• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

Best In-App Protection Reviews 2026 | Gartner Peer Insights

Gartner Client Insights

Market Guide for In-App Protection (Transitioning to App shielding)

Popular Product Comparisons

AppDome No-Code Mobile App Security vs DexGuardDexGuard vs JscramblerDexGuard vs Mobile Application Protection Suite (MAPS)DexGuard vs Lookout Embedded AppDefenseAppDome No-Code Mobile App Security vs Lookout Embedded AppDefenseDashO vs DexGuardDexGuard vs Dotfuscator

What are In-App Protection?

The In-app protection market refers to security solutions implemented within the application (instead of the network or the operating system, for example) to make the application more resistant to attacks such as malicious data exfiltration, intrusion, tampering, and reverse engineering. Enterprises use in-app protection to safeguard their software-based assets and to protect their organization and customers from fraudulent attacks.

How Categories and Markets Are Defined
All Categories
/
In-App Protection (Transitioning to App shielding)

In-App Protection Reviews and Ratings

Product Listings

Filter by

Products 1 - 20 of 85
Sort by
Logo of DexGuard

DexGuard

By GuardSquare

4.6
(24 Ratings)

DexGuard is a software designed to enhance the security of Android applications through advanced obfuscation, encryption, and protection techniques. The software provides multilayered security features that help prevent reverse engineering, tampering, and unauthorized access to application code and data. It supports integration into development pipelines, enabling continuous application protection. DexGuard addresses the business problem of intellectual property theft, unauthorized modification, and data breaches in Android applications by offering configurable protection mechanisms that increase the complexity of static and dynamic analysis for potential attackers. It focuses on maintaining application integrity and confidentiality while allowing developers to comply with various security requirements for mobile applications.

Show More Details
Logo of DoveRunner

DoveRunner

By DoveRunner

4.6
(18 Ratings)

AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. AppSealing offers an app shielding solution for app publishers in the market.

Securing Mobile Apps in minutes, Stop Hackers, Fraud, Malware, and cheats in Runtime. Stop Static and Dynamic mobile app attacks with multi-layered protection. AppSealing protects iOS and Android mobile apps from reverse engineering, tampering, and other threats. Achieve Regulatory Compliance, Secure Data-Sharing and End-Points, and Redefine User Experiences. Monitor your apps in real time and continuously improve your security implementation.

Show More Details
Logo of AppDome No-Code Mobile App Security

AppDome No-Code Mobile App Security

By Appdome

4.8
(17 Ratings)

AppDome No-Code Mobile App Security is a software that enables the integration of security features into mobile applications without the need for source code changes. The software provides capabilities such as data encryption, fraud prevention, malware defense, and protection against reverse engineering and tampering. AppDome No-Code Mobile App Security addresses the challenge of securing mobile applications during and after the development process by allowing organizations to implement security controls in a streamlined manner. The software supports a variety of mobile operating systems and applications, ensuring that mobile applications comply with security requirements and industry standards. The solution is designed to help businesses reduce security risks associated with mobile applications and facilitate faster delivery of secure apps to end users.

Show More Details
Logo of SecHard Cyber Hygiene Platform

SecHard Cyber Hygiene Platform

By SecHard

4.9
(14 Ratings)

SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more.

According to CIS, in order to have a secure operating system, it is necessary to change approximately four hundred security settings on a Microsoft Windows Server running with the default settings. There are most probably hundreds of missing security settings on the computer that you have. In an enterprise network with hundreds or thousands of IT assets, reporting and remediating all these deficiencies can be an operation that will take years for IT teams.

With SecHard, enterprises can easily add their own, unique controls and run them on thousands of different assets. In this way, special audit and automatic remediations can be produced for both common and non-common technologies such as Operating Systems, Network Devices, Applications, IoT, SCADA, Swift, POS and many more.

Show More Details
Logo of AppProtectt

AppProtectt

By Protectt.ai

4.7
(9 Ratings)

AppProtectt is a software designed to enhance the security of mobile applications by providing protection against reverse engineering, tampering, and unauthorized access. The software incorporates obfuscation, encryption, and runtime application self-protection features to safeguard sensitive data and intellectual property within mobile apps. AppProtectt aims to address the business problem of securing applications from threats that could compromise user data or application functionality. By offering mechanisms to harden the app code and monitor for suspicious activities, the software helps organizations maintain the integrity and reliability of their mobile offerings in various operating environments.

