Appaloosa & AppDome partner to deliver Mobile Application Management + Mobile Application Protection & Enhancement.
Key takeaways for both solutions:
- Deploy mobile apps privately to employees & partners
- Add Appaloosa's SDK in minutes with no code change
- Protect your apps from additional threats
Learn more from https://www.appaloosa-store.com/mobile_app_protection
2. > Presenters:
+Julien Ott, CEO – Appaloosa
+Amit Lavi, VP Product - AppDome
> Topics
+Joint solution presentation
+Focus on AppDome features & demo
+Q&A
Agenda
3. Appaloosa & AppDome are partnering
to help companies distribute and
protect enterprise mobile apps without
MDM.
Overview
4. Appaloosa
>Established in 2014 by a team of experts in
digital consulting
>Part of OCTO Technology, founded in 1998.
>Identified as leader by Gartner in Mobile
Application Management
>Delivered 4M apps to 170k+ enterprise
users
>Appaloosa.io
Company profiles
AppDome
>Established in 2012 by a team of industry
leaders in enterprise mobility &
cybersecurity
>Unmatched mobile App Fusion
technology works on iOS and Android
>Gartner’s Cool Vendor for Mobile
Security
>Key Investors: Menlo Ventures, JVP,
Draper Nexus
>Appdome.com
5. Upload any iOS/Android app on Appaloosa and get AppDome
protection within minutes before distribution.
31 4
How it works
2
Your app AppDome
AppFusion
Appaloosa
Dashboard
Appaloosa
App Store
6. > Add features to your app in minutes without code change
> Features
+Auto-upgrade: when the end-user launches the app and a new version is
available, upgrade will be performed
+Blacklist: prevents a lost/stolen device or terminated user from launching
your app
+Analytics: collect detailed usage stats about user activity, views, network
+Root/Jailbreak: prevent the launch of apps on rooted or jailbroken devices
Automated Appaloosa SDK fusion
7. Deploy apps with enterprise
authentication to protect access to
the store and apps
Measure app adoption and
engagement for each release
Improve your next version with
feedback and comments
Joint Benefits for Appaloosa+AppDome
Automatic fusion of Appaloosa
SDK into mobile app without a
need for integration
Top notch security, fusion
protects from cyber attacks e.g.
data leakage, man-in-the-middle,
phishing, malware, reverse
engineering
Short time to market – Fusion
process is done in minutes not
months
7
MIN
9. 9
9
Simple & Secure Enterprise Store
+
The Leading Mobile App Protection & Enhancement
Fuse & Use
10. 10
The Pain | Market Examples
Leading US Financial Institution – Consumer Mobile BankingApplication
Mobile is the new competitive battlefield
(bank branches are becoming irrelevant)
Bank’s mobile application exposed by platform and SDKs vulnerabilities
to confidential customer information leakage and circumvention
Potential $$ effect from a publicized breach and fraud – Huge
(e.g. Target’s breach)
Significant investment in secure coding practices; However…
11. 11
Secure Coding
Functionality UI/UX
Mobile Bank App Priorities Dilemma| Security vs. UX
Guard against introduction of security vulnerabilities (bugs
& logic flaws) during mobile application development (e.g.
SSL, authentication)
Secure Coding Practices
12. 12
Cyber Security
Attack vectors include:
o OS vulnerabilities
o Malicious Wi-Fi / cell attacks
o Vulnerable plugins / SDKs
o Known & unknown financial malwares
Cyber Security Gap
cannot be addressed by Secure Coding.
Secure Coding
Functionality UI/UX
Mobile Application Security | Challenges
13. 13
Cyber Security Cyber Security Gap
cannot be addressed by Secure Coding.
Secure Coding
Functionality UI/UX
Financial Mobile Application Security | Challenges
Out of hundreds of tested mobile apps
40% found vulnerable
for data at rest and data in transit attacks
14. 14
In the News
MAN IN THE MIDDLE
EXPOSED DATA
IMPERSONATION
IMPERSONATION
EXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
IMPERSONATION
IMPERSONATION
EXPOSED DATA
MAN IN THE MIDDLEEXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
IMPERSONATION
IMPERSONATION
EXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
16. 16
Operating System
Libraries
Attack Vector Example | Data-at-rest
o Mobile apps are composed of binaries and
resources, such as user interface and graphics
o Despite application container architecture
(Sandbox…)
§ Data moving acrossinterfaces and in
storage is accessible to maliciouscode
§ Data in storage can be compromised from
inside as well as from outside the device
17. 17
Employees Facing
Apps
Protect mobile apps from:
o Multilayer Protection
o No code change to the app –
o Outside development lifecycle
o Fuse & Use - Protect in minutes not months
o Facilitates regulatory compliance
Gain benefit of:
o Mobile Fraud
o Phishing
o Data Pharming
o Malware and mRAT
usingApp Fusion.
Enterprise
Apps
19. 19
AppDome SaaS Service
1
9
Customer / Enterprise
Facing App Development
7
MIN
AppDomeTM
Protection
Dynamic Fusion
Up to 7 min
via an Integrated
Web Service
Distributing via
Online Stores
AppDome
Protection Layer
Libraries
21. 21
AppDome
Secure Coding
Functionality UI/UX
AppDome | DynamicApp Fusion Benefits 2
1No SDK Integration
High performance
Dynamic App Fusion
Short time to market
Bridging the gap between
Functionality and Security
for existing and newly
developed appsSecurity Features Integrated
by App Fusion
Intrusion and malware detection
Data at rest encryption
Data in transit protection
22. 22
It is Time to Protect Your Enterprise Apps with AppDome
Protect your app from cyber attacks
Dynamic App Fusion within minutes
Compliance with regulations