Android Security

What We Do: Products

Quark Security Shield™ for Android™ devices provides unparalleled security for commercial-off-the-shelf (COTS) mobile devices. Quark Security Shield leverages Security Enhancements for Android, originally developed by the National Security Agency and later adopted by Google™, managing the device security policies and actively monitoring threats to the device. Shield security policies offer unique capabilities such as the disabling the cellular radio or disabling the microphone at the lowest level possible.i These same policies also define which applications are available on the device.

Quark Security Shield

Shield Logo

Shield security policies offer unique capabilities such as the disabling the cellular radio or disabling the microphone at the lowest level possible.

These same policies also define which applications are available on the device.

Mobile devices are exposed to a variety of threats and lack the ability to react to when these threats actively attempt to compromise the device. Shield monitors the device analyzing events to determine if they are security-relevant. When an event occurs that indicates an active attack Shield can take a variety of options including altering the user or wiping the device ensuring sensitive data is not available. These actions are configurable and encapsulated in Shield security policies.

Shield policies are enclosed in Android's existing package format allowing policies to be installed easily through enterprise app stores of a Mobile Device Management (MDM) system.

Existing MDM solutions provide a subset of the features available in Shield, yet the two technologies can work in unison on the device. Shield ensures the MDM policies and Shield security policies align supporting proper device functionality.

Shield is currently available for Samsung KNOX™ devices, For a complete list of KNOX-enabled devices take a look at Samsung's KNOX Supported Devices.

The Next Big Thing(s)

Our team at Quark Security is not resting on our laurels. We have new products under development. While we can't share all the details yet, we can certainly share a bit of information so you know what you'll be seeing from us in the near-term. And yes, we mean near-term, we don't market vaporware.

One of our upcoming mobile products will leverage our open-source Certifiable Linux Integration Platform project and integrate with Amazon's EC2 cloud offering. It provides a user-friendly way to communicate securely regardless of your location in our world.

Our second product under development supports covert operations. When we say "covert", we don't mean just the Government. This product will support a variety of use-cases people in other industries will find interesting. At the touch of a button your phone will transition from a private device containing sensitive data to a stock device, at least in appearance. Adversaries will be none-the-wiser to the actual data on your device.