S-0146
Promon Shield - Application Protection and Security for IoT & Connected Devices
Vulnerable apps connected to IoT devices can create safety issues, expose sensitive customer information and raise the risk for ID theft and fraud. Promon SHIELD™ prevent malware and hackers from getting to your sensitive data, and secure apps from a range of attack vectors, such as:
- Malware attempting a low-level takeover of a device
- Cloning scenarios for keys or unique identifiers
- Unauthorized access and Hijacking of application processes and functions
- Overlay malware and hacker-developed copies of the app login
- Fraudulent transactions
- OS Vulnerabilities
廣播
城市管理
氣象
工商業
發展
教育
就業及勞工
環境
財經
食物
衛生
房屋
基礎設施
法律及保安
人口
康樂及文化
社會福利
運輸
流動技術
App Shielding
1. Unchanged User Experience
Promon SHIELD™ protects multiple business apps while maintaining an optimal user experience. You won’t even notice it’s there!
2. Quick to Deploy
Promon SHIELD™ provides an automated implementation process. This allows organizations to quickly release protected apps, without affecting the development timeline!
3. Stay Compliant
Promon SHIELD™ upholds the strictest international compliance requirements (GDPR), and works on multiple platforms.
4. Enable Secure Mobile Strategy
Promon SHIELD™ proactively protects your apps against targeted attacks, allowing apps to run securely, even on highly infected devices.
5. Highly Secured Software Keys
Promon SHIELD™ protects sensitive data in the app and prevent cloning scenarios for keys or unique identifiers.
6. Prevent IP Theft
Promon SHIELD™ ensure that proprietary business logic can’t be reverse engineered, inspected, and/or stolen.
數合數據系統有限公司
9502 0980
Room 2101-2102, Technology Plaza, 651 King's Road, Hong Kong.
若政府部門欲對創科方案進行PoC試驗或技術測試,請聯絡Smart LAB。