Partners Offer Mobile App Vulnerability Testing
December 07, 2017
It’s a dangerous place out there. Hackers and other bad actors seem to be lurking everywhere. So it’s important for organizations that develop mobile apps to test their software for vulnerabilities before unleashing them on the world.
App-Ray and Kobiton have recently come together to help make that happen.
Kobiton runs a cloud-based lab through which developers and businesses can test their app security on actual mobile devices. And provides mobile security analysis tools that enable businesses to detect known and potential security issues within their apps.
"Businesses can not only test on the latest devices, but benefit from a full security review of their mobile app as part of our partnership with App-Ray," said Kevin Lee (News - Alert), Chief Executive Officer of Kobiton. "We are excited to give developers and businesses more tools to protect their apps and most importantly, their users."
Zsolt Nemeth, Founder and CEO of App-Ray, added: "We have extensive experience detecting vulnerabilities to hacking, data leaks and malicious code in iOS and Android (News - Alert) apps. Our fully-automated security analysis tool will ensure that apps tested on the Kobiton platform will be safe."
The Cybersecurity Trends 2017 Spotlight Report sponsored by an array of vendors, including Raytheon (News - Alert), indicates that
• 54% of cyber security professionals anticipate successful attacks on their organizations in the next 12 months
• 52% of them are boosting their security budgets by an average of 21%
• they plan to spend most of that on securing cloud infrastructure and applications, and on security training and mobile device security
• improved threat detection, better analytics, and threat blocking are considered top security priorities by those companies surveyed
• the top three cloud security concerns are data loss, threats to data privacy, and breaches of confidentiality
• and the biggest security concerns relative to mobility and bring-your-own device business strategies are data leakage or loss, the downloads of unsafe applications or content, and the introduction of malware into organizations’ IT environments.
Edited by Mandi Nowitz
Article comments powered by