Deep Instinct’s mobile security solution provides full protection for iOS security and Android security, based on multiple layers of protection. This includes a prediction & prevention first approach, followed by detection & response, against known and unknown mobile security threats.
This is Prevention, Unlimited.
Uses deep learning, the most advanced AI technology. The Deep Static Analysis provides far greater accuracy than signature and heuristic solutions, and is more accurate than classical machine learning algorithms, which suffer from lower detection rates and higher false positives. D-Client predicts security threats and prevents any malicious mobile application (APK). It can also perform a full app scan during the initial installation or on-demand. It can be configured to prevent or detect malicious apps, using different thresholds adapted to the organization’s needs.
An additional layer of mobile application security is based on file reputation, both for known malicious and benign apps.
Detects the behaviors on the device including Root/Jailbreak, OS version, and unwanted ways to install apps
Detects the behaviors of network attacks, including MitM, SSL MitM, HOSTS file modification, and certificate installation.
Whitelist: Provides the ability to whitelist apps based on hash.
Malicious Application Security
Android Applications (APK) are scanned to predict and prevent Ransomware, Infostealers, Rooters, Premium SMS/Calls, RAT, Worm, Network Redirectors, Botnets, Banking Trojans, Droppers, Backdoor, Coin-miners, PUAs and more. These attack types are mostly used for stealing information or gaining money.
Devices are monitored to verify they have not been exploited. This type of exploitation can contribute to the attacker obtaining better control to hide an attack or to get sensitive information. Devices are monitored for root/jailbreak, and the OS version is monitored to verify the device is up to date and known vulnerabilities that were patched, cannot be later exploited.
Mobile Endpoint Security
Attackers that have physical access to the device might find and upload private and sensitive data or impersonate the end-user. By enforcing different configurations (like Passcode, Encrypted Storage or Lock Screen Timeout), there is a reduced attack surface for the attacker to abuse.
Mobile Network Security
Devices tend to be connected to wireless networks all the time. Various techniques that can be manipulated to perform malicious attacks on the network are monitored, such as MitM (ARP Poisoning), SSL MitM, HOSTS file modification and certificate abuse.
Learn more about Deep Instinct’s D-client for mobile cyber security