Mobile security benefits that make you smile
Know your app security intelligence solution delivers the industry’s most comprehensive insights, even for the latest OS versions, in minutes
Make risk-based decisions during software development or deployment of 3rd party apps based on real-world mobile app intelligence
Scan all mobile apps to remediate malicious code in order to prevent supply chain attacks and breaches that undermine national security
Quokka’s app scanning technology identifies backdoors in mobile apps and devices – and where data will be sent.
“Of the 33 mobile apps evaluated by Quokka (formerly Kryptowire), 32 had security or privacy concerns (access to camera, contacts, or SMS messages); 18 of the apps contained critical flaws (hardcoded credentials stored in the app, app accepts all SSL certificates, and is susceptible to man-in-the-middle attacks).”
Department of Homeland Security Science and Technology Directorate
BYOD Guidelines – Quokka (then Kryptowire) participated in creating the NIST Special Publication 1800-22 and its insights and technologies were part of the example solutions used in the guide under the Cooperative Research and Development Agreement
Quokka (then Kryptowire) contributed automated analysis using proprietary mobile app vetting infrastructure
Protection Profile for App Vetting – Quokka has worked with federal agencies to meet both the functional and assurance requirements outlined in this profile
“The Quokka platform is the only platform validated to support NIAP mobile application security standards on the market and power[s] the industry’s first FedRAMP-certified CISA Mobile App Vetting program available to the Federal Civilian Executive Branch Agencies.”
Josh Slattery, VP of Technology Sales, Vertosoft
Federal Partners
Rely on the industry’s only proprietary, defense-grade app scanning engines that uncover more security, privacy, and malicious behavior findings than any other app testing tool
External code fetches, websites visits, network traffic
Hard coded keys, Weak hash, Insecure web-views, permission usage analysis
RASP & TLS friendly dynamic analysis
Covers crypto best practices, dynamic code, inter-component and inter-app communication, tapjacking, PII leaks, input validation, tracking, webview weaknesses, and many more.
Code/Data Sharing Detection (App Collusion)
In-app purchase vulnerability, unprotected permission exploit
Exploitable inter-app communication vulnerabilities:
Advanced SBOM:
Malicious code that runs only after app runs for a long time
Remote Command & Control to give access to app, device or files
Read sensitive PIl data like device location and send over network
Copyright © 2024, Quokka. All rights reserved.