Threat defense tools [that] use a mix of vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling and transport security technologies to defend mobile devices and applications from advanced threats.
Mobile devices are more than just small computers in continuous use with perpetual connections to the Internet. The operating paradigm of these devices calls for new approaches to ensure the data processed by them remains secure while maintaining productivity.
Skycure’ risk-based mobile security approach is designed from the ground up to defend against all threats that put business data at risk of exposure, theft and manipulation, while respecting users’ need for privacy, productivity and a great mobile experience.
Defense against all attack vectors
Apps are the lifeblood of every mobile device, and a key area of vulnerability. Malware can be delivered through unapproved, third-party app stores (sometimes via first-party app stores as well), personal computers or wirelessly via cellular, Wi-Fi or Bluetooth. Malware can look exactly like legitimate apps with no obvious indication of bad behavior.
Examples of Malware Risks:
Multi-layered detection and analysis based on a broad set of parameters, including signatures, user behavioral, static/dynamic analysis, source origin, structure, permissions, and 3rd party blacklists.
Crowd-sourced intelligence helps to identify legitimate and malicious apps
On-device detection and initial incremental app analysis, coordinating with the cloud-server as necessary for secondary analysis
Use Mobile App Reputation Service (MARS) strategies to determine app risk
Block installation of apps identified as suspicious or malicious
Mobile devices, unlike PCs, connect to tens or hundreds of different networks in the course of a week or a day, dramatically increasing the risk of exposure to malicious Man-in-the-Middle network-based attacks, or even just misconfigured routers that innocently expose sensitive business data to anyone who may come across it.
Examples of Network Risks:
Patented Active Honeypot technology instantly determines if any new network connection is properly configured and trustworthy.
Crowd-sourced intelligence helps to identify legitimate and malicious networks.
Under attack, automatically stop communicating with sensitive corporate resources using Selective Resource Protection (SRP). Non-sensitive communications remain active for personal productivity.
Secure Connection Protection (SCP) automatically activates Skycure or 3rd party VPN to encrypt all communications only for the duration of the attack.
No software is perfect. Hackers work diligently to identify the weak points that may be exploited before the developers discover them and patch them in updates. Vulnerabilities may be exploited through multiple entry points, including messaging, web links, malware, networks and others.
Skycure continuously monitors platform integrity through a broad array of checks and inspections
Machine learning assists in anomaly detection and behavioral profiling to determine malicious behavior and unauthorized activities within the device.
Skycure’s unique OS Upgradability feature informs IT teams of the available security updates event before Apple and Google
Mobile devices are much more likely to be lost or stolen than traditional computers, providing hackers with physical access to the device. EMM partners typically provide some of the basic physical security measures, such as lock and wipe, or Skycure offers lightweight MDM functionality if the customer does not have an EMM.
Examples of Physical Risks:
Stolen device - unauthorized access
Tight integration with all of the leading EMM vendors
Bi-directional communications about device compliance for policy enforcement
Skycure provides limited MDM functionality when no EMM is in place.
Learn about all of the mobile threat vectors in the SANS Institute white paper.