), and works on multiple platforms.

Enable secure Mobile Strategy

Promon SHIELD™ proactively protects your apps against targeted attacks, allowing apps to run securely, even on highly infected devices.

Highly Secured software keys

Promon SHIELD™ protects sensitive data in the app and prevent cloning scenarios for keys or unique identifiers.

Prevent IP Theft

Promon SHIELD™ ensure that proprietary business logic can’t be reverse engineered, inspected, and/or stolen.

Comprehensive In-App Protection

PROTECT

Impede attackers’ attempts to reverse-engineer and modify your app. Promon SHIELD™ makes it more difficult for attackers to spoof your app, tamper with its security controls or perform other nefarious activities.

Obfuscation
App binding
Repackaging detection
Secure Local Storage (On device)
Store data encrypted inside the app
Binding the data to be encrypted to the device
Whitebox backed encryption of data
Strong device binding / Fingerprinting

DETECT

Monitor your mobile app’s runtime behavior. Detect whether the app is executing in an insecure environment such as on a rooted (Android) or jailbroken (iOS) device. Mitigate the risks of overlay attacks, debuggers, emulators, and other means by which attackers examine, penetrate, and compromise a mobile app.

Ensure app is running in safe environment
Debugger detection
Jailbreak / Root detection
Emulator detection
Ensure app is not altered or tampered with (e.g. by malware) at runtime
Detection & protection against StrandHogg exploits
Checksum
Protection against Accessibility API abuse / UI Spoofing (overlay attacks/screen readers)
Resource verification
Hook detection

REACT

Upon detecting malicious activity, an app protected by Promon SHIELD™ will modify its behavior in real time to interrupt potential attacks. Response actions include blocking execution of injected code, notifying security administrators, and terminating the infected app to stop the execution of a compromised app.

Integrity checking
Custom reactions
Screenshot detection / blocking
Anti keylogging
Anti screenreading
Alert / reporting
Blocking external screens
Prevent brute force decryption of sensitive information
Back To Top