The power to see, analyze and manage risk in your mobile app’s entire installed base.
HackGuard ERM Features
Individual Endpoint Risk Scoring
Endpoints are a critical part of an organization’s attack surface. Mobile endpoints, in particular, have proven to be especially vulnerable – easy prey for hackers and often the initial entry point for sophisticated attacks.
Endpoint risk visibility is exactly what AppVision’s HackGuard provides. Every single device in your app’s installed base is individually analyzed and assigned its own individual risk score.
Experienced cybersecurity professionals know that mobile endpoints are often the first step in an Advanced Persistent Threat scenario, enabling attackers to establish a “beachhead”, then use dwell time to spread laterally, exfiltrate data and test system defenses in preparation for a much larger attack. That is why understanding the trustworthiness of the mobile endpoints connecting to your systems is so important.
Installed Base Risk Scoring
Gain visibility of the actual risk inherent in your app’s installed base as never before, with summary reporting from multiple perspectives. Not just your entire app installed base overall, but also segmented by: Geography. Device Brand, Operating System Level, Individual App and more.
Until you have detailed information about the health of the environments your app is operating in, your attack surface is expansive and your security team is blind.
Risk Profile Analysis
Would you like to better understand the risk lurking in your app’s installed base?
Thanks to HackGuard Endpoint Risk Management, now you can See, Monitor, and Compare your metric to industry benchmarks.
Gauge the results of your team’s efforts – watch as your metric improves over time.
Realtime Transaction Risk API
By tapping into HackGuard Endpoint Risk Management’s Realtime Transaction Risk API (RTR-API), organizations can effectively gauge the trustworthiness of every mobile app transaction – while the transaction is in-process.
RTR-API is simple to call, fully secured, and delivers an accurate response in milliseconds – even when servicing installed bases numbering over 100M endpoints and with transaction volumes in excess of 10,000 TPS.
HackGuard ERM Extends the HackGuard Enterprise Feature Set…
See critical health parameters for your app’s ENTIRE WORLDWIDE installed base, displayed in REALTIME!
Conveniently organized CHARTS, GAUGES, GRAPHS and DATAGRIDS enable you to instantly get a handle on the current health of your base, emerging trends and any areas of concern. Drag and drop, enlarge or rearrange the placement of the widgets to easily create your own favorite layout.
Realtime Attack Monitoring and Alerts
All important apps are CONSTANTLY under multiple forms of attack. Of course, this includes your app.
But here is the truly critical question — Are any of the attacks SUCCEEDING?
When this happens, you must determine as quickly as possible…
- Is the attack ISOLATED to just one or a few targeted users?
- Does the attack appear to be GROWING wider, possibly even systemic?
- Could the attack damage your entire installed base, making it an EXISTENTIAL THREAT to your company?
This is exactly the information that HackGuard Professional provides — INSTANTLY, in realtime, 24x7x365.
Your entire worldwide installed base is constantly MONITORED and you are ALERTED immediately and automatically at the first sign of trouble.
Rapid Attack Vector Analysis
You just received a realtime alert that your app installed base is under serious attack. You have questions…
- WHEN did it start?
- WHERE is it coming from?
- WHY is the attack working?
- HOW big might this attack grow?
- WHO in my installed base may be affected?
- WHAT can be done to mitigate damage?
Don’t panic — HackGuard Professional will provide you with quick, accurate answers to these critical questions.
Application Code Resilience
Protecting your app’s executable code — there is nothing more important or more fundamental to security — and this is EXACTLY what HackGuard does. HackGuard serves as the last, final, and most important security layer. Most importantly, it is effective REGARDLESS of the specific attack vector used. Whether attackers use any of the literally thousands of hack techniques already in the wild, or even if they use a new, Zero-Day technique — HackGuard still protects your app’s executable code from compromise.
Proactive Zero Day Protection
Zero Day vulnerabilities are the most feared attack vector — for a very good reason — because standard Antivirus technology simply cannot recognize a vulnerability that has never been seen before. It is effectively invisible. So any sort of REACTIVE response will never be triggered.
How can you possibly protect against Zero Day vulnerabilities?
The answer is to be PROACTIVE instead of REACTIVE — and when is the critical time to be proactive? At app launch! Each and every launch. Every time, with no exceptions. This is exactly what HackGuard does — proactively inspecting your app for any sign of tampering BEFORE it runs.
Deployed App Environment Discovery
HackGuard AUTOMATICALLY provides app publishers with accurate information about each and every end user device (and operating environment) on which their app is running.
Publishers can now ENJOY DETAILED VISIBILITY of their app’s usage across:
- Device Brands
- Device Types
- Device Models
- Operating System Versions
- Rooted or Jailbroken Status
- Memory Size
- Screen Resolution
- and much more…
Worldwide Installed App Visibility
Do not settle for seeing only HOW your app is running in WHAT technical environment.
It is also critical to know WHERE your app is running.
HackGuard shows you the geographic distribution of all your app installations — enabling you to easily:
- Pinpoint the current location of any individual app install
- See aggregate information of total installations by country
- Analyze how often users launch your app and learn how this behavior varies by geography
- Measure the ratio of app launches per app installations and see how this vital ratio is trending over time
App Base Demographics
Understand your installed app base as never before, with both detailed and summary reporting from multiple perspectives.
- See all the TYPES and BRANDS of devices that are running your app.
- See all the OPERATING SYSTEMS and specific versions used by your installed base.
- Take advantage of the ANALYSIS MATRIX to discover fine details, such as memory sizes, screen sizes, etc.
- See WHERE your app has been installed, and where it is currently launching from.
- Use this detailed demographic knowledge to GUIDE your development planning and testing efforts.
Monitor, measure and analyze app INSTALLATION and LAUNCH frequency over an UNLIMITED time, with daily, weekly, monthly resolution.
- VISUALLY track trends in your installed base growth.
- Use intelligent DATAGRIDS to analyze changes in base demographics over time.
- Visually track trends in app USAGE by your installed base over time.
- Automatically track historical “usage intensity” — the RATIO of launches per install.
HackGuard Enterprise easily INTEGRATES with popular Security Information and Event Management (SIEM) platforms and can also provide
- the information flow you need via:
- Common Event Format (CEF)
Customized Functionality for Your App — Just tell us what you need!
We recognize that not all apps are alike. What special requirements do you have? Describe everything necessary to ensure that your app is properly deployed, running optimally, and that any problems are diagnosed quickly and easily. We transform this information into a detailed specification that you approve, and then we build it for you.
App Health Monitoring
HackGuard Enterprise can monitor all of your app’s critical “health indicators”.
This includes both INTERNAL and EXTERNAL conditions.
Additionally, HackGuard Enterprise can also take ACTION based on specific health condition triggers.
There are many products that can analyze your app’s SOURCE CODE to find known vulnerabilities.
But consider this — DEPLOYED apps typically consist of 30% your code, and 70% other people’s code. This is because of your app’s dependencies on lower level code coming from:
- The Operating System
- The Device Manufacturer
- The Subscribed Carrier
- Common Third Party Library Providers
Even if you manage to keep your app’s source code free of vulnerabilities, by the time it is deployed as fully EXECUTABLE CODE, your app can inherit many vulnerabilities.
How it works…
- Super simple, super-fast, and zero risk.
- Causes absolutely no change to your app’s performance.
- Implement strong protection for your worldwide app base in under 60 seconds.
- It’s as easy as 1-2-3
- Download a file
- Confirm permissions
- Just add one simple line to your app’s code…