Granular Control of Threat-Streams
With Threat-Streaming, mobile SDK developers have the power to choose and consume one, any, or all data from Appdome' s 300+ defended attack vectors to support payment, banking, identity, analytics, advertising, and other SDKs. The data can be used to perform or trigger second step identity verification, deeper fraud inspection, eliminate account takeovers, SDK spoofing, data breaches, and many other attacks. Each Threat Stream provides ThreatID, reasonData (root cause), as well as detailed device, application and other meta data.