Skip to main content
Why choose us?
Product
App security by platform
Promon SHIELD® for Mobile
App shielding for Android and iOS
Promon SHIELD® for Desktop
Extensive desktop protection
Promon IP Protection Pro™
Secure your intellectual property
Promon App Attestation™
Enhance your API protection
Promon Asset Protection™
Avoid your app being compromised
By Industry
Finance and banking
Payments
Health and medical
Retail
eGovernment
Automotive
Gaming
Solutions
By use case
App shielding
Protect against static and dynamic attacks
Compliance
Enable compliance with app shielding
Code obfuscation
Code obfuscation and encryption
By Technology
Promon Jigsaw engine
About us
About us
Learn about Promon and our history
Careers
Contact us
Need help?
Partners
Become a partner
Resources
Resources
See all our resources
Downloads
Learn more about app security
App Threat Reports
Security News
Discover the latest news from Promon
Customer Stories
Our customers and why they’re using app shielding
Glossary
A technical security software glossary
Get a demo
Tana Blegen
All
Android mobile security
App shielding
Code obfuscation
iOS mobile security
Malware
Security News
Malware
What you need to know about iOS jailbreaks
Android mobile security
Learn how to protect your apps against the new Android overlay threat
App shielding
Promon achieves EMVCo SBMP Certification
Android mobile security
What rooting is and how root detection can be done on Android
Android mobile security
New ‘Rogue’ (MRAT) malware enables low-level cybercriminals to exploit your apps
App shielding
Information leakage is commonplace: more than 3,000 apps tested
App shielding
Promon Announces Secure Application ROM (SAROM)
App shielding
How Health Apps Leave Their API Keys Vulnerable To Attacks And How To Protect Them
App shielding
Keylogger attacks on banking apps increase
App shielding
Rapper or Malware – Can Cybersecurity Experts and Rap Fans Tell The Difference?
App shielding
10 application security threats you should know
App shielding
Massive Mobile Banking Fraud Exposes Banks’ Need for App Security, Modernized Authentication and Risk Analytics
« Previous
1
2
3
4
Next »