Welcome!

@CloudExpo Authors: Bob Gourley, Elizabeth White, Liz McMillan, Pat Romanski, Sematext Blog

News Feed Item

Arxan Technologies Presents Next Generation Mobile App Attacks at Apps World North America 2013

Protecting the App Economy Requires a Rigorous Understanding of Key App Integrity Risks and Threats, Says CTO

SAN FRANCISCO, CA -- (Marketwire) -- 02/07/13 -- Arxan Technologies, the industry-leading provider of software security solutions that protect the global App Economy, announced today that Kevin Morgan, chief technology officer and vice president of engineering, will be a featured speaker at Apps World North America, the conference and expo that examines the new technologies, markets and channels driving innovation across the apps ecosystem: TV apps, gaming apps, web and cloud apps, HTML5 and automotive industry infotainment.

Arxan will also be exhibiting at the conference (booth # 121) which takes place today through Feb. 8 at Moscone Center West in San Francisco. The company will be demonstrating its Mobile Application Integrity Protection Suite which employs a multi-layer, defense-in-depth security approach to protect the mobile enterprise. In today's mobile environment, apps are exposed to next generation hacking attacks such as reverse-engineering, tampering, insertion of malware, repackaging, fraud, intellectual property theft, and piracy which can adversely affect revenue, business models and brand integrity.

Morgan will speak on the topic of "Mobile app security: myths, risks and recommendations" Feb. 7 at 4:10 p.m. PT in the Enterprise Zone, and will be joined by Domingo Guerra, president and founder, of Appthority and John Fellows, CTO, Kaazing. During the session, the expert panelists will discuss the state of security for mobile apps as mega trends such as BYOD for diverse operating systems continue to define a distinct threat landscape. Morgan will address next generation application risks that hackers launch on the mobile computing platform which compromise the overall integrity of an application. Mobile hackers target an enterprise's customized security logic, jailbreak/root detection, authentication, and proprietary algorithms that are critical components of their mobile app.

Enterprises are broadening their approach to meet the requirements of a robust mobile app security landscape. For instance, mobile app security must include comprehensive and complementary security layers comprised of app integrity protection, mobile device management (MDM) and mobile app management (MAM) to yield a strong defense.

The proliferation of mobile devices has created an app-centric global marketplace, ushering in the App Economy that is driving innovation, new business models, and revenue streams across all industries such as mobile financial services, digital entertainment, gaming, and automotive. Gartner expects 45 billion app downloads, as of the close of 2012, and for these to generate revenue of $15 billion. By 2016, it expects those figures to rise to 305 billion apps and $74 billion.

The growth in the App Economy has also led to new attack vectors and threats for which mitigation strategies are necessary to protect IP from theft, fraud, malware invasion and tampering. Arxan's App Integrity Protection Platform provides automated defend, detect and react capabilities by deploying various security techniques (called Guards) such as obfuscation, checksum or anti-debug directly into the software code of each app to protect binaries against discovery and compromise. The technology delivers resilient app integrity and defends against tampering and reverse-engineering of code and IP in a durable and proven manner which does not impact source code, application functioning or the development process.

To schedule a meeting with Arxan at Apps World North America 2013, please e-mail [email protected].

ABOUT ARXAN TECHNOLOGIES:
Arxan Technologies Inc. protects the App Economy with the world's strongest and most deployed application integrity protection platform. Arxan's application integrity protection is an integral part of end-to-end application security required for distributed environments such as mobile and tablet apps, packaged or embedded software, and any software running in untrusted environments. Arxan's unique, patented Guarding technology protects the integrity of applications against hacking attacks, such as reverse-engineering, tampering, insertion of malware/exploits, repackaging, intellectual property theft, fraud and piracy. Arxan-protected applications are in production on over 200 million devices by leading Fortune 500 organizations in high-tech, ISV, financial services, media, gaming, and other industries. The Guarding technology proactively protects sensitive or high-value applications by defending, detecting, alerting, and reacting to hacking attacks through a threat-based, customizable approach to yield self-defending and tamper-proof apps. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. For more information, please visit www.arxan.com.

Follow us @Arxan or http://www.linkedin.com/company/arxan-technologies

Arxan: Protecting the App Economy™. Share your thoughts on application protection using hashtag #protectyourapps

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
"We are a modern development application platform and we have a suite of products that allow you to application release automation, we do version control, and we do application life cycle management," explained Flint Brenton, CEO of CollabNet, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
"This is specifically designed to accommodate some of the needs for high availability and failover in a network managed system for the major Korean corporations," stated Thomas Masters, Managing Director at InfranicsUSA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.