Via terminal information collection module, mobile application risk perception module, mobile terminal third-party malicious attack perception module, mobile terminal danger perception module and collapse statistics module, we could monitor mobile application threat data in real-time and provide risk warnings.Contact Sales
The platform is divided into mobile application crawling layer, analysis engine layer, application risk behavior discovery layer, mobile application big data storage layer, risk big data analysis layer and big data presentation layer.
Locate the source, target, and process of attacks.
Attack statistics based on version, system, time, and network environment.
Control attacks based on application, versions, devices, etc.
Attack awareness, interface hijacking awareness, Gdbserver / Ida debugging awareness, Hijack / Inject injection detection, Maps monitoring, Zjdorid attack defense, Substrate plug-in attacks, terminal clearance, simulator operation awareness, terminal Root and other threat perception.
Mobile threat data collection, mining, visual display,and risk management integration service
Standard threat model + Customizable security model
Pan-security guarantee for all business
Multi-linkage, data sharing