Enhance mobile security with application hardening and cryptographic key protection

Arxan's 2016 State of Application Security
Learn about healthcare-focused trends in
Application Security


Arxan Application Protection for IBM® Solutions augments IBM Security AppScan® mobile vulnerability analysis capabilities to include cryptographic key protection, application hardening and runtime protection. As such, developers can incorporate application protection into their workflows, without modifying source code. When deployed in conjunction with IBM Security AppScan, organizations can more securely build, analyze and release applications into production.


Arxan Application Protection for IBM Solutions also improves security protection across your organization’s entire mobile application lifecycle—from analysis and remediation to runtime protection. It enables you to shield individual applications from risks, including potential hacking attacks and malware exploits. IBM Security AppScan vulnerability analysis capabilities also permit you to identify and remediate security gaps, so you can improve your security team’s productivity.


Arxan Application Protection for IBM Solutions provides:

Patented Arxan Guard Network technology

Code integrity and confidentiality features

Cryptographic Key Protection

Integration with IBM Security AppScan

Arxan Application Protection for IBM Solutions resources

Platforms Supported by Arxan Application and Key Protection

Target

Host Requirements

Target Requirements

Android

Operating System

Hardware

Languages

Toolchains

Execution Environment

Apple iOS

Operating System

Hardware

Languages

Toolchains

Execution Environment

OS X

Operating System

Hardware

Languages

Toolchain

Execution Environment

Windows Desktop

Operating System

Hardware

Languages

Toolchain

Execution Environment

Windows Phone

Operating System

Hardware

Languages

Toolchain

Execution Environment

Windows RT

Operating System

Hardware

Languages

Toolchain

Execution Environment

Blackberry

Operating System

Hardware

Languages

Toolchain

Operating System

Execution Environment

Tizen

Operating System

Hardware

Languages

Toolchains

Execution Environment

Linux

Operating System

Hardware

Languages

Toolchains

Execution Environment



Crypto Supported by Arxan Key Protection

Cipher

Supported Algorithms

Additional Notes

Symmetric Key Encryption

AES_ECB, AES_CBC, AES_CTR, AES_GCM, AES_CCM, DES, and 3DES

AES_CTR is available with standard and custom counter functions.

Symmetric Key Decryption

AES_ECB, AES_CBC, AES_GCM, DES and 3DES

AES_CTR encrypt is equivalent to CTR decryption.

Asymmetric Key Encryption

ECEG (Elliptic Curve ElGamal)

 

Asymmetric Key Decryption

ECEG (Elliptic Curve ElGamal)

 

Key Exchange

ECDH (Elliptic Curve Diffie‐Hellman), FFDH (Finite Field Diffie‐Hellman)

 

Digital Signature Algorithm

ECDSA (Elliptic Curve DSA)

 

RSA

RSA_Encrypt, RSA_Decrypt, RSA_Sign, RSA_Verify, RSA_CMLA_Decrypt

 

Cryptographic Hash

SHA

 

Message Authentication Code

CMAC, HMAC

CMAC is a cipher‐based (AES) MAC algorithm; HMAC is a hash-based (SHA) MAC algorithm

Key Wrapping

NIST and CMLA Key Wrapping

 

Key Derivation Function

NIST, CMLA, and OMA Key Derivation Function

 

Obfuscated Form Utilities

Encode and Decode, Slicing, XOR

 

Not in United States?

Considering a purchase?

Contact IBM

Considering a purchase?