Show More Details
Logo of Jscrambler

Jscrambler

By Jscrambler

2.2
(9 Ratings)

Jscrambler is a software designed for JavaScript protection and webpage security. It provides features to transform and obfuscate JavaScript code, making it difficult for unauthorized parties to reverse engineer or tamper with critical application logic. The software includes client-side security modules that detect and prevent code modifications, debugging, and other forms of interference on web applications. Jscrambler aims to address business risks such as intellectual property theft, code misuse, and security vulnerabilities in client-side code, assisting organizations in safeguarding sensitive functionality and data integrity within their web applications.

Show More Details
Logo of Lookout Embedded AppDefense

Lookout Embedded AppDefense

By Lookout

4.9
(8 Ratings)

Lookout Embedded AppDefense is a software designed to protect embedded applications on mobile and connected devices. It provides pre-execution and runtime application protection, focusing on preventing code tampering, unauthorized access, and exploitation of vulnerabilities. The software utilizes threat detection mechanisms that monitor application behavior and enforce security policies to reduce exposure to application threats. By safeguarding sensitive data within the application, it addresses security challenges for organizations deploying apps in environments where devices interact with critical systems or handle confidential information. This software aims to mitigate risks associated with mobile malware, reverse engineering, and unauthorized modification, assisting businesses in maintaining the integrity and confidentiality of their mobile applications.

Show More Details
Logo of Build38 Mobile App Security Platform

Build38 Mobile App Security Platform

By Build38

4.6
(7 Ratings)

Build38 Mobile App Security Platform is a software designed to protect mobile applications by offering real-time monitoring, threat detection, and response capabilities. The software provides runtime application self-protection, encryption, and tamper detection features to secure sensitive data and prevent unauthorized access. It addresses business challenges related to mobile application vulnerabilities, fraud, and data breaches by enabling continuous protection and compliance with security regulations. The software integrates with existing development workflows to deliver security for various mobile operating systems and is used by organizations seeking to safeguard their mobile app assets throughout the lifecycle.

Show More Details
Logo of Gemalto

Gemalto

By Thales

4.7
(6 Ratings)

Gemalto software provides digital security solutions designed to manage identities, protect data, and secure digital transactions across various platforms. The software offers functionalities such as encryption, authentication, and access management to help organizations safeguard sensitive information and ensure compliance with regulatory standards. It addresses business challenges related to data protection, identity management, and secure connectivity in digital environments. Gemalto software is utilized by businesses seeking to protect data at rest and in transit, manage digital identities, and enable secure access to applications and networks. The software integrates with existing IT infrastructure and supports a range of deployment options, including on-premises and cloud-based environments, to meet security requirements for digital transformation initiatives.

Show More Details
Logo of iXGuard

iXGuard

By GuardSquare

4.8
(5 Ratings)

iXGuard is a software designed to protect mobile applications developed for iOS against reverse engineering and unauthorized tampering. The software employs code obfuscation techniques and runtime application self-protection to make it difficult for attackers to analyze and modify the app’s code. iXGuard helps organizations safeguard intellectual property and sensitive data within their mobile applications by making the apps more resilient against threats such as code injection, debugging, and decompilation. The software integrates into development workflows and provides configuration options to address different security requirements, reducing risks associated with mobile application vulnerabilities and maintaining app integrity throughout the lifecycle.

Show More Details
Logo of Bugsmirror MASST

Bugsmirror MASST

By Bugsmirror

4.8
(4 Ratings)

Bugsmirror MASST is a software designed to support mobile app security testing by enabling users to analyze mobile applications for vulnerabilities and compliance issues. The software offers features for automated static and dynamic analysis, code review, and risk assessment across various mobile platforms. It assists security teams and developers in identifying security weaknesses, mitigating risks, and ensuring adherence to industry security standards. Bugsmirror MASST addresses the need for a systematic approach to uncovering security flaws in mobile applications, supporting organizations in strengthening their mobile software’s security posture and reducing potential vulnerabilities prior to deployment.

Show More Details
Logo of Mobile Application Protection Suite (MAPS)

Mobile Application Protection Suite (MAPS)

By Zimperium

4.4
(4 Ratings)

Mobile Application Protection Suite is a software designed to secure mobile applications against cyber threats and vulnerabilities. It incorporates features such as application scanning, risk detection, and remediation guidance, aiming to protect sensitive data and ensure compliance with security standards. The software identifies malicious behavior, unauthorized access, and potential exploits across the mobile application lifecycle. By analyzing the security posture of applications, it addresses risks related to code, libraries, and third-party integrations. This software supports organizations in maintaining the integrity and confidentiality of mobile applications, helping them mitigate risks associated with mobile usage, and safeguard digital assets in various business environments.

