Application protection from inside
The unique operating mechanisms of Promon SHIELD™ ensures protection of an application without the need to grant it any additional permissions or make unnecessary modifications to the code. This enables Promon SHIELD™ to cooperate with security features offered by operating systems.
Reduced risk of attacks
The solution monitors and detects whether an application is operating in a suspicious environment, such as a rooted (Android) or jailbroken (iOS) device. Promon SHIELD™ decreases the risk of threats such as overlay attacks, debuggers, emulators and other mechanisms used by cybercriminals targeting mobile applications.
Response to match the threat
Upon identifying a malicious activity, an application protected by Promon SHIELD™ will adjust its operations in real-time to stop potential attacks. Types of response to this kind of signals include blocking the execution of the injected code, notifying security administrators and closing the infected application.