English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Vulnerability Management

    Stop being an easy target

    Financial Services

    Can your security keep up with you?

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    PT Industrial Cybersecurity Suite

    PT ICS is an integrated platform for cyberthreat detection and response in industrial systems

    Utilities

    Industrial-grade cybersecurity

    ERP Security

    Take control of your ERP security

    Security Compliance

    Turn policies into protection

    View all →
  • Products
    MaxPatrol 8

    Vulnerability and compliance management system.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Application Inspector

    Source code analysis tool.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    PT Network Attack Discovery

    NDR system to detect attacks on the perimeter and inside the network.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    XSpider

    Vulnerability scanner.

    MaxPatrol VM

    Next-generation vulnerability management system.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures.

    PT MultiScanner

    Multilayered protection against malware attacks.

    PT BlackBox

    Dynamic application security testing tool

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    ATM Security Assessments

    Uncover Your Weaknesses

    Web Application Security Services

    Black Box and White Box Analysis

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Penetration Testing

    A Comprehensive Approach

    Forensic Investigation Services

    Prevent Future Incidents

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    View all →
  • Partners
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • Services
  • Mobile Application Security Services

Mobile Application Security Services

Security Analysis and Compliance Audit

About Service

Rapid growth of client–server applications developed for mobile platforms is transforming the way businesses and their customers interact with one another. But as the development of these applications is typically driven by functionality, user-friendly design, and corporate branding, security is often overlooked. Even when security is considered, a mobile application is still likely to contain vulnerabilities—and every update creates the opportunity for new vulnerabilities to be introduced.

The risks to organizations are enormous as breaches have the potential to cause significant financial losses and damage to corporate reputation. Particular industries, such as financial services, are under increased pressure since mobile e-banking applications must comply with strict industry regulations.

Mobile application security tests conducted by the experts at Positive Technologies provide you with an independent assessment of the level of security of your mobile applications. Our experts have extensive experience in mobile application security and a track record of over a decade in protecting networks of leading banks, global telecommunications providers, and industrial conglomerates.

Our mobile application security tests include:

Security Analysis of Client-Side Applications—using techniques and tools of our own design as well as the methodologies of recognized international organizations such as the Web Application Security Consortium (WASC) and the Open Web Application Security Project (OWASP). This assessment includes:

  • Automated examination of mobile applications
  • Manual search for vulnerabilities by Positive Technologies expertss
  • Systematic search for attack vectors that could successfully exploit identified vulnerabilitie
  • Analysis to determine the probability of fraudulent transactions

Compliance Audit of Server-Side Applications—monitoring for compliance with industry security standards and industry best practices.

For both server- and client-side applications, Positive Technologies carries out both gray-box security assessments (which simulate an attack by someone with user access to the application) and white-box security assessments (which include analysis of the source code and architecture of the application). While white-box testing is more time-consuming, it usually detects many more vulnerabilities.

Results

The key deliverable from our testing includes a report detailing:

  • A full list of vulnerabilities found (or evidence showing their absence)
  • Sample code demonstrating how identified vulnerabilities could be exploited
  • Recommendations on neutralizing identified vulnerabilities and reducing exposure
  • Advice on configuration and equipment settings to improve security
  • Suggestions on critical software updates and additional security measures

Contact us

By clicking Send you give your free and explicit consent to process your personal data and agree to our Privacy Policy

Company Services

  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control

Company Products

  • MaxPatrol VM
  • PT Sandbox
  • MaxPatrol SIEM All-in-One
  • XSpider
  • PT Network Attack Discovery
  • MaxPatrol SIEM
  • PT BlackBox
  • MaxPatrol 8
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT MultiScanner
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
Find us:
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap