Promon SHIELD™

Application Protection and Security for Health and Medical Apps

Secure your patients’ data and minimize the threat from malicious attacks.

Promon Shield Health Logo
Application Protection For Health And Medical Apps

Protect your patients' data!

It’s not just apps connected to insulin pumps and pacemakers that are appealing to hackers, but also the 10- to 15-connected devices associated with each bed in a hospital. Large hospital systems can have up to 5,000 beds. And in an industry estimated to be worth US$400 billion globally, it only takes one death directly linked to a hacked medical device to impact the bottom lines of hundreds of companies.

IoT-connected devices in medical facilities present IT departments with life-threatening issues and the risk of a breach is too great to ignore! Promon SHIELD™ prevent Malware and hackers from getting to your sensitive data and secures applications from a range of attack vectors, such as:

  • Malware attempting a low-level takeover of a device
  • Cloning scenarios for keys or unique identifiers
  • Unauthorized access and Hijacking of application processes and functions
  • OS Vulnerabilities
Application Shielding And RASP (Runtime Application Self-Protection) For Health And Medical Apps

Runtime App Self-Protection (RASP)

Promon SHIELD™ is a security add-on providing self-protection abilities to services and app(lication)s. This is the category that GARTNER defines as Runtime Application Self-Protection (RASP) / Application Shielding.

With Promon SHIELD™ the app is self-protecting and protection is restricted to the application only. With Promon SHIELD™ the attack is blocked by the application itself and the application continues to operate securely.

  • Secure data at rest
  • Blocks both known and unknown threats
  • Detect and defend against the evolving mobile threats
  • Respond immediately to attacks to prevent breaches
Our customers buy because

Unchanged User Experience

Promon SHIELD™ protects multiple business apps while maintaining an optimal user experience. You won’t even notice it’s there!

Quick to deploy

Promon SHIELD™ provides an automated implementation process. This allows organizations to quickly release protected apps, without affecting the development timeline!

Stay Compliant

Promon SHIELD™ upholds the strictest international compliance requirements (GDPR / FDA), and works on multiple platforms.

Enable secure Mobile Strategy

Promon SHIELD™ proactively protects your apps against zero-day and other targeted attacks, allowing apps to run securely, even on highly infected devices.

Highly Secured software keys

Promon SHIELD™ protects sensitive data in the app and prevent cloning scenarios for keys or unique identifiers.

Prevent IP Theft

Promon SHIELD™ ensure that proprietary business logic can’t be reverse engineered, inspected, and/or stolen.

Easy deployment!

You can easily turn your health and medical apps into a self-protecting app. Your apps can be quickly uploaded and secured in minutes by using our integration tool, or an SDK that is easily integrated in the app. Once secured, the app is immediately ready for distribution via public app stores.

Easy deployment for Health and Medical Apps
Product features

PROTECT

Protect against compromise

Code obfuscation
App binding
Repackaging detection
App communication
TLS certificate pinning
Client authentication using a client-certificate
Identifying the app/device as an authentication factor
Store data encrypted inside the app
Binding the data to be encrypted to the device
Whitebox cryptography
App Management Solution
Trusted binding between a user, an app and the device
Making the app trusted without external security tokens
Registration / activation – securely pair the app / device with the user.

DETECT

Detect attacks at runtime

Ensure app is running in safe environment
Debugger detection
Jailbreak / Root detection
Emulator detection
Ensure app is not altered or tampered with (e.g. by malware) at runtime
Checksum
Resource verification
Hook detection

REACT

React to ward off attacks

Shutdown (Exit / Fail)
Integrity checking
Custom reactions
Screenshot detection / blocking
Anti keylogging
Anti screenreading
Alert / reporting
Blocking external screens
Prevent brute force decryption of sensitive information

Learn about the key threats to mobile apps.

Understand how secure use of an application can be achieved, even in the hostile environment on infected systems.