skip to Main Content

In-App Protection And Security for Mobile Apps

Mobile Apps Are Vulnerable!

Cybercriminals are targeting the mobile channel more aggressively than ever before, and app developers must take a proactive approach to app security to combat this new aggression. The number of mobile malware attacking users of mobile devices is increasing rapidly each year. At the same time, malicious apps continue to be distributed on 3rd party app stores and frequently slip under the radar on the official app stores.

Tackling the multi-faceted challenge of developing a successful mobile app is no easy feat, and developers must contend with pressures from every direction. It is imperative to get an app built, tested, and published as quickly as possible. However, in the rush to market, app protection cannot be overlooked.

  • "75% of mobile applications would fail basic security tests." - GARTNER

Gartner® Hype Cycle™ for Application Security 2021

Download Gartner Hype Cycle and learn more about why Application Shielding is rated high in the Priority Matrix. 

Checklist: How to mitigate the
OWASP Top 10 Mobile threats

The checklist highlights security flaws & vulnerabilities developers need to protect their applications from

Common security threats to your mobile apps


Attackers can alter the authentication mechanisms of your app to phish user credentials. Invaders can also falsify the user interface of your app and convince your end-users to give away passwords unsuspectingly.


The data-in-motion – that is, data that flows from your mobile app to the server and back. Attackers can easily intercept and direct their victims’ data to their device and eavesdrop on the communication, performing a Man-in-The-Middle (MiTM) attack.


Mobile malware attacks are booming, and cybercriminals are increasingly turning their attention to attacking smartphones and apps with credential-stealing malware. 


Security mechanisms in your app can be disabled, changed, or even removed.


Attackers can tamper with the payment modules in the app or carry out attacks designed to capture a user’s login credentials as they naturally input it into the phone.


API keys and other secrets poorly hidden inside mobile apps are a common source of mobile insecurity. Attackers look not only at what is sent across the network but also at the app itself and what they receive in their own copy of the app.


Repackaged apps are usually infected versions of popular apps. An attacker can download a popular Android app, and obtain the code using reverse engineering and then add their code (often malicious) to it and repackage and release the app.


App piracy is a massive problem, and has been for some time. A common pathway to piracy is reverse engineering – unpacking an app’s compiled code in order to obtain its source code.


There are two types of compromised devices: “Jailbroken” Apple iOS devices and “Rooted” Android devices. Some of the most widspread mobile malware (e.g. BankBot) are equipped with Rootkits. A rootkit is a malicious software, designed to enable access to a device or an area of its software that is not otherwise allowed.


Attackers can tamper with or install a backdoor in your app, re-sign it and publish the malicious version to third-party app marketplaces. Such attacks typically target popular apps and financial apps.

In-App Protection Is Crucial To Preserve And Improve Your Business Reputation!

These attacks can have devastating consequences. User data can be stolen, putting businesses at risk of regulatory compliance violations and bad publicity. Financial fraud can be committed, resulting in lost revenue. And, of course, there’s the loss of customer and shareholder trust, all having the eventual impact of brand reputation. If the attack goes on long enough, a business could sustain irreparable damage.

Comprehensive In-App Protection


Impede attackers’ attempts to reverse-engineer and modify your app. Promon SHIELD™ makes it more difficult for attackers to spoof your app, tamper with its security controls or perform other nefarious activities.

App binding
Repackaging detection
Store data encrypted on end-users devices
Binding the data to be encrypted to the device
Strong device binding / Fingerprinting
Automatic protection of your app assets
Suits a number of use cases where sensitive data must exist in the published app


Monitor your mobile app’s runtime behavior. Detect whether the app is executing in an insecure environment such as on a rooted (Android) or jailbroken (iOS) device. Mitigate the risks of overlay attacks, debuggers, emulators, and other means by which attackers examine, penetrate, and compromise a mobile app.

Ensure app is running in safe environment
Debugger detection
Jailbreak / Root detection
Emulator detection
Detect if apps from untrusted sources are installed on a device (Android only)
Ensure app is not altered or tampered with (e.g. by malware) at runtime
Detection & protection against StrandHogg exploits
Protection against Accessibility API abuse / UI Spoofing (overlay attacks/screen readers)
Resource verification
Hook detection


Upon detecting malicious activity, an app protected by Promon SHIELD™ will modify its behavior in real time to interrupt potential attacks. Response actions include blocking execution of injected code, notifying security administrators, and terminating the infected app to stop the execution of a compromised app.

Integrity checking
Custom reactions
Screenshot detection / blocking
Anti keylogging
Anti screenreading
Alert / reporting
Blocking external screens
Prevent brute force decryption of sensitive information
Easy Deployment!

You can easily turn your apps into a self-protecting app. Your Android or iOS apps can be quickly uploaded and secured in minutes by using our integration tool, or an SDK that is easily integrated into the app. Once secured, the app is immediately ready for distribution via public app stores.

Easy deployment
Back To Top