HARDENING - Software hardening und mobile security

Closing security gaps

If you ask security software manufacturers, they will tell you that for every single malware program, there is an adequate software package; for every virus, there is an appropriate antivirus; and for every security vulnerability, there is the right firewall… But despite their reassurances, the number of computer viruses and spyware attacks is increasing. For years now, protection against malware by means of internal Windows SSL encryption has been ineffective. Every time you click on something, you run the risk of opening the floodgates to hackers and Trojans. This is why CORONIC focuses on the basis itself of software programmes, identifies the typical weaknesses and gaps in operating systems and drivers at that level, and then helps users resolve them.

Software hardening - for your apps too

What is software hardening?


Software hardening is a series of technical measures to secure the protection of individual programmes or transactions on vulnerable IT systems. The hardening library monitors the memory, interfaces, loading routines and processing patterns in the protected programme. It uses watchdogs to monitor the system, controls IP and network traffic, secures encryption and therefore protects all components of the software in its interaction with the rest of the IT world. Software hardening is not an antivirus, firewall or intrusion detection system. These traditional security programmes aim to protect IT systems as a whole. Over the past years, however, we have seen that global system protection faces an impossible task (even if antivirus manufacturers tell you the exact opposite).
In cases in which the IT system cannot be protected as a whole anymore, software hardening can provide protection for specific programmes or extremely important transactions. This is only used for critical processes that cannot be accessed under any circumstances by a third party, hacker or Trojan. Software hardening is often implemented on end clients’ IT systems, because individuals are unable to implement professional IT protection or can only do so with great difficulty. Other common applications are the protection of sensitive data and processes on badly protected or out-of-date IT systems. Examples thereof are: life-support IT infrastructures in hospitals, critical IT programmes in the field of energy or the automobile industry. The most common errors targeted by software hardening, however, are to be found in online banking, push apps and all types of financial transactions on the internet.

Examples of use