Mobile Application Security Testing (MAST)
Ensure mobile applications do not embed hidden behaviors or critical vulnerabilities that will jeopardize their privacy. Our Mobile Application Security Testing service scrutinizes mobile apps’ core code and dependencies to identify data processing, connections, vulnerabilities, risky activities and conclude on their security and compliance level.
• Audit from binary file
• Identification of behaviors and vulnerabilities
• Monitoring of regulatory and internal compliance
• Customizable security policy
• For Android and iOS
• Ready-to-use online platform / APIs
Behavior and vulnerability remediation
Correct vulnerabilities and remedy unwanted behaviors. When the testing of an app reveals non-compliances, our toolkit offers thorough guidance to correct vulnerabilities and a unique functionality to automatically remedy unwanted behaviors. This functionality can neutralize behaviors leading to geotracking, personal data manipulation, access to some features such as the camera, etc.
• Precise classification
• Indicators of criticity
• Actionable recommendations
Mobile Application Shielding
Harden mobile applications’ code to make it extremely complex to understand, decipher and tamper. Our shielding service uses a combination of techniques to prevent an application’s code from being cloned, injected, and tampered. It only requires a binary file to work its magic, making it far easier for organizations that externalize developments to other departments or subcontractors.
• Reverse-engineering prevention
• Tamper prevention and detection
Mobile Application Authentication
Detect fraudulent connections from fake apps and clones. Our app authentication mechanism controls every connection to your servers allegedly coming from your mobile application in a matter of millisecond. When a clone of your app or a fake app tries to impersonate yours, its connection attempts to your server will automatically fail.
• Real-time authentication
• Fake apps and clones neutralization
In-App Threat Defense
Empower mobile applications with threat detection and response capabilities. Our mobile security functionalities can be embedded into mobile apps through a ready-to-use SDK. Applications embedding Pradeo Security automatically assess the integrity of their execution environment and adapt their behavior accordingly. For example, when a threat is detected on a user’s device, access to critical services can be denied to prevent fraud.
• Easy to embed SDK
• Transparent security checks
• App, network and OS threat detection
• Customizable threat responses
Mobile security event collector
Monitor mobile applications’ threat landscape. Each industry is targeted by different threats. By monitoring threats surrounding and targeting their own application, organizations can get powerful mobile threat intelligence, deploy relevant countermeasures and perform effective incident investigation.
• App, network and OS threat monitoring
• Insightful threat intelligence
• SIEM integrations