Industry and Analyst Perspectives on Application Protection

Not sure if you really need to worry about protecting your application and specifically your binary code? Don’t take our word for it, see who’s advising to protect binary code. Leading analysts are identifying the need for binary protection for all sensitive and high value applications.

“The real security risk is in the mobile application layer. Even though the device and OS layers have published vulnerabilities, attackers are not actively targeting them to a degree that poses significant risk. This leaves the top layer of the security stack — the application layer — as the primary point of risk for a mobile device. Malware numbers increased dramatically between 2010 and the end of 2015“

Forrester: It’s Time To Level Up Your Mobile Application Security Program

March 25, 2015

“App hardening combines enhanced security checks with code obfuscation and encryption methods in order to increase resistance against malware and dedicated attackers. This type of protection cannot be achieved by wrappers and SDKs alone.”

Building Security into Mobile Apps Using Checklists, SDKs, App Wrapping, and App Hardening

March 24, 2016

“Security by obscurity cannot be the only answer, but adding some difficulty to the reverse- engineering exercise is paramount to protect from repackaged apps, theft of IP contained in the app, and advanced targeted threats. Apps that require high security — for example, transactional apps such as mobile wallets and sensitive enterprise apps — should employ hardening.”

Building Security into Mobile Apps Using Checklists, SDKs, App Wrapping, and App Hardening

March 24, 2016

“There isn’t enough emphasis on post-production security. Unfortunately, no matter how much due diligence and technical expertise we put into place, we can never prove that we’ve removed all security bugs from an application. However, application-wrapping software development kits, application hardening, and post-release security processes, by companies such as Arxan Technologies help raise the bar on the security of the solution after its release to the public. By implementing security on the mobile application package itself, it becomes more difficult to make development mistakes or to reverse-engineer the application and modify the functionality available to the user“

Forrester: Address The Top 10 Nontechnical Security Risks In Mobile App Development

January 20, 2016