Mobile Application Protection and Security

Mobile Abuse
Mobile Protection

Summary

Customers Choose ARXAN Because…We offer the world’s strongest application protection. Our approach is proven in the Market: Arxan is one of the most trusted names in application security. Our approach is unique and scalable. Arxan is a reliable and strong company heralded by customers and analysts

Product description

Arxan’s solutions offer continuous threat protection, which includes:

  • Application Protection: Automated security solution armed with unique patented guarding technology enables a program to combat application tampering by inserting a set of interdependent units of code called Guards®, into the program at the binary level. These Guards®:
    • Defend application against compromise via a range of techniques including: Advanced Obfuscation, Pre-Damage, String Encryption, Symbol Stripping, Renaming, Debug Info, Call Hiding
    • Detect attacks through Jailbreak or Root Detection, Resource Verification, Resource Encryption, Checksum, Debugger Detection, Swizzle Detection, Hook Detection, and other means
    • React to ward off attacks with Self-Repair, Custom Responses, and Alerts
  • Cryptographic Key Protection solution is highly secure and proven key protection technology. It is:
    • A sophisticated implementation of white-box cryptography.
    • Intended for any security system that employs cryptographic algorithms and keys executed in an open and untrusted environment, such as on a desktop computer, mobile device, or embedded system.

Application Protection & Security

Arxan’s Application Protection Solutions enable developers and security engineers to protect applications with the world’s strongest application protection solutions.

Arxan’s unique patented guarding technology:

  • Defends applications against compromise via a range of techniques including Code Obfuscation, Pre-Damage, Encryption, String Encryption, Symbol Stripping and Renaming
  • Detects attacks through Jailbreak or Root Detection, Resource Verification, Checksum, Debugger Detection, Swizzling/Hook Detection, and other means
  • Reacts to ward off attacks with Self-Repair, Custom Responses, and Alerts

 

 

Help the seller understand how this product meets your needs
Contact name
Contact Sales Office
E-mail
Contact our Office
Phone
(301) 968-4290
Location
USA/Japan
Company
Published