Responsive image

OpenPeak ADAPT

OpenPeak’s unique ADAPT technology adds a full suite of isolation, authentication, authorization, encryption, auditing, and policy enforcement software into each app. ADAPT is a fully-automatic process that uses a custom linker to transform an app into a secure, managed app. No coding, compilation, or access to app source code is required.

Protection That Cannot Be Circumvented

Because the ADAPT process takes place after the app is compiled, there is no developer involvement needed and no way for any malicious software to bypass its security mechanisms. The embedded software provides protection from any actions by an app or from malicious code that may be embedded within third-party libraries or even development tools.

Responsive image

SANCTION In-App Hypervisor

OpenPeak’s SANCTION in-app hypervisor is embedded into each app via the ADAPT process. SANCTION intercepts all calls between application software and the underlying operating system, providing unprecedented levels of control and insight into an application’s function and behavior. SANCTION securely protects all forms of data movement by applications and allows enterprises to manage specific connections on a per application basis.

Responsive image

Full Data Isolation

SANCTION isolates apps in a controlled manner, encrypts all app data with unique per-app keys, continually monitors policies, and protects apps from leaking data due to programming errors, malicious developers, and malicious libraries. The patented technology creates a distinct administration and protection domain for enterprise apps.

SANCTION Mobile App Firewall

SANCTION also gives administrators full monitoring and control over how an app communicates, moves, and accesses data. Some of the granular controls that SANCTION enables are:

  • Network traffic or traffic patterns
  • Enterprise contacts usage
  • Enterprise calendar access
  • Enterprise email
  • Copy-and-paste
  • External storage access
  • Inter-app communication including Open-In, URIs, URLs, intents, and service bindings
  • NFC/Bluetooth
  • Screen capture

Each monitored action can have a policy violation rule attached to it. These policy rules allow an enterprise to generate automated notifications to administrators, end-users, and devices, or take actions such as quarantining an application, removing an application from all devices in the organization, or wiping the entire secure workspace.

inbox

Simple, Wizard-Based Configuration

Configuring firewall policies is easy. An administrator first installs an app on a few devices and places it in learning mode, which logs app activity. This activity can then be inspected and used as a set of allowable actions in SANCTION. The administrator then defines actions to take on policy violations and applies the rules to deployed devices.