Promon

Promon protects iOS and Android mobile apps from reverse engineering, tampering, and other threats.

Protecting mobile apps that run within untrusted environments is ever more crucial as mobile become ubiquitous. Hackers and their targeted malware is an increasing threat to the mobile revolution. With the explosive growth of the mobile channel and user demand for anytime/anywhere access to mobile services, app providers are challenged to keep up with security, which increases exposure to malicious attacks.

Promon Shield is a proactive solution designed to stop malware attacks before they do any harm, without changing the customer experience. Promon focuses on vulnerabilities rather than threats. Promon Shield is therefore able to ensure a safe mobile banking experience, even on devices that have been compromised or vulnerabilities caused by the user.

Promon Shield proactively protects your apps against targeted attacks, allowing apps to run securely. If a hacker attacks, Promon Shield will respond by taking necessary measures to fully protect your apps. Promon Shield provides an automated implementation process. Once integrated, Promon Shield sifts through the business logic, event and data flows of the app, before binding itself to existing code. This allows organizations to quickly release protected apps, without affecting the development timeline!

Benefits

Application protection from inside

The unique operating mechanisms of Promon Shield ensure protection of an application without the need to grant it any additional permissions or make unnecessary modifications to the code. This enables the Shield to cooperate with security features offered by operating systems

Reduced risk of attacks

The solution monitors and detects whether an application is operating in a suspicious environment, such as a rooted (Android) or jailbroken (iOS) device. The Shield decreases the risk of overlay attacks, debuggers, emulators and other mechanisms used by cybercriminals targeting mobile applications.

Response to match the threat

Upon identifying a malicious activity, the protected application adjusts its operations in real-time to stop potential attacks. Types of response to this kind of signals include blocking the execution of the injected code, notifying security administrators and closing the infected application