Deep Instinct is revolutionizing cybersecurity with its unique Deep learning Software – harnessing the power of deep learning architecture and yielding unprecedented prediction models, designed to face next generation cyber threats.

Advanced Mobile Security

Deep Instinct’s mobile security solution provides full protection for iOS security and Android security, based on multiple layers of protection. This includes a prediction & prevention first approach, followed by detection & response, against known and unknown mobile security threats.

This is Prevention, Unlimited.

PRE-EXECUTION:
PRE-EXECUTION: Predict & Prevent
ON-EXECUTION:
ON-EXECUTION: Detect & Automatically Respond
POST-EXECUTION:
POST-EXECUTION: Automatically Analyze & Remediate
PRE-EXECUTION:
PRE-EXECUTION: Predict & Prevent
Deep Static Analysis

Deep Static Analysis

Uses deep learning, the most advanced AI technology. The Deep Static Analysis provides far greater accuracy than signature and heuristic solutions, and is more accurate than classical machine learning algorithms, which suffer from lower detection rates and higher false positives. D-Client predicts mobile security threats and prevents any malicious application. It can also perform a full app scan during the initial installation or on-demand. It can be configured to prevent or detect malicious apps, using different thresholds adapted to the organization’s needs.

Deep Static Analysis
D-Cloud File Reputation

D-Cloud File Reputation

An additional layer of mobile application security is based on file reputation, both for known malicious and benign apps.

D-Cloud File Reputation
ON-EXECUTION:
ON-EXECUTION: Detect & Automatically Respond
Deep Behavioral Analysis

Deep Behavioral Analysis

Behavioral analysis capabilities that can detect and stop malicious business logics, including network attacks and certificate abuse.

Network Attacks
Detects the behaviors of network attacks, including MitM (ARP Poisoning), SSL MitM, HOSTS file modification.

Certificate Abuse
Detects the installation of new certificates that can be used to perform malicious activities.

Deep Behavioral Analysis
Compliance

Compliance

  • Detects Rooted/Jailbreak devices
  • Monitors OS version
  • Passcode, Encrypted Storage, Lock Screen Timeout (physical access attacks)
  • Unknown Sources, USB Debugging (unwanted ways to install applications)
Compliance
POST-EXECUTION:
POST-EXECUTION: Automatically Analyze & Remediate
Remediation

Remediation

Whitelist: Provides the ability to whitelist apps based on hash.

Remediation

Attack Vectors Covered

Malicious Application Security

Android Applications (APK) are scanned to predict and prevent Ransomware, Infostealers, Rooters, Premium SMS/Calls, RAT, Worm, Network Redirectors, Botnets, Banking Trojans, Droppers, Backdoor, Coin-miners, PUAs and more. These attack types are mostly used for stealing information or gaining money.

Exploits

Devices are monitored to verify they have not been exploited. This type of exploitation can contribute to the attacker obtaining better control to hide an attack or to get sensitive information. Devices are monitored for root/jailbreak, and the OS version is monitored to verify the device is up to date and known vulnerabilities that were patched, cannot be later exploited.

Mobile Endpoint Security

Attackers that have physical access to the device might find and upload private and sensitive data or impersonate the end-user. By enforcing different configurations (like Passcode, Encrypted Storage or Lock Screen Timeout), there is a reduced attack surface for the attacker to abuse.

Mobile Network Security

Devices tend to be connected to wireless networks all the time. Various techniques that can be manipulated to perform malicious attacks on the network are monitored, such as MitM (ARP Poisoning), SSL MitM, HOSTS file modification and certificate abuse.

Download the datasheet

Learn more about Deep Instinct’s D-client for mobile cyber security

Learn a bit more. Watch the demo