EndCrypt

EndCrypt

Procenne
+
+

Related Products

  • Jscrambler
    38 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Feroot
    27 Ratings
    Visit Website
  • Venn
    29 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • Auth0
    1,008 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt provides a broad range of patented security capabilities to protect applications by preventing reverse engineering techniques via code obfuscation and anti-repackaging technology. It actively detects malicious key logging, screen readers, repackaged applications, debuggers and emulators, and jailbroken or rooted devices. It blocks foreign code from executing or shuts down the application to protect sensitive data from cybercriminals.

About

Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end-user has a seamless experience when accessing their corporate data and personal apps. Our zero-trust philosophy ensures personal data protection is not bypassed while protecting the enterprise. Ijura Enterprise has 3 patents pending pertaining to securing any connected device through the telecom operator's endpoints by directly integrating with an operator through its data servers. Ijura Enterprise inspects every data packet for various vulnerabilities such as phishing, malware, botnets, etc.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage, monitor and take actions on their mobile devices

Audience

Enterprises in need of a cloud-deployed solution to protect end-user devices and IoT in the data network

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Procenne
Turkey
procenne.com/en/endcrypt/

Company Information

ijura
Founded: 2017
United States
www.ijura.com

Alternatives

QShield

QShield

Quarkslab

Alternatives

CryptAway

CryptAway

Procenne Digital Security

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IoT Features

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

Integrations

Amazon Web Services (AWS)
Facebook
Google
Google Cloud Platform
Instagram
LinkedIn
Microsoft Azure
Pinterest
Salesforce
Snapchat
X (Twitter)
YouTube

Integrations

Amazon Web Services (AWS)
Facebook
Google
Google Cloud Platform
Instagram
LinkedIn
Microsoft Azure
Pinterest
Salesforce
Snapchat
X (Twitter)
YouTube
Claim EndCrypt and update features and information
Claim EndCrypt and update features and information
Claim ijura and update features and information
Claim ijura and update features and information