Mi3 Security prides itself on having two key differentiators; the DEPTH of risk intelligence we produce for applications and the SPEED at which we produce those intelligence results.
DEPTH of Risk intelligence
Mi3 Security has spent nearly half a decade creating the RECON Platform to aggregate and integrate threat intelligence feeds across every possible threat source. The platform analyzes everything from malicious Android and iOS frameworks to OWASP Top 10 threats to rogue brand infringement on torrent engines.
Speed of results
We heard our customers, and we listened. Mi3 Security has fine tuned the RECON Platform to analyze threats and uncover actionable risk conditions in record time; eleven minutes for iOS applications and six minutes for Android applications, ensuring rapid response for the most demanding app test environments.
Mobility is now a big deal for the insurance industry. Some insurance companies have developed their own apps to help customers find an insurance agent, or take pictures of damage for claims. Others use third parties to produce mobile apps for both business-to-consumer and business-to-business markets. Unfortunately, all of them are at risk, reputationally or operationally, from mobile app disasters.
“Reckless beyond words” was how well-known whistleblower Edward Snowden recently described the possibility that the US government – more specifically, the CIA – hacked or hid vulnerabilities in mobile devices. He was responding to the release by WikiLeaks of more than 8,000 documents in early March 2017 with alleged details of CIA hacking activities.
Freedom? Security? The jury is still out on the question of which, if either, takes priority. Meanwhile, businesses are forging ahead with “bring your own device” (BYOD) and “bring your own app” (BYOA) policies. Cost reduction is one goal, but so are flexibility and choice for employees, letting them work the way they want to, and bringing businesses the benefit of increased productivity. Freedom gets everyone’s vote. However, employees and enterprises do not necessarily have the same perspective on mobile apps and security.