Hackers and their targeted malware have become an increasing threat to the mobile revolution. And with the explosive growth of the mobile channel and user demand for anytime/anywhere access to mobile services, app providers are stretching the boundaries of security, and putting them squarely in the crosshairs when it comes to malicious attacks. With Promon SHIELD™ you can prevent hackers from getting to your app revenue, and secure your apps from a range of attack vectors, such as:
"75% of mobile breaches will be traced to mobile apps by 2017" - GARTNER
Protect your consumer-facing apps
For an attacker the app is the best place to be. If an app allows hostile code to enter while it is running, every part of the app is at risk. All the app’s internal interfaces are available for the attacker, meaning that security measures like authentication, integrity protection and encryption are compromised.
Promon SHIELD™ addresses these issues by providing protection against Man-in-the-App. This is done in a quick and effortless way through;
- An SDK that is easily integrated in the app
- By using the Promon SHIELD™ integration tool
- As an integrated part of Android Studio
Runtime App Self-Protection (RASP)
Promon SHIELD™ is a security add-on providing self-protection abilities to services and app(lication)s. This is the category that GARTNER defines as Runtime Application Self-Protection (RASP).
With Promon SHIELD™ the app is self-protecting and protection is restricted to the application only. With Promon SHIELD™ the attack is blocked by the application itself and the application continues to operate securely.
- Secure data at rest
- Blocks both known and unknown threats
- Detect and defend against the evolving mobile threats
- Respond immediately to attacks to prevent mobile breaches
You can easily turn your apps into a self-protecting app. Your apps can be quickly uploaded and secured in minutes by using our integration tool, or an SDK that is easily integrated in the app. Once secured, the app is immediately ready for distribution via public app stores.
Learn about the key threats to mobile apps.
Understand how secure use of an application can be achieved, even in the hostile environment on infected systems.