Mobile Reviewer is a worldwide brand of Security Reviewer offered on demand for MAST (Mobile Binary Analysis). A robust, cloud infrastructure is behind this offer.

It provides:

Mobile Code Inspection

The following languages are supported:

Fuchsia OS

Android

With support of:

iOS

With support of:

Windows Mobile

Hybrid Analysis

Mobile Reviewer is enabling enterprises to get on-demand security assessments of their Mobile Apps. Mobile security assessment software can be expensive to purchase, and it needs constant upgrades to keep up with ever-evolving threats. Today's corporate security groups are not staffed to handle the specialized skills needed to perform code analysis and security testing. For Static Reviewer users, Mobile Behavior Analysis additional feature is provide as Mobile Reviewer client.

Mobile Reviewer frees enterprises from having to spend resources on the purchase of software or Mobile device simulators, on hiring software security experts and consultants to operate it, and on constant maintenance to keep effective. With Mobile Reviewer, enterprises simply submit Apps through an online platform and quickly get back test results. 

Mobile Reviewer is easy to use and access, allowing enterprises to roll out Mobile security quickly and efficiently.

Mobile Reviewer now supports Static and Dynamic Analysis of both Android and iOS apps. Reviewing Mobile Apps is time-consuming and difficult to make routine. Adopting an online Mobile scanning service can save time by focusing human involvement on reviewing potential risks and enhancing system stability with more accurate and usable results. 

Mobile Reviewer will do it for you. To perform the audit we rely on the expertise of a dedicated staff from 2 to 5 auditors per Mobile App, and we based the analysis on the following test plan:

These checks are first performed by automated procedures, then manual intervention will needed, taking into account the established risk on the application.

Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.

For further explanation, please see our Scientific Article.

Key Business Benefits