Promon SHIELD™

Application Protection and Security for IoT & Connected Devices

Secure your customers data and minimize the threat from malicious attacks.

Promon Shield IOT
IOT - Consumer Facing App

Protect your customers data!

We all know that car hacking is a real risk. Increased connectivity has also introduced new risks and attack vectors into apps for everything from remotely setting the water heater to controlling their home security systems. Connected convenience comes with elevated risk!

Vulnerable apps can create safety issues, expose sensitive customer information and raise the risk for ID theft and fraud. Promon SHIELD™ prevent Malware and hackers from getting to your sensitive data, and secure apps from a range of attack vectors, such as:

  • Malware attempting a low-level takeover of a device
  • Cloning scenarios for keys or unique identifiers
  • Unauthorized access and Hijacking of application processes and functions
  • Overlay malware and hacker-developed copies of the app login
  • Fraudulent transactions
  • OS Vulnerabilities
IOT - Self Protecting App

Runtime App Self-Protection (RASP)

Promon SHIELD™ is a security add-on providing self-protection abilities to services and app(lication)s. This is the category that GARTNER defines as Runtime Application Self-Protection (RASP) / Application Shielding.

With Promon SHIELD™ the app is self-protecting and protection is restricted to the application only. With Promon SHIELD™ the attack is blocked by the application itself and the application continues to operate securely.

  • Secure data at rest
  • Blocks both known and unknown threats
  • Detect and defend against the evolving mobile threats
  • Respond immediately to attacks to prevent mobile breaches
Our customers buy because

Unchanged User Experience

Promon SHIELD™ protects multiple business apps while maintaining an optimal user experience. You won’t even notice it’s there!

Quick to deploy

Promon SHIELD™ provides an automated implementation process. This allows organizations to quickly release protected apps, without affecting the development timeline!

Stay Compliant

Promon SHIELD™ upholds the strictest international compliance requirements (GDPR), and works on multiple platforms.

Enable secure Mobile Strategy

Promon SHIELD™ proactively protects your apps against zero-day and other targeted attacks, allowing apps to run securely, even on highly infected devices.

Highly Secured software keys

Promon SHIELD™ protects sensitive data in the app and prevent cloning scenarios for keys or unique identifiers.

Prevent IP Theft

Promon SHIELD™ ensure that proprietary business logic can’t be reverse engineered, inspected, and/or stolen.

Easy deployment!

You can easily turn your apps into a self-protecting app. Your apps can be quickly uploaded and secured in minutes by using our integration tool, or an SDK that is easily integrated in the app. Once secured, the app is immediately ready for distribution via public app stores.

IOT - Easy deployment
Product features

PROTECT

Protect against compromise

Code obfuscation
App binding
Repackaging detection
App communication
TLS certificate pinning
Client authentication using a client-certificate
Identifying the app/device as an authentication factor
Store data encrypted inside the app
Binding the data to be encrypted to the device
Whitebox cryptography
App Management Solution
Trusted binding between a user, an app and the device
Making the app trusted without external security tokens
Registration / activation – securely pair the app / device with the user.

DETECT

Detect attacks at runtime

Ensure app is running in safe environment
Debugger detection
Jailbreak / Root detection
Emulator detection
Ensure app is not altered or tampered with (e.g. by malware) at runtime
Checksum
Resource verification
Hook detection

REACT

React to ward off attacks

Shutdown (Exit / Fail)
Integrity checking
Custom reactions
Screenshot detection / blocking
Anti keylogging
Anti screenreading
Alert / reporting
Blocking external screens
Prevent brute force decryption of sensitive information

Learn how to secure mobile smart-lock apps against potential attacks

In this white paper you’ll learn about the key threats to mobile smart-lock apps, and how to build apps that securely interacts with the lock system.