V-OS App Protection

V-Key

Mobile Application Protection

V-Key is a global leader in software-based digital security. Recognised by Gartner, validated by FIPS 140-2 NIST Cryptographic Module Validation Program (CMVP), certified by Common Criteria EAL3+ and accredited by the IMDA of Singapore and SG:D. V-Key is the inventor of V-OS, the world's first Virtual Secure Element. 
Building upon V-OS, the world's first and only true patented Virtual Secure Element, V-Key has developed a highly secure framework that integrates with mobile apps to secure them against advanced persistent threats, trojans, and root kits. V-Key implemented a tamper-prevention, detection, and response layer, named V-OS App Protection. This layer is implemented as Assembly codes within the virtual machine and includes anti-reverse engineering and anti-static analysis techniques such as binary code morphing, anti-debugging techniques, jailbreak and trojan detection techniques, and anti-API hooking checks. These provide a trusted environment for the sandbox to operate and ensure that the sandbox and the phone have not been tampered with. 
V-OS App Protection implements several best-of-breed techniques to ensure a trusted mobile environment. These include several jailbreak / root-detection techniques, combinations of heuristic and signature-based detections for possible malware, & functional checks to validate the integrity of the underlying mobile operating system. Several of these techniques are also unique to V-OS App Protection. For example, V-OS app protection is able to identify the libraries loaded by jailbreak tweaks & trojans into the current application; this is particularly important in a sandboxed environment typical in a modern mobile operating system where an application may not have full access to system applications, folders, and files. In instances when tampering or an untrusted mobile environment has been detected, the sandbox can respond by disabling usage of the sandbox, zeroing the cryptographic information or other security parameters, or generating responses that inform a third-party of the attempted tampering, depending on the requirements of the mobile app. The V-OS & App Protection layers make it extremely difficult for an attacker to gain access to the critical data, even with full access to the mobile phone. We are able to do this because the interaction of the secured virtual machine model & the dynamic protection mechanisms maintains control over the mobile environment and denies an attacker the ability to control the virtual machine execution flow for analysis. V-OS secures sensitive processing & data, ensuring app integrity when deployed, & safeguarding user privacy even if the device is lost or compromised. 
With V-OS Cloud, customers can deploy the same powerful V-OS App Protection without additional V-Key servers on premise. This reduces total cost of ownership, shortens time to go-live, and simplifies support. #strongerwithvos
https://store-images.s-microsoft.com/image/apps.14363.7c235a1a-00be-4b0c-b5b1-c96ae047bc78.5d55a422-724e-443a-bd9e-4d9523f04e5b.ca8910d3-186c-4f99-9081-cc9732033007
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.14363.7c235a1a-00be-4b0c-b5b1-c96ae047bc78.5d55a422-724e-443a-bd9e-4d9523f04e5b.ca8910d3-186c-4f99-9081-cc9732033007
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.22406.7c235a1a-00be-4b0c-b5b1-c96ae047bc78.59757702-19d4-4eb7-bfb8-1d186201354b.b5e691f1-6930-4503-ae70-12cadee44dee
https://store-images.s-microsoft.com/image/apps.40369.7c235a1a-00be-4b0c-b5b1-c96ae047bc78.59757702-19d4-4eb7-bfb8-1d186201354b.65459e00-7254-404e-973f-7b5644c1e192
https://store-images.s-microsoft.com/image/apps.38397.7c235a1a-00be-4b0c-b5b1-c96ae047bc78.59757702-19d4-4eb7-bfb8-1d186201354b.e5df4253-6c3d-4f4f-b8e9-e46347caa295
https://store-images.s-microsoft.com/image/apps.21631.7c235a1a-00be-4b0c-b5b1-c96ae047bc78.59757702-19d4-4eb7-bfb8-1d186201354b.68bcee56-e769-4b51-9755-14c0331f0d48
https://store-images.s-microsoft.com/image/apps.16127.7c235a1a-00be-4b0c-b5b1-c96ae047bc78.aa48ab8b-7ddc-44d2-aa91-305fb1fa34f1.694e4370-f83a-4450-983f-e0d204be0ae7