The Mobile SDK goes beyond gathering IP information by capturing Wi-Fi, cellular and GPS details. These are then compared to IP address information, such as True IP, Proxy IP and DNS IP, to detect anomalous connections and the use of proxies and VPNs.
Our Mobile Data Security solution gathers a gamut of device attributes including operating system information, system configuration information, hardware and software details and proprietary identifiers. These strong and consistent identifiers enable our solution to reliably distinguish both new and returning devices.
All connecting Android devices are analyzed to gain deep insight into the reputation of each installed application. Known, trusted applications are seamlessly identified in real time, along with any application containing malware or a poor associated reputation. These benefits also apply to the host iOS app that the Mobile SDK is embedded in.
Anomaly and Device Spoofing Detection
The Mobile SDK detects device tampering as well as attempts to masquerade as a different device, along with a number of other anomalies that may indicate fraud. It can also detect anomalous transactions from mobile devices, including those compromised by malware.
Jailbreak and Root Detection
The mobile SDK allows businesses to detect jailbroken devices. Cybercriminals typically jailbreak stolen mobile devices to gain full access to the original owner’s personal information. Additionally, sophisticated attacks can remotely jailbreak end users’ mobile devices to set up Man-in-the-Middle attacks and easily compromise sensitive information.
Application Integrity Evaluation
The Mobile SDK for mobile/endpoints performs an integrity check of applications in which it is embedded and verifies they are unmodified. This helps identify unofficial or illicitly modified applications and verifies application integrity.