image description
contact us
Name* Phone* E-mail* Message*


Mobile security solutions

Mobile threats are becoming increasingly common as the mobile platform continues to gain popularity through the adoption of smart devices. As end-users and businesses come to rely on smartphones and tablets in their personal and business activities, they store valuable information that attracts the attention of cybercriminals. Therefore, it becomes necessary to utilize secured encryption algorithms that provide reliable information protection and prevent cybercriminals from accessing your data.

The general lack of awareness of mobile vulnerabilities and this increase in mobile malware has driven a nascent yet dynamic market in mobile security products and services. The industry is quickly grasping the notion that mobile malware will likely evolve similarly to PC-based threats and that similar protection and detection measures will be necessary.

Auriga offers different mobile security solutions addressing malware, spam, unauthorized access, and modification in the following areas:

  • Cloud-based security
  • Secure document management
  • Finance & banking mobile clients
  • E-commerce applications
  • IP rights
  • Protection of producers’ and customers’ rights against counterfeiting

The list of offered Security Services includes, but is not limited to, the following:

  • Design, development, and maintenance of integrated information security systems
  • Development of software that protects information from unauthorized access
  • Tools for cryptographic information protection
  • Development of secure e-mail and web-traffic content control tools
  • Development and maintenance of main security operations for the client: user authorization, permissions check, PIN code check, access lock, and secure storage for important (but not personal or payment) data (e.g., phone directory, messages, etc.); suspicious activity monitoring; and access blocks according to pre-defined rules

Auriga engineers have significant experience in authentication protocol design and implementation, authorization, cryptography, PKI, Wipe Data, Application Sandbox, Secure IPC, Permission Control, Credentials Control, Input Validation, and Active Directory integration.

Relevant Cases