Solution Overviews

Datasheet: Cloakware® Mobile App Protection for Industrial IoT

Issue link: https://resources.irdeto.com/i/1125571

Contents of this Issue

Navigation

Page 0 of 1

Datasheet Last modification: 31-05-2019 / 03:43 am GMT+01:00 www.irdeto.com 1 © 2019 Irdeto. All Rights Reserved. CLOAKWARE® MOBILE APP PROTECTION FOR INDUSTRIAL IOT Renewable application security with software specific anti-hacking protection technologies Connected factories use mobile applications extensively today. It's all about increasing productivity and profitability, as well as eliminating unscheduled downtime through gathering and sharing/visualizing information effectively. Mobile applications are increasingly used to manage and control processes, assets and software updates on the factory floor. A mobile app device, such as an iOS or Android phone or tablet, is a hostile environment where potential hackers have the luxury of unfettered access, a suite of powerful hacking tools/techniques and unlimited time to devise an effective exploit. To take advantage of the efficiencies and benefits of increased connectivity, manufacturing companies are deploying mission critical applications to connect with devices in their OT ecosystem, many of them unmanaged. This increased connectivity to mobile devices is putting their intellectual property (IP), business model/ecosystem, and important processes and data/credentials at risk. Your applications are at risk Like many mobile applications across other markets, manufacturing applications can be reverse engineered, repackaged and redistributed, functionality changed by tampering, malware injected, your IP stolen, or they can simply be copied and/or cloned. Simple application protection like MDM/MAM app wrapping and authentication have proven to be inadequate. The protection can be incomplete, easily reversed, leaves the communication channels to OT devices insecure and doesn't address cloning. A successful security strategy for apps requires security inside the app, with a multi- layered approach, including data security at rest, in transit and during execution; network/API security; strong communications security; and robust software protection. IIoT applications will benefit from enhanced security by using Cloakware Mobile App Protection, which provides the enhanced security needed to conceal proprietary algorithms and secrets, cryptographic keys, valuable logic controller data, and credentials. Software Protection Cloakware's software hardening techniques provide application protection through sophisticated data, function and control flow transformations, anti-debug, whitebox cryptography, and active integrity verification, all working together to provide in depth security. KEY BENEFITS Effective security • Defends against reverse engineering, theft of secrets and tampering attacks • Automatically creates software diversity to protect against persistent and scripted attacks • Easily tune performance for optimum security within device constraints • Makes security inseparable from the software • Independently audited by customers, academics and ethical hacking service providers • Proven to provide effective protection for multibillion dollar mobile app-based ecosystems Ease of use • Integrates directly into standard mobile platform IDEs and build processes • Automated protections enable rapid deployment of security to critical areas of the software • Frustrate differential analysis attacks by easily renewing your keys, software and security measures with each update of your software • Does not affect application functionality and is transparent to application developers and users Broad platform support • Cloakware releases are synchronized with major platform updates to iOS and Android • Support for platform specific features for anti-debug, jailbreak, root detection, device fingerprinting, anti- hooking, etc. • Runtime Integrity Verification supports dynamic application binaries like iOS bitcode • Cloakware integrates seamlessly with Cloakware® Trusted Telemetry to provide threat analytics and early warning of cyber attacks • Supported languages & platforms include: • C, C++, Swift, Web Assembly, JavaScript • iOS & Android • Custom platform support on request

Articles in this issue

Links on this page

view archives of Solution Overviews - Datasheet: Cloakware® Mobile App Protection for Industrial IoT