Welcome!

Open Web Authors: Carmen Gonzalez, Mark R. Hinkle, Elizabeth White, Pat Romanski, PR.com Newswire

News Feed Item

Arxan Application Protection Now Offered Through IBM

New Layer of Security Provides Mobile Applications With Binary-Level Protection Against Hackers and Malware

BETHESDA, MD -- (Marketwired) -- 06/10/14 -- Arxan Technologies, the industry-leading provider of software security solutions that protect the App Economy today announced that Arxan's mobile application protection offerings will now be sold by IBM as part of its portfolio of security products. Arxan Application Protection for IBM Solutions™ enables run-time protection, self-defense, and tamper-resistance inside mobile applications that run on all major platforms (including Apple iOS, Android, Windows Phone, Blackberry, and Tizen) by defending, detecting, and reacting to attacks and exploits. Enterprises and application developers are now able to leverage IBM's security solutions portfolio to build and keep applications secure with the seamless integration of App Hardening and Run-Time Protection into their mobile application security strategies.

Many leading application security consultancies and penetration testers recommend implementing protection against runtime manipulation and reverse engineering. Similar security advocacy is being echoed by respected analyst firms such as Gartner that states that, "for critical applications, such as transactional ones and sensitive enterprise applications, hardening should be used."(1) Yet, according to OWASP (The Open Web Application Security Project), 86 percent of mobile apps that were tested lacked binary hardening, leaving them vulnerable to information disclosure and other exploits. This has led to OWASP identifying "Lack of Binary Protections" as part of its Top Ten Mobile Risks announcement in 2014.(2) Moreover, recent research found that 78 percent of top mobile apps have been turned into hacked versions, showing how the hostile environment is now "the new normal" for un-protected apps.(3)

In contrast to centralized web environments, mobile applications live "out in the wild," on a distributed, fragmented, and unregulated mobile device ecosystem. Binary code in mobile applications can be directly accessed, examined, modified, and exploited by attackers, if not properly protected. This new environment attracts a number of new threats that are addressed by Arxan's proprietary, binary-level "guard" technology.

"Blocking hacking attacks on mobile applications requires a new layer of proactive security," said Mike Dager, CEO, Arxan Technologies. "Traditional application security practices alone, including safe coding practices, are no longer sufficient to protect mobile applications from these new binary vulnerabilities, as even flawless code can be reversed, modified, manipulated at run-time, or repackaged and distributed. With so much riding on pristine execution of applications, and so small a barrier for hackers to compromise the integrity and confidentiality of the applications, businesses are at significant risk for brand compromise, intellectual property loss or financial damage unless they include App Hardening and Run-Time Protection in their security approach.

"Arxan's App Hardening and Run-Time Protection serves a crucial role to protect applications from hackers and malicious exploits," said Caleb Barlow, Director of Application, Data and Mobile Security, IBM. "With the addition of Arxan, we offer clients a more integrated approach to security with a comprehensive solution portfolio from one vendor (IBM) to secure mobile applications. With IBM AppScan, we help clients build safe code during development and with Arxan, we help keep applications protected after their release and deployment out into the wild."

The combination of IBM AppScan and Arxan, in particular, brings a unique 'Scan and Protect' strategy for mobile application security, thus enabling a consistent, scalable approach to securing sensitive applications holistically. Arxan Application Protection for IBM Solutions is available via IBM's standard customer purchasing programs, such as IBM Passport Advantage, through IBM sellers and business partners. Arxan Application Protection support will be provided by IBM (through its first-line support offering, IBM Elite Support) and Arxan.

Arxan Application Protection for IBM Solutions is available from IBM in two versions:

  • The "Consumer and ISV" version is for protecting external-facing applications, such as business-to-consumer (B2C) and business-to-business (B2B) applications, as well as packaged software applications produced by independent software vendors (ISVs)
  • The "Enterprise Internal" version is for protecting internal-facing applications for employees and contractors of an enterprise (B2E applications)

For more information about the Arxan solution or to request a complimentary Arxan evaluation or proof of concept, please contact an IBM representative or email [email protected]. More information is available here. A short video that provides additional information about the application risks and solution is provided here.

ABOUT ARXAN TECHNOLOGIES
Arxan protects the App Economy from attacks in distributed or untrusted environments with the world's strongest and most deployed application protection products. Among today's diverse computing platforms, mobile and tablet apps and packaged or embedded software are all exposed to hacking attacks such as reverse-engineering, tampering, insertion of malware/exploits, repackaging, fraud, intellectual property theft, and piracy. Arxan's unique patented Guarding technology enables sensitive or high-value applications to proactively guard their own integrity by defending, detecting, alerting, and reacting to hacking attacks through a risk-based, customized protection. Arxan's self-defending and tamper-proof applications are deployed on more than 300 million devices by leading Fortune 500 organizations in high-tech, ISV, financial services, digital media, gaming, healthcare, and other industries. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. Visit us at www.arxan.com.

