Securing Information on Mobile Platforms
In the last decade, mobile communications have gradually become the main means for personal communications worldwide. The improving mobile technology paved the way for migration of online services from PC to mobile, along with development of various new uses and applications.
Today, virtually our information is accessible from our mobile devices. Personal information, financial information, business information and in addition – our identity and our location.
The rise in the value of information accessible from mobile devices has brought a dramatic increase in cyber-attacks on mobile platforms. While the threat has become significant, the existing solutions for mobile security are not only very limited, but also limit the user’s mobile experience.
Mercury – Enterprise Mobile Device Protection
MERCURY is a powerful solution for enterprise mobile security, providing multiple defense layers to protect from malware attacks, physical extraction, interception and traffic manipulation attempts.
Inpedio designed MERCURY according the “Open Garden” approach. Integrated into the mobile Operating System, MERCURY seamlessly creates a secure environment, while allowing an unlimited mobile user experience.
Unlike other pinpoint solutions that handle only one vulnerable area, while susceptible to attacks over other channels, MERCURY is a multi-layer solution securing all vulnerable areas, assuring information and communication integrity:
Device: The first security layer protects the device itself – from local or remote attacks
Connectivity: This layer of security verifies trusted connections, eliminating the risk of network manipulations and tactical interception.
Communications: This layer of security provides encryption for various types of communications.
Comprehensive Anti-Malware functionality
Prevents malicious code from running on the device. The anti-malware mechanisms are in place throughout the lifecycle of a malware attack:
Exploitation: The solution prevents exploitation by implementing security patches for known exploits and altering processes that are vulnerable to attack.
Installation: The solution monitors installation processes regardless of their source (user initiated, system initiated) and stops unauthorized attempts for installation and change of device settings.
Operation: The solution inspects processes in real-time and kills unauthorized processes.
Traffic manipulation prevention
The solution prevents the network based attack methods by implementing additional verification:
TLS/SSL verification: the solution adds additional security mechanism for certificate (CA) management. The system ‘pins’ certificates to websites and servers and thus prevents Man in the Middle (MitM) attacks.
DNS poisoning detection: Many attacks employ re-direction techniques based on altering DNS responses. The solution examines DNS responses, thus preventing such an attack.
TCP injection prevention: The solution verifies the integrity of the TCP communications, preventing attackers to inject packets into an existing connection.
The solution verifies that the device connects only to recognized and authorized networks. This includes:
Rogue Wi-Fi hotspot detection: Connecting to a new hotspot requires user authorization. When re-connecting to a hotspot/network, the solution authenticates additional parameters of the hotspot to ensure it is the known network and not a rogue network.
Mobile interception detection: The solution detects abnormalities in behavior of the mobile network and suggests the user to and disconnection from rogue networks.
The function of this security layer is to enable secure communications between protected parties. When using independent app, the system establishes secure connection when available without the need for a specific encryption application.
The encryption is based on TLS cryptographic protocols, and for peer-to-peer (p2p) communications two-way authentication is always employed.
Following are the available communications:
Voice Call: When a voice call is initiated between 2 parties with a MERCURY secure phone, after authentication, a secure VoIP is initiated between both parties.
SMS: A sent SMS is encrypted by the sender with the recipients’ public key. Only the recipient (who has the matching private key) can open this encrypted message. If the sender does not have the recipients’ public key from previous communications, it is obtained by requesting authentication and key exchange from the recipient.
Offering valuable information on app activity, network connections and installed applications
mobile security benefits
Prevent cyber-attacks on the device – Malware attacks, physical extraction attempts and combined Advanced Persistent Threats (APTs) are detected and stopped, on the spot.
Deny access to information on the device – Information is not accessible if the device is stolen, confiscated or sent to forensics analysis. Access or extraction of information from it is denied.
Impede network threats – Interception and traffic manipulation attempts by rogue networks are detected and stopped, in real time.