Deep Instinct’s mobile security solution provides full protection for iOS security and Android security, based on multiple layers of protection. This includes a prediction & prevention first approach, followed by detection & response, against known and unknown mobile security threats.
This is Prevention, Unlimited.
Uses deep learning, the most advanced AI technology. The Deep Static Analysis provides far greater accuracy than signature and heuristic solutions, and is more accurate than classical machine learning algorithms, which suffer from lower detection rates and higher false positives. D-Client predicts security threats and prevents any malicious mobile application (APK). It can also perform a full app scan during the initial installation or on-demand. It can be configured to prevent or detect malicious apps, using different thresholds adapted to the organization’s needs.
An additional layer of mobile application security is based on file reputation, both for known malicious and benign apps.
Detects the behaviors on the device including Root/Jailbreak, OS version, and unwanted ways to install apps
Detects the behaviors of network attacks, including MitM, SSL MitM, HOSTS file modification, and certificate installation.
Whitelist: Provides the ability to whitelist apps based on hash.
Malicious Application Security
Android Applications (APK) are scanned to predict and prevent Ransomware, Infostealers, Rooters, Premium SMS/Calls, RAT, Worm, Network Redirectors, Botnets, Banking Trojans, Droppers, Backdoor, Coin-miners, PUAs and more. These attack types are mostly used for stealing information or gaining money.
Devices are monitored to verify they have not been exploited. This type of exploitation can contribute to the attacker obtaining better control to hide an attack or to get sensitive information. Devices are monitored for root/jailbreak, and the OS version is monitored to verify the device is up to date and known vulnerabilities that were patched, cannot be later exploited.
Mobile Endpoint Security
Attackers that have physical access to the device might find and upload private and sensitive data or impersonate the end-user. By enforcing different configurations (like Passcode, Encrypted Storage or Lock Screen Timeout), there is a reduced attack surface for the attacker to abuse.
Mobile Network Security
Devices tend to be connected to wireless networks all the time. Various techniques that can be manipulated to perform malicious attacks on the network are monitored, such as MitM (ARP Poisoning), SSL MitM, HOSTS file modification and certificate abuse.
Learn more about Deep Instinct’s D-client for mobile cyber security
Can we detect ARP poisoning, SSL stripping or any other MitM attacks?
Yes, our mobile application security can detect MitM attacks on Android and iOS, iPadOS devices.
Can I download the mobile cybersecurity solution from Apple AppStore/Google Play?
The mobile cybersecurity for Android devices is available on Google Play.
Can Deep Instinct detect malicious applications on iOS and iPadOS devices?
Yes, our security product can detect installed malicious applications on iOS and iPadOS devices. Deep Instinct understands that jailbreaking, malicious configuration profile, and enterprise certificates are the most advanced and popular attack vectors on iOS devices. Consequently, extensive efforts have been dedicated to provide the highest level of protection against these attack vectors.
Currently, we have the most advanced jailbreak detection capability, detection of iOS malware, and OS version monitoring. In the near future, we also plan to introduce our capabilities to protect against malicious configuration profiles and enterprise certificates.
How does the product influence performance and battery consumption?
Deep Instinct’s mobile endpoint security product has been designed to operate without any noticeable change to performance or battery consumption. Mobile security solution only runs when it is essential. It runs after installing an application while opening the user interface or performing a security check.