App Protector is a security technology built on or linked into an application runtime environment. It is capable of controlling application execution, early intrusion detection, and preventing real-time attacks.
The purpose of App Protector is to protect end-users if their device is detected to be compromised from any kind of misuse and to protect application owners from any repercussions of that misuse.
A key feature of App protector is to detect threats on the device where the specific application is installed and alert or neutralize those threats. These threats can be, for example, the jailbroken device or a device running in debug mode.
After these threats are detected, App Protector performs a predefined action for a specific threat (force stop the application or notify end user, for example). The set of actions for each threat is called an App Protector configuration. These actions are done without any human intervention, based on the App Protector configuration built within the application.
App Protector – React and protect!
App Protector is different from other security solutions because it keeps track of how your apps are behaving and the context of that behaviour. When the app starts having an unusual behaviour, App Protector immediately stops the application, mitigating all the potential risks, and starts sending alerts to your team and mobile device user – without any human intervention.
One other thing it can do is to distinguish actual attacks and legitimate requests for information – this reduces false positives.
App Protector monitors and protects an application even when it continually updates, and it gives you a complete insight into what is happening within your application.
Key benefits
-
Detection and prevention. App Protector offers the possibility to detect threats and react on security events in application runtime.
-
Modifying configurations. App Protector Portal enables modifications on App Protector configurations which are done immediately (on the fly) propagated to the application when online implementation is selected.
-
Collecting security events. All the information that App Protector Portal SDK detects can be forwarded to a 3rd party system (anti-fraud system, for example) which can then use this information as an additional source of information to, for example, clear a financial transaction.
-
Security events visibility. Reporting on security events is very important, and with App Protector Web Portal, reports are easily accessible and customizable.
-
BYOD (bring your own device). Protecting applications with App Protector can make BYOD less of a security challenge for an IT department.
-
Enabling regulatory compliance. Several regulations, such as PSD2, have set requirements to introduce security mechanisms within applications that mitigate the risk of running applications on tampered/compromised devices. App Protector is one of the security mechanisms that support organizations to comply with this kind of requirement.
-
Application integration and stability. App Protector implementation is smooth and easy, assuring that there is: no downtime, no risk of breaking an app, no source code changes, no false positives, no routine tuning, no unacceptable performance overhead. It can be integrated into old, proprietary applications or new ones.