AsiaIPEX is a one-stop-shop for players in the IP industry, facilitating IP trade and connection to the IP world. Whether you are a patent owner interested in selling your IP, or a manufacturer looking to buy technologies to upgrade your operation, you will find the portal a useful resource.

Mobile App Vulnerability Detection and Security Certification Solution

Summary
Our technology helps developers and enterprises to uncover and fix security loopholes in mobile applications in few minutes.'Security' is a 'must have' benchmark of mobile application quality. We provide a sophisticated yet easy-to-use security 'audit-tool' for both source code and app binary file analysis. Our solution offers peace of mind to brand owners and the developers who create and maintain apps by doing regular security audits of their work, and alerting them to new vulnerabilities as they arise. 
Technology Benefits
Our solution is a completely automated tool with Continuous Integration. Developers prefer not to operate another standalone tool for security because it adds complexity to their already messy job. Continuous Integration test makes their life easier and reduces friction in adoption, removing complexity and the need of experience in security for their job. Our dashboard gives you details on the security issues in your mobile application and also suggests possible methods for remediation. A downloadable PDF report is generated which gives detailed insights about security vulnerabilities discovered. 
Technology Application
We scan mobile apps automatically, both before and after they are published.During the development phaseOur solution helps coders by offering a testing API that can be built into their continuous integration process. At the time of deliveryOur solution helps clients certify work product as part of the acceptance process. After publicationOur solution scans through app stores, reporting security flaws to the stores, and to the developers.  
Detailed Technology Description
How our solution worksCode AnalysisCode analysis covers basic coding practices, data flow and metrics which include OWASP configurations. Attacker's ApproachGoing a step further and using an attacker's approach to analyze your Network and Product's security.Easy RemediationEach vulnerability which is detected is prioritized according to its severity and impact.FeaturesStatic AnalysisProvides results in less than 5 minutes Dynamic AnalysisRealtime results along with user interaction Behavorial AnalysisMore than 85% code coverage with accurate results Multiple PlatformSupports both Android and iOS platforms
Application Date
05-Mar-2015
ID No.
TO11476
Country/Region
Singapore

For more information, please click Here
Mobile Device