Deep Instinct’s solution provides full protection for iOS security and Android security, based on multiple layers of protection. This includes a prediction & prevention first approach, followed by detection & response, against known and unknown cyber threats.
This is Prevention, Unlimited.
Uses deep learning, the most advanced AI technology. The Deep Static Analysis provides far greater accuracy than signature and heuristic solutions, and is more accurate than classical machine learning algorithms, which suffer from lower detection rates and higher false positives. D-Client predicts and prevents any malicious application, and can also perform a full app scan during the initial installation or on-demand. It can be configured to prevent or detect malicious apps, using different thresholds adapted to the organization’s needs.
An additional layer of mobile application security is based on file reputation, both for known malicious and benign apps.
Behavioral analysis capabilities that can detect and stop malicious business logics, including network attacks and certificate abuse.
Detects the behaviors of network attacks, including MitM (ARP Poisoning), SSL MitM, HOSTS file modification.
Detects the installation of new certificates that can be used to perform malicious activities.
Whitelist: Provides the ability to whitelist apps based on hash.
Android Applications (APK) are scanned to predict and prevent Ransomware, Infostealers, Rooters, Premium SMS/Calls, RAT, Worm, Network Redirectors, Botnets, Banking Trojans, Droppers, Backdoor, Coin-miners, PUAs and more. These attack types are mostly used for stealing information or gaining money.
Devices are monitored to verify they have not been exploited. This type of exploitation can contribute to the attacker obtaining better control to hide an attack or to get sensitive information. Devices are monitored for root/jailbreak, and the OS version is monitored to verify the device is up to date and known vulnerabilities that were patched, cannot be later exploited.
Attackers that have physical access to the device might find and upload private and sensitive data or impersonate the enduser. By enforcing different configurations (like Passcode, Encrypted Storage or Lock Screen Timeout), there is a reduced attack surface for the attacker to abuse.
Devices tend to be connected to wireless networks all the time. Various techniques that can be manipulated to perform malicious attacks on the network are monitored, such as MitM (ARP Poisoning), SSL MitM, HOSTS file modification and certificate abuse.
Learn more about Deep Instinct’s D-client for mobile cybersecurity