The Mi3 RECON PLATFORM

 

The cloud-based Mi3 Security RECON Platform is the culmination of years of research, aggregating and integrating threat feeds across countless intelligence sources. From millions of scanned apps and a network of threat crawlers to correlations across apps and marketplaces, RECON covers it all.

 
 
Mi3 Security solves a critical problem in the mobile app market that represents a huge risk for every user but is often ignored…until after they are compromised.
— Sam Spadafora, Chairman KiK Interactive
 
 
mobile app threat analysis

DEEP APPLICATION THREAT ANALYSIS

The RECON Platform is a machine-learning engine that leverages a wide array of threat intelligences sources, combined with rapid binary application analysis, to deliver a concrete and actionable list of risk conditions. The information rich results can be managed and accessed via AppInterrogator, a powerful SaaS dashboard that enables enterprises and governments to stay ahead of downstream risk.

Don't take us at our word, scan an application. You'll see that in a matter of minutes we analysis and generate over 10 times the amount of risk intelligence than the size of the analyzed app. Additionally we present this information in an intuitive way to ensure you understand every aspect of application risk posture.

 
mobile app monitoring

CONTINUOUS APPLICATION MONITORING

The RECON Platform continuously monitors over 20 application marketplaces looking for new threats and risk correlations. Continuous monitoring underpins our capability to rapidly identify threats and assess risk conditions, ensuring enterprises have the latest actionable intelligence at their fingertips.

RECON also enables our Brand Protection service by continuously scanning for rogue or malicious versions of your important enterprise and customer applications, enabling rapid identification and take-down of illegitimate software.

 
cross-platform support

CROSS-PLATFORM SUPPORT

The RECON Platform supports both Apple iOS and Android operating systems, including supported IoT devices like the Apple Watch, Apple TV, and certain Android powered connected devices, and our support is continuously growing.

RECON maintains an extensive database of cross-platform threat intelligence including risky Android classes, malicious iOS frameworks, and known bad vendors.

 
Secure URL

URL REPUTATION & A/V ANALYSIS

The RECON Platform integrates with a multitude of URL Reputation feeds and Anti-Virus engines to ensure 3rd party threat information is incorporated as part of a holistic risk analysis.

By synchronizing with reputation and AV threat databases the RECON platform stays up-to-date across a broad spectrum of reporting malware, malicious sites, and vulnerabilities.

 
Torrent and file-sharing exploration

TORRENT AND FILE-SHARING EXPLORATION

The RECON platform doesn't stop at the edges of applications marketplaces or AV engines, but continues out into the underbelly of the Internet, scouring both torrent swarms and file-sharing services for evidence of malicious activity, brand misuse, and new threats or vulnerabilities that may impact the risk posture of applications in your environment.

LEARN ABOUT OUR INDUSTRY SOLUTIONS