Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken.
Application vetting services could potentially determine if an application contains code designed to exploit vulnerabilities.
| Data Component | Name | Channel |
|---|---|---|
| Host Status (DC0018) | Sensor Health | None |
| API Calls (DC0112) | Application Vetting | None |
Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken.
Application vetting services could potentially determine if an application contains code designed to exploit vulnerabilities.
| Data Component | Name | Channel |
|---|---|---|
| Host Status (DC0018) | Sensor Health | None |
| API Calls (DC0112) | Application Vetting | None |