Application & Content Testing
True North Service provides comprehensive user experience testing, application quality assurance, content certification and monitoring services for applications, media, and games.
We offer guaranteed and meaningful results through a transparent testing process. Our responsive, scalable team works closely with you to test and troubleshoot the complexities inherent in advanced platforms and device deployments. When appropriate, we use intelligent systems designed to create unique test plans for each type of content.
Keystone is a 3rd generation content agnostic work-flow platform which manages all workflow and reporting between TNS and its partners. It provides easy access to every detail of the testing process: consolidating management, reporting, and user experiences to an intuitive interface. Every aspect of every plan and interaction is trackable and reportable to help partners easily access information and produce reports that drive insight into trends and areas of improvement.
Keystone is already launched and servicing 200 content providers and it is web-service driven and agnostic to content types, making it future-proof. Its Intelligent Device Manager allows for tailored experiences and eliminates submission errors. Additionally, Keystone offers automated wrapping and signing abilities.
Because data security and integrity is so important in the connected internet era. True North has developed a combination of rigorous testing methodologies, proprietary software, commercial virus scanners and trained technical acumen to deliver a dependable security review tailored to specific needs. We focus on ensuring:
- Integrity of outside security is maintained.
- Permissions and behaviors fit within the application’s intended use.
- Passwords and other sensitive information are appropriately encrypted.
- Application behavior does not harm existing data.
- Virus protection using the latest libraries.
- Background user activity tracking only occurs when explicit and appropriate.
Scout is True North’s proprietary network activity monitoring solution. Scout has a front end interface that our security technicians utilize to intercept network traffic going from or to a device. Both encrypted and unencrypted traffic can be scrutinized to ensure the information being passed is appropriate and secure. Scout was designed to answer whether or not sensitive information is being passed securely and if there is anything being passed to or from the server that is unneeded.