Risk
2/24/2010
08:29 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Arxan Launches Application Hardening For Mac Apps

Extends GuardIT software protection solution to encompass applications targeted for the Mac OS X platform

Bethesda, MD — Feb. 23, 2010 — Arxan Technologies, a leading provider of application hardening solutions that protect software applications from attacks to minimize risk to code and intellectual property (IP), today announced it has extended its GuardIT software protection solution to encompass applications targeted for the Mac OS X platform. With the addition of GuardIT for Mac OS X, Arxan offers the industry's most thorough protection for applications across multiple platforms including Windows, Linux, .NET and Java to protect against piracy, tampering, reverse engineering, malware or other forms of attack.

As the Mac platform continues to gain popularity, hackers are increasingly exploiting weaknesses in Mac OS X applications to invade end-user systems. This exploitation leads to application piracy, loss of application integrity, and loss of compliance with digital rights management (DRM) standards. These compromises threaten the business models of multiple industries, including independent software vendors (ISVs), gaming and digital media companies.

"The Mac platform has long been viewed as a safer and more secure than Windows," said Paul Roberts, senior analyst at The 451 Group. "The truth is that Mac's small share of the total OS market explained the rarity of Mac-focused threats. That's changing. The growing popularity and widespread use of Mac in the digital media market makes the platform an attractive target for hackers. Mac developers no longer view themselves as immune to application attacks and are adopting appropriate security measures to protect their code and valuable IP from malicious attacks."

"GuardIT for Mac OS X provides the most durable application hardening with security against reverse engineering and tampering, so software developers and producers can mitigate the risk of exploitable vulnerabilities and loss of revenues," said Mike Dager, chief executive officer of Arxan. "Our code protection solution protects critical algorithms, hardens license management and assists with DRM robustness rules compliance, and this has never been more critical than today when applications are deployed in distributed and untrusted environments that expose code to constant attacks."

Key features and benefits of Arxan GuardIT for Mac OS X include:

  • Diverse and customizable Guard types for code security, including obfuscation, encryption , anti-debug, repair, and checksum

  • Instruction level granularity to fine-tune code protection ranges

  • Binary level security which prohibits changes to the source code and the software development lifecycle (SDLC)

  • Tailored security designs to maintain performance levels, and build in resilience

  • Compatibility with third party license management, and support for Mac OS X versions 10.4, 10.5 and 10.6

    For more information regarding Arxan GuardIT for Mac OS X, please call 301-968-4290 or email info@arxan.com. Arxan will feature its GuardIT for Mac OS X solution at RSA Conference 2010 in San Francisco, March 1-5. Please visit booth number 318.

    In addition to the launch of GuardIT for Mac OS X, Arxan also made available today the following enhancements to the GuardIT platform:

  • Windows 7 Support

  • Windows Server 2008 SP1 Support

  • Anti-debug Wrapper Guard Enhancements

  • .NET Guard Improvements

    About GuardIT

    Arxan's GuardIT for Mac OS X extends Arxan's award-winning GuardIT protection to the Mac operating system. GuardIT is the most user-friendly software IP protection solution available today, integrating easily and smoothly into the software development lifecycle. Arxan's GuardIT offering provides durable protection for software, without adversely affecting application performance through an interconnected mesh of small security units called Guards scattered across a compiled binary and then dissolved into the application. Arxan's protection deeply fortifies the overall software product against piracy, tampering, reverse engineering or other forms of attack.

    About Arxan Technologies Arxan Technologies Inc. is a leading provider of application hardening solutions designed to protect software applications from tampering to minimize risk and maximize profitability. Our advanced software protection solutions secure enterprises, ISVs and digital media providers against unauthorized use, malware insertion, piracy, and reverse engineering of intellectual property. Our products defend, detect, alert and react to attacks through a threat-based, customizable approach that is proven, easy to use and non-disruptive. Arxan supports a full range of application protection needs, from commercial software to governmental cyber security assurance. Founded in 2001, Arxan Technologies has offices in Bethesda, MD, San Francisco, CA and West Lafayette, IN. For more information, please visit www.arxan.com.

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2012-0360
    Published: 2014-04-23
    Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

    CVE-2012-1317
    Published: 2014-04-23
    The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

    CVE-2012-1366
    Published: 2014-04-23
    Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

    CVE-2012-3062
    Published: 2014-04-23
    Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

    CVE-2012-3918
    Published: 2014-04-23
    Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

    Best of the Web