for secure remote access
Promon Shield - Unprotected Environment

Dealing with remote access risks

Mobile users in remote working places, travelling or simply working from home, demand and require remote access to the company’s internal network that typically contains sensitive information. The primary threat against using Remote Employee Access is malware on the (managed and unmanaged) client side. Promon SHIELD™ secures corporate data from a range of attack vectors such as;

  • Code injection
  • Hijacking of the browser, SSL/VPN portals, and applications used for virtual desktop sessions
  • Malware
Promon Shield - Protected Environment

Secure remote access

Promon SHIELD™ prevents all the threat scenarios as mentioned above, most importantly by creating a secure dedicated execution environment for the application. This environment is controlled and protected in-depth by strong proactive security mechanisms. This is done by:

  • An SDK which is directly integrated in the application (browser or a dedicated remote desktop solution)
Self Protecting App

X-platform & self protecting (RASP)

Promon SHIELD™ offers protection to cloud- based applications and applications such as: Citrix and VMware running on PCs as well as the main mobile platforms iOS and Android. With Promon SHIELD™ the app is self-protecting and protection is restricted to the application only. With Promon SHIELD™ the attack is blocked by the application itself and the application continues to operate securely.

  • Secure data at rest
  • Blocks both known and unknown threats
  • Detect and defend against the evolving threats
  • Respond immediately to attacks to prevent data breaches
Product features


Protect against compromise

Code obfuscation
App binding
Repackaging detection
App communication
TLS sertificate pinning
Client authentication using a client-certificate
Identifying the app/device as an authentication factor
Store data encrypted inside the app
Binding the data to be encrypted to the device
Whitebox cryptography
App Management Solution
Trusted binding between a user, an app and the device
Making the app trusted without external security tokens
Registration / activation – securely pair the app / device with the user.


Detect attacks at runtime

Ensure app is running in safe environment
Debugger detection
Jailbreak / Root detection
Emulator detection
Ensure app is not altered or tampered with (e.g. by malware) at runtime
Resource verification
Hook detection


React to ward off attacks

Shutdown (Exit / Fail)
Integrity checking
Custom reactions
Screenshot detection / blocking
Anti keylogging
Anti screenreading
Alert / reporting
Blocking external screens
Prevent brute force decryption of sensitive information

Learn how to securely access applications with sensitive enterprise data remotely

Understand how to prevent the different threat scenarios by creating a secure dedicated execution environment for your applications.