Mi3 Security's mobile platform has two key differentiators: the DEPTH of risk intelligence we produce for applications and the SPEED at which we produce the Intelligence. The result is a full 360˚ security view of mobile app threats.
DEPTH of Risk intelligence
Mi3 Security has spent nearly half a decade creating the RECON Platform to aggregate and integrate mobile threat intelligence feeds across every possible mobile threat source. The platform analyzes everything from malicious Android and iOS frameworks to OWASP Top 10 threats to rogue brand infringement on torrent engines.
Speed of results
We heard our customers, and we listened. Mi3 Security has fine tuned the RECON Platform to analyze threats and uncover actionable risk conditions in record time; eleven minutes for iOS applications and six minutes for Android applications, ensuring rapid response for the most demanding app test environments.
One of the critical elements of the Internet economy is the act of validation or authenticating users. Whether it is to log in to your banking, email, social media or other services, you are required to authenticate to the system or device. Fingerprints and facial scanning are just starting to scratch the surface on what can be detected and measured that is unique to you.
2017 was an interesting year for mobile app security, including extensive activity around ransomware, cryptocurrencies and mining apps, rootkits and bootkits, and trojans. Beyond mobile we saw numerous breaches including the likes of Gmail, Docusign, Verizon and Equifax, where Equifax subsequently pulled it’s mobile apps post-breach due to finding previously undiscovered vulnerabilities.
So what will 2018 hold? Let’s take a look at a few trends.