Silicon Valley start-up company Trustlook first Defense APT Mobile security Solution

Source: Internet
Author: User
Keywords nbsp mobile Security we this
Tags advanced analysis android anti- anti-virus anti-virus software application applications

Silicon Valley start-up company Trustlook today's global launch defense of APT (Advanced sustainability Threat) mobile security solution, which is said to be fully based on behavioral data security risk identification, without relying on any existing feature code, effectively reduce the unknown virus detection cycle from several weeks to several minutes.

With the explosive growth of global smart devices, mobile malware is also rapidly growing and evolving. According to the third annual mobile threat report released by Juniper Network, the Mobile Threat Protection Center (MTC) found: From March 2012 to March 2013, the mobile malware threat was growing exponentially, with a growth rate of 614%, totaling 276, 259 malicious applications.

The report also notes that, as Android dominates most of the global smartphone market, and that most viruses on the PC side are aimed at Windows platforms, malware writers are designing new attacks with a preference for Android platforms, by using Android 92% The known threat maximizes the return on investment.

Although the average person's daily life does not always see what the phone virus looks like, the data tells us that mobile security is still a serious problem, especially in the open Android platform.

Trustlook, a mobile security start-up that was set up in Silicon Valley this year, is officially releasing its products to the world today – a platform for in-depth analysis of mobile applications. Unlike all traditional anti-Trojan and anti-virus software products, the Trustlook provides the first mobile protection program specifically for advanced sustainability threats (apt,advanced persistent Threat), Real-time detection and identification of mobile terminals can not identify the malicious Trojan virus.

Trustlook's cloud-based platform provides the following key features:

1, does not depend on the virus signature application threat identification engine

Trustlook platform 100% is based on application behavior data.

2, quick response to malicious software

Traditional anti-virus software based on virus signatures often takes weeks or months to process from collecting malicious program samples to releasing signature code. Trustlook system technology can quickly identify unknown malware within 24 hours.

3, complete automation analysis platform

Trustlook is a fully automated mobile application analysis platform, from sample extraction, static analysis, to cloud sandbox based behavior analysis, to the final risk report generation, the Trustlook analysis platform can continuously analyze the behavior of mobile applications without intermission, thus building a complete application behavior feature spectrum.

4. Services based on rest (representational state transfer) technology

Trustlook supports rest based software Analysis Services, which makes integration with Mdm/mam service providers simple and smooth.

Allan Zhang, founder and chief executive of Trustlook, first worked in NCircle, a cyber-security firm, to make a network vulnerability scanner, which was acquired at a very good price last year. Prior to the founding of Trustlook Allan was involved in the founding of Palo Alto NX, an industry-reformed firewall company that launched the new generation firewall, a company that was listed last year in the United States, and was founded in Trustlook late last year.

According to Allan, the team currently has only 7 people, the product has just been released, several people use their own money in support of the company's development. As for investment, there is talk of a possible first round of investment within a few weeks. Allan, as a major player in the team, is responsible for the implementation of the server side of APT Mobile security solutions, in addition to the day-to-day business of CEOs such as investment negotiations.

Allan appears very confident, for the launch of the Trustlook products, he thought this is his safety in the field launched another subversive products. On the security field, especially the status of mobile virus, he made it clear that the past 20 years from the PC to the mobile phone security vendors are based on the virus code base technology, the technology of virus lookup is easy to achieve, faster, but the problem is only limited to check the code virus, For many new virus code or hidden viruses are more difficult, especially for smartphones, the shortcomings are obvious.

In addition, now almost all mobile anti-virus applications are based on the Virus sample feature library technology, the technology also has a disadvantage is that a virus samples from the discovery of viruses, generate samples into the virus sample feature library, the release of the new feature library period is too long, sometimes may take several weeks. And the whole upgrade process is artificial, the length of the process time or the quality of the virus library is difficult to control the impact of personnel quality.

For Trustlook products, Allan said that our platform compared to traditional anti-virus products, the essence of the first is to abandon the traditional virus signature library, do not do any Chaku operations, trustlook the entire platform analysis based on the application of behavioral analysis data, the application of the behavior of the in-depth evaluation, Analyze the application based on our product risk model.

Do not rely on the virus sample library, for any unknown application, we will be the depth of detection, so we can see many traditional mobile phone manufacturers do not see the problem, this is our living space, I think this is the next generation of anti-virus application strategy commanding heights.

The second advantage is that the Trustlook platform is completely based on cloud sandbox technology, our identification and analysis of emerging virus codes or malicious applications has been shortened from a few weeks to a minute level from a traditional vendor, and now we're claiming that we're going to do it in a day, but in fact it can be identified within minutes. For any application, a complete report on its security analysis can be obtained within minutes.

Allan that the entire PC or mobile antivirus security industry, after more than 20 years of development, is undergoing a major change, this change is from the previous virus signature based on the killing technology, slowly transition to based on the application of behavioral data analysis. From the current market, some traditional anti-virus manufacturers such as McAfee, Symantec and other recent moves can see this technology trend.

Although the Trustlook team is still very small, with the traditional antivirus vendors scale gap is huge, but technically we have a certain degree of leadership, and this trend is no one can reverse, we want to lead the trend of change.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.