Appknox

Appknox (XYSec Labs Pte. Ltd.)
Private
Founded 2014[1]
Headquarters Singapore
Number of locations
2
Key people
Harshit Agarwal[2]
(Founder & CEO)
Subho Halder[3]
(Founder & CTO)
Prateek Panda[4]
(Founder & CMO)
Services Mobile App Security
Website Appknox.com

Appknox is a mobile security product developed by XYSec Labs Pte. Ltd., headquartered in Singapore.[5]

It is also a graduate of the fifth batch of the Microsoft Ventures program.[6] The company offers testing-as-a-service to developers through regular security audits for their applications and alerts them in case a vulnerability is detected.[7]

History

Appknox was co-founded by Harshit Agarwal, Subho Halder and Prateek Panda in the year 2014.[8][9] The company headquarters is located at 71 Ayer Rajah Crescent, Singapore. The co-founders met at KIIT University, based in Orissa, India, where they studied together. They were all engineers and had experience in breaking into and reprogramming software programs.

Overview

Appknox focuses on finding out the security vulnerabilities of an app before it is released. The Appknox tool is completely automated and analyzes the uploaded binary code of an app on Appknox’s website. The company also helps the developers fix any security flaws that might exist in the code. Appknox approaches the app from an attacker’s point of view so that all the vulnerabilities in a network or app can be brought to notice. The weaknesses are then prioritised according to severity.[10]

Products and specifications

Appknox tool uses Python and Shell for the back end and CoffeeScript and Less for front end. Appknox claims that its backend and front end are not connected together, and they are developed and run independently of each other.

The back end which is used to detect security issues in mobile apps is named Sherlock. The front end is known as Irene, and uses Ember as its framework. The front end development team works independent of the back end team and doesn’t need the server to be online during development. The front end and back end deployment processes are also different from each other.[11]

References

External links

This article is issued from Wikipedia - version of the 5/20/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.