EndCrypt

EndCrypt

Procenne
+
+

Related Products

  • Jscrambler
    32 Ratings
    Visit Website
  • Aikido Security
    106 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website
  • Gearset
    225 Ratings
    Visit Website
  • Safetica
    375 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • AnalyticsCreator
    46 Ratings
    Visit Website
  • SpamTitan
    814 Ratings
    Visit Website
  • c/side
    23 Ratings
    Visit Website

About

Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk. Obfuscates source code, inserts honeypots, and implements other deceptive code patterns to deter and confuse threat actors. Triggers defensive measures automatically if suspicious activity is detected, including app shutdown, user sandbox, or code self-repair. Injects essential app code protections and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.

About

EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt provides a broad range of patented security capabilities to protect applications by preventing reverse engineering techniques via code obfuscation and anti-repackaging technology. It actively detects malicious key logging, screen readers, repackaged applications, debuggers and emulators, and jailbroken or rooted devices. It blocks foreign code from executing or shuts down the application to protect sensitive data from cybercriminals.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

DevOps teams

Audience

Companies searching for a solution to manage, monitor and take actions on their mobile devices

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Digital.ai
United States
digital.ai/application-protection

Company Information

Procenne
Turkey
procenne.com/en/endcrypt/

Alternatives

ThreatCast

ThreatCast

Guardsquare

Alternatives

QShield

QShield

Quarkslab
EndCrypt

EndCrypt

Procenne
Zimperium MAPS

Zimperium MAPS

Zimperium
QShield

QShield

Quarkslab

Categories

Categories

Integrations

BMC AMI Ops Automation for Capping
BMC Compuware Topaz Connect
BMC Helix Cloud Cost
BMC Middleware Management
BlueSwan
Planview Viz
SD Elements

Integrations

BMC AMI Ops Automation for Capping
BMC Compuware Topaz Connect
BMC Helix Cloud Cost
BMC Middleware Management
BlueSwan
Planview Viz
SD Elements
Claim Digital.ai Application Protection and update features and information
Claim Digital.ai Application Protection and update features and information
Claim EndCrypt and update features and information
Claim EndCrypt and update features and information