Mobile security benefits that make you smile
Know your app security intelligence delivers the industry’s most comprehensive insights, even for the latest OS versions, in minutes
Make risk-based decisions during deployment of 3rd party apps based on real-world mobile app intelligence
Vet all mobile apps used by employees to prevent attacks and breaches that undermine trust in government
BYOD Guidelines – Quokka (then Kryptowire) participated in creating the NIST Special Publication 1800-22 and its insights and technologies were part of the example solutions used in the guide under the Cooperative Research and Development Agreement
Quokka (then Kryptowire) contributed automated analysis using proprietary mobile app vetting infrastructure
Protection Profile for App Vetting – Quokka has worked with federal agencies to meet both the functional and assurance requirements outlined in this profile
State & Local Government Partners
Rely on the industry’s only proprietary, defense-grade app scanning engines that uncover more security, privacy, and malicious behavior findings than any other app testing tool
External code fetches, websites visits, network traffic
Hard coded keys, Weak hash, Insecure web-views, permission usage analysis
RASP & TLS friendly dynamic analysis
Covers crypto best practices, dynamic code, inter-component and inter-app communication, tapjacking, PII leaks, input validation, tracking, webview weaknesses, and many more.
Code/Data Sharing Detection (App Collusion)
In-app purchase vulnerability, unprotected permission exploit
Exploitable inter-app communication vulnerabilities:
Advanced SBOM:
Malicious code that runs only after app runs for a long time
Remote Command & Control to give access to app, device or files
Read sensitive PIl data like device location and send over network
Copyright © 2024, Quokka. All rights reserved.