Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Accelerate the launch of top-tier mobile applications into the marketplace without sacrificing security. Entrust the development and deployment of exceptional mobile apps for your organization to us, allowing you to focus on your business while we handle mobile app security. Recognized as a leading security solution by Gartner, we take pride in how the Appknox platform protects our clients’ applications from all potential vulnerabilities. At Appknox, our commitment to providing Mobile Application Security empowers businesses to reach their goals both now and in the future. Our Static Application Security Testing (SAST) employs 36 diverse test cases to uncover nearly all vulnerabilities hidden within your source code, ensuring compliance with security standards like OWASP Top 10, PCI-DSS, HIPAA, and other prevalent security threat metrics. Additionally, our Dynamic Application Security Testing (DAST) identifies sophisticated vulnerabilities while your application is live, providing an extra layer of protection. Through our comprehensive security solutions, we strive to create a safer mobile environment for all users.
Description
Kryptowire delivers a suite of SaaS solutions that focus on enhancing the security of mobile applications. The company provides tools for assurance and anti-piracy measures, alongside security analytics for marketplaces and protection of mobile brands. Serving commercial clients worldwide, Kryptowire employs automated systems to detect vulnerabilities, compliance issues, and back-doors, whether they result from oversight or intent. Their technology conducts comprehensive security evaluations of all mobile applications across various devices used by employees within an organization. With options for cloud-based or on-premise deployment, they emphasize the privacy of user and enterprise data by not collecting any. Additionally, they perform rigorous testing on third-party libraries, ensuring thorough validation of mobile and IoT firmware security in accordance with the highest standards set by the government and industry. By using Kryptowire’s solutions, businesses can significantly improve their mobile security posture and maintain compliance in a rapidly evolving digital landscape.
API Access
Has API
API Access
Has API
Integrations
BlackBerry Guard
Ivanti Neurons for MDM
Seconize DeRisk Center
Strobes RBVM
Integrations
BlackBerry Guard
Ivanti Neurons for MDM
Seconize DeRisk Center
Strobes RBVM
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Appknox
Founded
2014
Country
Singapore
Website
www.appknox.com
Vendor Details
Company Name
Kryptowire
Founded
2011
Country
United States
Website
www.kryptowire.com
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Mobile App Testing
Functional Testing
Installation Testing
Interruption Testing
Memory Testing
Performance Testing
Usability Testing
Static Application Security Testing (SAST)
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
Static Code Analysis
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Product Features
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection