Welcome!

Release Management Authors: Liz McMillan, Jnan Dash, Lori MacVittie, Gilad Parann-Nissany, Carmen Gonzalez

News Feed Item

Arxan Application Protection Now Offered Through IBM

New Layer of Security Provides Mobile Applications With Binary-Level Protection Against Hackers and Malware

BETHESDA, MD -- (Marketwired) -- 06/10/14 -- Arxan Technologies, the industry-leading provider of software security solutions that protect the App Economy today announced that Arxan's mobile application protection offerings will now be sold by IBM as part of its portfolio of security products. Arxan Application Protection for IBM Solutions™ enables run-time protection, self-defense, and tamper-resistance inside mobile applications that run on all major platforms (including Apple iOS, Android, Windows Phone, Blackberry, and Tizen) by defending, detecting, and reacting to attacks and exploits. Enterprises and application developers are now able to leverage IBM's security solutions portfolio to build and keep applications secure with the seamless integration of App Hardening and Run-Time Protection into their mobile application security strategies.

Many leading application security consultancies and penetration testers recommend implementing protection against runtime manipulation and reverse engineering. Similar security advocacy is being echoed by respected analyst firms such as Gartner that states that, "for critical applications, such as transactional ones and sensitive enterprise applications, hardening should be used."(1) Yet, according to OWASP (The Open Web Application Security Project), 86 percent of mobile apps that were tested lacked binary hardening, leaving them vulnerable to information disclosure and other exploits. This has led to OWASP identifying "Lack of Binary Protections" as part of its Top Ten Mobile Risks announcement in 2014.(2) Moreover, recent research found that 78 percent of top mobile apps have been turned into hacked versions, showing how the hostile environment is now "the new normal" for un-protected apps.(3)

In contrast to centralized web environments, mobile applications live "out in the wild," on a distributed, fragmented, and unregulated mobile device ecosystem. Binary code in mobile applications can be directly accessed, examined, modified, and exploited by attackers, if not properly protected. This new environment attracts a number of new threats that are addressed by Arxan's proprietary, binary-level "guard" technology.

"Blocking hacking attacks on mobile applications requires a new layer of proactive security," said Mike Dager, CEO, Arxan Technologies. "Traditional application security practices alone, including safe coding practices, are no longer sufficient to protect mobile applications from these new binary vulnerabilities, as even flawless code can be reversed, modified, manipulated at run-time, or repackaged and distributed. With so much riding on pristine execution of applications, and so small a barrier for hackers to compromise the integrity and confidentiality of the applications, businesses are at significant risk for brand compromise, intellectual property loss or financial damage unless they include App Hardening and Run-Time Protection in their security approach.

"Arxan's App Hardening and Run-Time Protection serves a crucial role to protect applications from hackers and malicious exploits," said Caleb Barlow, Director of Application, Data and Mobile Security, IBM. "With the addition of Arxan, we offer clients a more integrated approach to security with a comprehensive solution portfolio from one vendor (IBM) to secure mobile applications. With IBM AppScan, we help clients build safe code during development and with Arxan, we help keep applications protected after their release and deployment out into the wild."

The combination of IBM AppScan and Arxan, in particular, brings a unique 'Scan and Protect' strategy for mobile application security, thus enabling a consistent, scalable approach to securing sensitive applications holistically. Arxan Application Protection for IBM Solutions is available via IBM's standard customer purchasing programs, such as IBM Passport Advantage, through IBM sellers and business partners. Arxan Application Protection support will be provided by IBM (through its first-line support offering, IBM Elite Support) and Arxan.

Arxan Application Protection for IBM Solutions is available from IBM in two versions:

  • The "Consumer and ISV" version is for protecting external-facing applications, such as business-to-consumer (B2C) and business-to-business (B2B) applications, as well as packaged software applications produced by independent software vendors (ISVs)
  • The "Enterprise Internal" version is for protecting internal-facing applications for employees and contractors of an enterprise (B2E applications)

For more information about the Arxan solution or to request a complimentary Arxan evaluation or proof of concept, please contact an IBM representative or email [email protected]. More information is available here. A short video that provides additional information about the application risks and solution is provided here.

ABOUT ARXAN TECHNOLOGIES
Arxan protects the App Economy from attacks in distributed or untrusted environments with the world's strongest and most deployed application protection products. Among today's diverse computing platforms, mobile and tablet apps and packaged or embedded software are all exposed to hacking attacks such as reverse-engineering, tampering, insertion of malware/exploits, repackaging, fraud, intellectual property theft, and piracy. Arxan's unique patented Guarding technology enables sensitive or high-value applications to proactively guard their own integrity by defending, detecting, alerting, and reacting to hacking attacks through a risk-based, customized protection. Arxan's self-defending and tamper-proof applications are deployed on more than 300 million devices by leading Fortune 500 organizations in high-tech, ISV, financial services, digital media, gaming, healthcare, and other industries. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. Visit us at www.arxan.com.

Follow Arxan: Protecting the App Economy™
Twitter: http://twitter.com/arxan
Blog: http://blog.arxan.com
LinkedIn: https://www.linkedin.com/company/arxan-technologies
Facebook: https://www.facebook.com/pages/Arxan-Technologies/290902575878

(1) Avoiding Mobile App Development Security Pitfalls, 24 May 2013, Gartner

(2) Top Ten Mobile Risks, 24 February 2014, OWASP (The Open Web Application Security Project)

(3) Arxan's State of Security research

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Things are changing so quickly in IoT that it would take a wizard to predict which ecosystem will gain the most traction. In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen: HomeKit, Brillo and Alljoyn. In his session at @ThingsExpo, Adam Justice, vice president and general manager of Grid Connect, will review what happens when smart devices don’t work togethe...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these idea...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...