Promote this Nomination
|Company (that provides the nominated product / solution / service)||Irdeto|
|Company size (employees)||1,000 to 4,999|
|Type of solution||Cloud/SaaS|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
o Irdeto’s Trusted Software fully automated process leverages Machine Learning (ML) to selectively adjust protections applied to your code. These models work to protect the most security critical parts of the customer’s application while staying within the prescribed security and performance budget.
Trusted Software is a fully automated service to protect iOS and Android applications. It is considered to be the smartest zero-touch mobile application protection solution on the market.
Trusted Software is part of the family of Irdeto Security Services. These new managed services have been created to enable quick and effective security, particularly on edge devices where the risk of compromise is greatest. Irdeto Security Services work flexibly with the business model of our customers to maintain safety and security at the edge.
It is backed by Irdeto’s award-winning Cloakware Software Protection and brings an easy drag-and-drop web UI for quick protection of any mobile applications. This means protection can be applied by the application developers, without specialized expertise, in no time. The cloud-hosted service also can easily be integrated into any CI/CD pipeline and is backed by 24/7 support from Irdeto’s Security Operations Centre (SOC) across the globe.
Starting with the world’s best code protection technology, Cloakware Software Protection, Trusted Software enables complex entanglement to make reverse engineering almost impossible. This is further complemented with automatic insertion of RootKit and JailBreak checks to help reduce significant business and engineering complexity to the development of a mobile app.
With Trusted Software, companies can prevent any exposure of their intellectual property such as algorithms or proprietary protocols. It can also help prevent the cracking of company secrets such as credentials and shields against revenue loss by defending against application cloning or tampering with an application’s business logic.
Trusted Software leverages machine learning techniques adopted from Natural Language Processing, and utilizes multiple neural networks, trained separately on things like security and performance. These ML models help to selectively adjust the protection levels applied to customer’s code, segment by segment while staying within the prescribed security and performance budget.