Follow Arxan: Protecting the App Economy™
Twitter: http://twitter.com/arxan
Blog: http://blog.arxan.com
LinkedIn: https://www.linkedin.com/company/arxan-technologies
Facebook: https://www.facebook.com/pages/Arxan-Technologies/290902575878

(1) Avoiding Mobile App Development Security Pitfalls, 24 May 2013, Gartner

(2) Top Ten Mobile Risks, 24 February 2014, OWASP (The Open Web Application Security Project)

(3) Arxan's State of Security research

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories

SUNNYVALE, Calif., Oct. 20, 2014 /PRNewswire/ -- Spansion Inc. (NYSE: CODE), a global leader in embedded systems, today added 96 new products to the Spansion® FM4 Family of flexible microcontrollers (MCUs). Based on the ARM® Cortex®-M4F core, the new MCUs boast a 200 MHz operating frequency and support a diverse set of on-chip peripherals for enhanced human machine interfaces (HMIs) and machine-to-machine (M2M) communications. The rich set of periphera...

The Internet of Things (IoT) is making everything it touches smarter – smart devices, smart cars and smart cities. And lucky us, we’re just beginning to reap the benefits as we work toward a networked society. However, this technology-driven innovation is impacting more than just individuals. The IoT has an environmental impact as well, which brings us to the theme of this month’s #IoTuesday Twitter chat. The ability to remove inefficiencies through connected objects is driving change throughout every sector, including waste management. BigBelly Solar, located just outside of Boston, is trans...
SYS-CON Events announced today that Matrix.org has been named “Silver Sponsor” of Internet of @ThingsExpo, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Matrix is an ambitious new open standard for open, distributed, real-time communication over IP. It defines a new approach for interoperable Instant Messaging and VoIP based on pragmatic HTTP APIs and WebRTC, and provides open source reference implementations to showcase and bootstrap the new standard. Our focus is on simplicity, security, and supporting the fullest feature set.
Predicted by Gartner to add $1.9 trillion to the global economy by 2020, the Internet of Everything (IoE) is based on the idea that devices, systems and services will connect in simple, transparent ways, enabling seamless interactions among devices across brands and sectors. As this vision unfolds, it is clear that no single company can accomplish the level of interoperability required to support the horizontal aspects of the IoE. The AllSeen Alliance, announced in December 2013, was formed with the goal to advance IoE adoption and innovation in the connected home, healthcare, education, aut...
SYS-CON Events announced today that Red Hat, the world's leading provider of open source solutions, will exhibit at Internet of @ThingsExpo, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Red Hat is the world's leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, middleware, storage and virtualization technologies. Red Hat also offers award-winning support, training, and consulting services. As the connective hub in a global network of enterprises, partners, a...
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic strategies that utility/cloud computing provides. Whether public, private, or in a hybrid form, clo...
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation and integration; and visibility through intelligent business operations and big data.
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Be Among the First 100 to Attend & Receive a Smart Beacon. The Physical Web is an open web project within the Chrome team at Google. Scott Jenson leads a team that is working to leverage the scalability and openness of the web to talk to smart devices. The Physical Web uses bluetooth low energy beacons to broadcast an URL wirelessly using an open protocol. Nearby devices can find all URLs in the room, rank them and let the user pick one from a list. Each device is, in effect, a gateway to a web page. This unlocks entirely new use cases so devices can offer tiny bits of information or simple i...
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, will address the big issues involving these technologies and, more important, the results they will achieve. How important are public, private, and hybrid cloud to the enterprise? How does one define Big Data? And how is the IoT tying all this together?
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce the value of the network in helping organizations to maximize their company’s cloud experience.
TechCrunch reported that "Berlin-based relayr, maker of the WunderBar, an Internet of Things (IoT) hardware dev kit which resembles a chunky chocolate bar, has closed a $2.3 million seed round, from unnamed U.S. and Switzerland-based investors. The startup had previously raised a €250,000 friend and family round, and had been on track to close a €500,000 seed earlier this year — but received a higher funding offer from a different set of investors, which is the $2.3M round it’s reporting."
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. Over the summer Gartner released its much anticipated annual Hype Cycle report and the big news is that Internet of Things has now replaced Big Data as the most hyped technology. Indeed, we're hearing more and more about this fascinating new technological paradigm. Every other IT news item seems to be about IoT and its implications on the future of digital busines...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
The Internet of Things needs an entirely new security model, or does it? Can we save some old and tested controls for the latest emerging and different technology environments? In his session at Internet of @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review hands-on lessons with IoT devices and reveal privacy options and a new risk balance you might not expect.
IoT is still a vague buzzword for many people. In his session at Internet of @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, will discuss the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. The presentation will also discuss how IoT is perceived by investors and how venture capitalist access this space. Other topics to discuss are barriers to success, what is new, what is old, and what the future may hold.
Swiss innovators dizmo Inc. launches its ground-breaking software, which turns any digital surface into an immersive platform. The dizmo platform seamlessly connects digital and physical objects in the home and at the workplace. Dizmo breaks down traditional boundaries between device, operating systems, apps and software, transforming the way users work, play and live. It supports orchestration and collaboration in an unparalleled way enabling any data to instantaneously be accessed on any surface, anywhere and made interactive. Dizmo brings fantasies as seen in Sci-fi movies such as Iro...
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other mach...
This Internet of Nouns trend is still in the early stages and many of our already connected gadgets do provide human benefits over the typical infotainment. Internet of Things or IoT. You know, where everyday objects have software, chips, and sensors to capture data and report back. Household items like refrigerators, toilets and thermostats along with clothing, cars and soon, the entire home will be connected. Many of these devices provide actionable data - or just fun entertainment - so people can make decisions about whatever is being monitored. It can also help save lives.