Appdome has released new threat assessment tools within ThreatScope Mobile XDR to enhance monitoring, investigation, and threat assessment of mobile apps and brands around the world.
Among the new tools is Threat-Inspect, a new capability to investigate, drill down, share, and report on defenses, attacks, and threats in your production environment.
Appdome’s ThreatScope Mobile Convert it into a brand-relevant view that can be used for evaluation. Respond to mobile threats and attacks in real time.
New assessment tools include Threat-Inspect for deep threat inspection; Threat-Views for creating storable monitoring perspectives by app, device, OS, attack, and other parameters; reporting and collaboration; Includes Threat-Snapshots for ease of use.
ThreatScope Mobile XDR is pre-integrated with Appdome’s Cyber Defense Automation Platform for Android and iOS apps to instantly respond to any cyber or fraud attack.
“Real-time attack data from native mobile app channels is full of surprises,” said Tom Tovar, Co-Creator and CEO of Appdome. This will enable detailed investigation.” Collect data from mobile channels and enable mobile brands to view this data from a business context. ”
ThreatScope Mobile XDR’s new threat assessment capabilities provide mobile businesses and brands with:
- Threat-Inspect allows cyber teams to toggle between “all” attacks and unique attacks, and between attacks and affected devices to see how many unique devices are under each attack . This new capability allows us to tailor our cyber response to specific threats in our operational environments, while also easing the remediation burden for mobile users and brands around the world.
- A unique feature of Threat-Inspect is that it can be used in conjunction with Appdome’s recently released Build-to-Test automated testing feature. Build2Test enables Appdome-secured mobile apps to be used within automated mobile app test suites, logging all security events for developers to track and monitor. These logged security events are now visualized within Threat-Inspect.
- Threat-Views allows security teams to zoom in and monitor specific aspects of mobile app defense, attack, and threat data displayed in ThreatScope. Create and save any number of threat views to monitor one or more mobile applications, OS, OS version, attack vector, mobile app release, Fusion Set (defense model), geographic region, or other parameters To do. Threat-View enables persistent business-level visibility and analysis. This is essential to demonstrating ROI and keeping your entire mobile business secure.
- ThreatScope Snapshots allows cyber teams to export and share real-time mobile app defense and attack snapshots from ThreatScope, Threat-Views, or Threat-Inspect data. Use ThreatScope Snapshots to keep your cyber, fraud, and business teams informed of your progress in stopping security, fraud, malware, and other attacks, demonstrate compliance, and collaborate with other teams within your company.
Powering these capabilities is a new level of metadata available in ThreatScope. These include enhanced attack, threat, and abuse metadata, including new options such as geographic location, unique identifiers for threats and affected installations, and IP addresses.
This metadata allows mobile brands to see all operational mobile apps and installations affected by each attack or threat with a simple click. Users can click on a specific attack or threat and select the impact view required for each business line. IP addresses and unique device data can now also be downloaded for offline analysis.
With ThreatScope Mobile can be attached. The entire ThreatScope Mobile there is not.
Chris Roeckl, Chief Product Officer at Appdome commented: “Once you see your ThreatScope Mobile Attackers and fraudsters use it to compromise mobile apps, brands, and users around the world. ”