Welcome!

Mobile IoT Authors: Yeshim Deniz, Liz McMillan, Elizabeth White, Zakia Bouachraoui, Pat Romanski

News Feed Item

Arxan, Symantec and Twitter to Discuss Key Mobile Application Security Strategies to Defend Against the Latest Threats: Application Attacks

Leading Security Experts to Explore Today's Threat Landscape in the App Economy and Offer Key Insights on Counter Measures to Rising App Attacks, Such as Malware

BETHESDA, MD -- (Marketwire) -- 11/28/12 -- Arxan Technologies, a leading provider of software security solutions that protect the global App Economy, announced today it will participate in a mobile application security webinar with Symantec and Twitter to address the latest security threats to the App Economy as organizations adopt mobile devices to deliver sensitive data and applications to consumers, partners and employees. The expert panel will also provide insight on proven risk mitigation best practices for organizations to defend against the growing number of application attack vectors.

The "Mobile Application Security: How to Respond to the Latest Threats" webinar takes place today (Nov. 28) at 10 a.m. EST. To register, please visit: http://www.bankinfosecurity.com/webinars/mobile-application-security-how-to-respond-to-latest-threats-w-304

Participating in the webinar are Dr. Hoi Chang, vice president of technology and chief software architect, Arxan Technologies, Brian Duckering, senior manager - Enterprise Mobility, Symantec, and famed security researcher Charlie Miller, security engineer for Twitter.

Organizations are deploying mobile applications to run critical processes or deliver services through web, client or hybrid apps. As highly critical sectors, such as the financial industry, continue to innovate via the adoption of new mobile services, such as mobile banking, peer-to-peer transactions or bill payment, the underlying consumer-facing or internal applications that reside in or communicate with mobile devices, now host tremendous value and functionality. The application layer for Android, BlackBerry, iOS, Windows Phone, etc. mobile devices has become a clear target for hackers and is subject to both vulnerability-based attacks which exploit programming flaws as well as a new array of reverse-engineering and tampering attacks, such as malware, which compromise overall application integrity.

Mobile device security and application management measures need to be augmented by proven mobile app security strategies, including application hardening. Today's global hackers can easily disarm the various layers of an organization's mobile security framework, such as jailbreak detection or authentication logic, enabling the theft of sensitive user credentials to commit fraud and inflict damage resulting in financial losses or brand compromise. App integrity requirements to protect against malware insertion are paramount and require security at the binary level to defend against app hacking attacks and to enable organizations to deploy self-defending, tamper-proof mobile apps.

The webinar will address:

  • The current threat landscape, including exploitations, and mobile malware, app reverse engineering and tampering;
  • How to ensure use of secure mobile applications;
  • How to target mobile security defense to protect not just the device, but the data and apps.

Webinar attendees will learn:

  • Counter measures to thwart the top mobile application security threats;
  • How to separate fact from fiction concerning mobile malware and its threat to data and apps;
  • Why mobile device management and mobile application management require complementary security strategies to fully protect apps; and,
  • How to re-train organizational security teams to overcome the inherent challenges of managing, developing and securing mobile apps.

Arxan's proven security for mobile, embedded, desktop and server computing environments protect critical sectors such as financial services software with best of breed anti-tamper and anti-reverse engineering technology. The company's multi-layered and multi-platform protection consists of a variety of security technologies, including passive and active defenses such as: obfuscation, anti-debug, repair, self-healing and anti-tamper to ensure durability, resiliency and performance in the field.

ABOUT ARXAN TECHNOLOGIES:
Arxan Technologies Inc. is the industry leader of application protection solutions that protect the App Economy. Arxan secures mobile, desktop, server and embedded applications against tampering and reverse-engineering attacks and is an integral part of end-to-end application security. Our security defends against tampering, unauthorized use, insertion of exploits, piracy, and theft of intellectual property for global leaders in markets such as Fortune 500 enterprises, financial services, ISVs, gaming and digital media to proactively defend the integrity of their code and business models. Arxan's proven, scalable and durable application protection solutions defend, detect, alert and react to application attacks through a threat-based, customizable approach. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. For more information, please visit www.arxan.com.

Follow us @Arxan or http://www.linkedin.com/company/arxan-technologies

Arxan: Protecting the App Economy™. Share your thoughts on application protection using hashtag #protectyourapps

Add to Digg Bookmark with del.icio.us Add to Newsvine

CONTACT:
Arxan Technologies, Inc.
Jodi Wadhwa
Phone: +1-301-968-4295
[email protected]

Lutz PR for Arxan
Erin Lutz
Phone: +1-949-293-1055
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and G...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...