EndCrypt

EndCrypt

Procenne
+
+

Related Products

  • Aikido Security
    100 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,088 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • Safetica
    376 Ratings
    Visit Website
  • SpamTitan
    813 Ratings
    Visit Website
  • c/side
    21 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    179 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • Fraud.net
    56 Ratings
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website

About

Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk. Obfuscates source code, inserts honeypots, and implements other deceptive code patterns to deter and confuse threat actors. Triggers defensive measures automatically if suspicious activity is detected, including app shutdown, user sandbox, or code self-repair. Injects essential app code protections and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.

About

EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt provides a broad range of patented security capabilities to protect applications by preventing reverse engineering techniques via code obfuscation and anti-repackaging technology. It actively detects malicious key logging, screen readers, repackaged applications, debuggers and emulators, and jailbroken or rooted devices. It blocks foreign code from executing or shuts down the application to protect sensitive data from cybercriminals.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

DevOps teams

Audience

Companies searching for a solution to manage, monitor and take actions on their mobile devices

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Digital.ai
United States
digital.ai/application-protection

Company Information

Procenne
Turkey
procenne.com/en/endcrypt/

Alternatives

ThreatCast

ThreatCast

Guardsquare

Alternatives

QShield

QShield

Quarkslab
EndCrypt

EndCrypt

Procenne
QShield

QShield

Quarkslab
Zimperium MAPS

Zimperium MAPS

Zimperium
Zimperium MAPS

Zimperium MAPS

Zimperium

Categories

Categories

Integrations

BMC AMI Ops Automation for Capping
BMC Compuware Topaz Connect
BMC Helix Cloud Cost
BMC Middleware Management
BlueSwan
Planview Viz
SD Elements

Integrations

BMC AMI Ops Automation for Capping
BMC Compuware Topaz Connect
BMC Helix Cloud Cost
BMC Middleware Management
BlueSwan
Planview Viz
SD Elements
Claim Digital.ai Application Protection and update features and information
Claim Digital.ai Application Protection and update features and information
Claim EndCrypt and update features and information
Claim EndCrypt and update features and information