Show More Details
Logo of Application Protection for Web

Application Protection for Web

By Digital.ai

4.8
(3 Ratings)

Application Protection for Web is a software that provides security for web-based applications by protecting them against threats such as tampering, reverse engineering, and unauthorized access. The software offers features such as runtime protection, code obfuscation, and anti-debug capabilities to safeguard critical application logic and sensitive data. It is designed to address business problems related to data breaches and intellectual property theft, helping organizations maintain the integrity of web applications and comply with regulatory standards. The software allows businesses to deploy secure web applications and prevent attacks that could lead to loss of data or disruption of service.

Show More Details
Logo of BShield

BShield

By Verichains

5
(3 Ratings)

BShield is a software designed to provide browser isolation and security for web-based applications. It offers a remote browser solution that separates web content from the user’s endpoint, aiming to prevent malicious code from reaching devices and networks. The software includes features such as real-time threat detection, granular policy controls, and compatibility with existing security frameworks. BShield addresses challenges related to secure browsing, protection against phishing, and mitigation of web-based attacks by containing and managing internet activities within isolated environments. It is used for reducing risks associated with internet usage, managing web access policies, and improving overall organizational cybersecurity posture.

Show More Details
Logo of Imperva Advanced Bot Protection

Imperva Advanced Bot Protection

By Thales Group (Imperva)

4
(3 Ratings)

Imperva Advanced Bot Protection delivers defense against malicious bots, safeguarding digital assets from sophisticated attacks like credential stuffing, scraping, carding, inventory hoarding, & fraud. With advanced machine learning & behavioral analysis, Imperva detects & mitigates OWASP automated threats in real-time, ensuring legitimate traffic remains unaffected. The solution goes beyond basic bot mitigation, offering comprehensive visibility into bot traffic patterns, & enabling organizations to distinguish between good & bad bots. It provides robust security regardless of where the attack originates by defending against evolving bot tactics across websites, APIs, & mobile apps. Granular control features allow security teams to customize protection based on needs. Whether deployed on-premises, in the cloud, or in hybrid environments, Advanced Bot Protection ensures uninterrupted service & optimized performance while safeguarding critical business operations.

Show More Details
Logo of The Shape Botwall Service (Legacy)

The Shape Botwall Service (Legacy)

By F5

4
(3 Ratings)
Show More Details
Logo of F5 MobileSafe (Legacy)

F5 MobileSafe (Legacy)

By F5

4
(2 Ratings)
Show More Details
Logo of Quixxi Shield

Quixxi Shield

By Quixxi Security

4.5
(2 Ratings)

Quixxi Shield is a software designed to protect mobile applications against security threats and unauthorized access. It provides features such as code obfuscation, encryption, and runtime protection to safeguard applications from reverse engineering and tampering. The software helps businesses secure sensitive data and intellectual property within their mobile apps by integrating automated security mechanisms during the development process. Quixxi Shield aims to address challenges related to app vulnerabilities and compliance by offering a solution that enhances the resilience of applications across different platforms. The software supports non-intrusive integration and enables developers to focus on functionality while maintaining security standards.

Show More Details
Logo of Seraphic

Seraphic

By Seraphic Security

5
(2 Ratings)

Seraphic is a software designed to provide web application security by protecting browsers and endpoints against various threats including phishing, malicious downloads, and data leakage. The software operates through the deployment of an agent that integrates with existing browsers to monitor and secure web sessions without altering user workflows. It addresses business challenges related to unauthorized access, unsafe browsing activities, and compliance requirements by enforcing security policies, preventing credential theft, and detecting anomalous behaviors in real-time. Seraphic supports managed and unmanaged endpoints, offering visibility into web application usage while enabling organizations to maintain security over distributed or hybrid work environments.

Show More Details
Logo of Application Protection for IoT & Embedded Devices (Legacy)

Application Protection for IoT & Embedded Devices (Legacy)

By Digital.ai

4
(1 Rating)

Application Protection for IoT & Embedded Devices is a software designed to secure applications running on connected and embedded devices typically used within the Internet of Things ecosystem. The software provides features such as code obfuscation, runtime application self-protection, and integrity verification to prevent unauthorized access, tampering, and reverse engineering. It addresses business problems related to intellectual property theft, data breaches, and device manipulation by working to ensure that only authorized operations occur within the protected application environment. The software aims to maintain operational reliability and safeguard sensitive assets deployed in distributed or resource-constrained environments.

Show More Details