Application protection from inside
The unique operating mechanisms of Promon Shield ensure protection of an application without the need to grant it any additional permissions or make unnecessary modifications to the code. This enables the Shield to cooperate with security features offered by operating systems.
Reduced risk of attacks
The solution monitors and detects whether an application is operating in a suspicious environment, such as a rooted (Android) or jailbroken (iOS) device. The Shield decreases the risk of overlay attacks, debuggers, emulators and other mechanisms used by cybercriminals targeting mobile applications.
Response to match the threat
Upon identifying a malicious activity, the protected application adjusts its operations in real-time to stop potential attacks. Types of response to this kind of signals include blocking the execution of the injected code, notifying security administrators and closing the infected application.