The most damaging attacks on devices tend to be the ones that we don’t see, getting through without triggering any security response. The critical security interface can provide enhanced visibility and greater trust that ensures our government partners’ devices are operating in an uncompromised state.
Our critical security interface framework operates in a deeper execution level for greater visibility and improved resilience to rootkit attacks. It provides application programming interfaces (APIs) to the mobile application platform—allowing continuous validation and monitoring of third-party apps, run-time integrity checking of devices, and continuous user authentication.
Our hardware-anchored continuous validation and threat protection could be used to uncover previously unseen advanced persistent threats, provide increased usability to enable a wide array of government and industry use cases, and allow organizations to quickly isolate compromised devices, eliminate malicious apps, and strengthen the user-authentication process.
Providing TrustZone-based real-time device integrity checks.
Delivering continuous validation and monitoring of how third-party applications are operating on a device.
Offering continuous user authentication leveraging multiple biometric and contextual factors.
Attacks on mobile devices are routinely attempted in a variety of forms, and the most damaging attacks tend to be the ones that aren’t seen until the damage has been done. In collaboration with the Department of Homeland Security (DHS), the critical security interface is engineered to showcase enhanced visibility into these types of advanced threats.