Koodous Bank

What is Koodous Bank?

Koodous Bank is a service that uses artificial intelligence to monitor the security status of mobile devices .

The service is responsible for collecting information about the applications installed on devices and analyzing them to detect possible malware threats.

It uses a Rest API that allows device registration and subsequent analysis. The results of this analysis allow for real-time identification of malware infections and classification of the infection.

In addition, Koodous Bank has an SDK that can be easily integrated.

The use of artificial intelligence in obtaining the danger metric allows for greater accuracy in identifying threats and a higher level of security for mobile devices.

image koodous bank
What does Koodous Bank offer?

Koodous Bank offers a service to monitor security status. Koodous Bank leverages the information stored in Koodous to detect malware on different mobile devices.

It also allows you to apply different options:

Monitoring

Real-time monitoring of devices to know if they are infected.

Malware analysis

Allows you to scan devices for malware.

Taking of actions

You can take actions on your systems based on device risk information.

Koodous Bank features

Koodous Bank has an API Rest that allows the registration of devices and the analysis of the applications installed on them. This would allow to know if the device is infected by malware in real time.

By storing the applications installed on the device, it is possible to know if in the past it had a malware that has been discovered later.

Koodous Bank protects the privacy of users by avoiding storing information about the user of the device, using an anonymous identifier for each of them.

The API allows you to query the risk of a device so that from your systems you can have an indication of risk or make a decision , for example:

Notify the user

You can notify the user that their device is at risk from malware.

Deny the use of operations

You can block bank transfers, sending messages, connecting to internal services, etc.

Increasing the risk level

You can see the risk level of the operations performed by the user depending on the malware on the device.

Do you have any doubts?
Contact us