• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • Generative AI Knowledge Management Apps/General Productivity
      • AI Code Assistants (Transitioning to AI Coding Agents)
      • AI Application Development Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • Conversational AI Platforms
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • SD-WAN
      • Intranet Packaged Solutions
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Planning Software
      • Financial Close and Consolidation Solutions
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Managed Detection and Response
      • Email Security
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Visual Collaboration Applications
      • Collaborative Work Management
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Cloud-Based ERP for U.S. Local Government
      • Government Budgeting and Planning Solution
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Revenue Enablement Platforms
      • Configure, Price and Quote Applications
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      68 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Code Modernization Tools
      • Mobile App Analytics
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Digital Twin of an Organization Platforms
      • Application Integration Platforms
      • Event Brokers
      • Virtual Reality Development Software
      • Green Software Engineering
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • Load Testing Tools
      • AI Agent Development Platforms for Software Engineering
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Value Stream Management Platforms
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
In-App Protection (Transitioning to App shielding)

In-App Protection Reviews and Ratings

What are In-App Protection?

The In-app protection market refers to security solutions implemented within the application (instead of the network or the operating system, for example) to make the application more resistant to attacks such as malicious data exfiltration, intrusion, tampering, and reverse engineering. Enterprises use in-app protection to safeguard their software-based assets and to protect their organization and customers from fraudulent attacks.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 20 of 85
Sort by
Logo of DexGuard

DexGuard

By GuardSquare

4.7
(24 Ratings)

DexGuard is a software designed to enhance the security of Android applications through advanced obfuscation, encryption, and protection techniques. The software provides multilayered security features that help prevent reverse engineering, tampering, and unauthorized access to application code and data. It supports integration into development pipelines, enabling continuous application protection. DexGuard addresses the business problem of intellectual property theft, unauthorized modification, and data breaches in Android applications by offering configurable protection mechanisms that increase the complexity of static and dynamic analysis for potential attackers. It focuses on maintaining application integrity and confidentiality while allowing developers to comply with various security requirements for mobile applications.

Show More Details
Logo of DoveRunner

DoveRunner

By DoveRunner

4.6
(18 Ratings)

AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. AppSealing offers an app shielding solution for app publishers in the market.

Securing Mobile Apps in minutes, Stop Hackers, Fraud, Malware, and cheats in Runtime. Stop Static and Dynamic mobile app attacks with multi-layered protection. AppSealing protects iOS and Android mobile apps from reverse engineering, tampering, and other threats. Achieve Regulatory Compliance, Secure Data-Sharing and End-Points, and Redefine User Experiences. Monitor your apps in real time and continuously improve your security implementation.

Show More Details
Logo of AppDome No-Code Mobile App Security

AppDome No-Code Mobile App Security

By Appdome

4.8
(17 Ratings)

AppDome No-Code Mobile App Security is a software that enables the integration of security features into mobile applications without the need for source code changes. The software provides capabilities such as data encryption, fraud prevention, malware defense, and protection against reverse engineering and tampering. AppDome No-Code Mobile App Security addresses the challenge of securing mobile applications during and after the development process by allowing organizations to implement security controls in a streamlined manner. The software supports a variety of mobile operating systems and applications, ensuring that mobile applications comply with security requirements and industry standards. The solution is designed to help businesses reduce security risks associated with mobile applications and facilitate faster delivery of secure apps to end users.

Show More Details
Logo of SecHard Cyber Hygiene Platform

SecHard Cyber Hygiene Platform

By SecHard

4.9
(14 Ratings)

SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more.

According to CIS, in order to have a secure operating system, it is necessary to change approximately four hundred security settings on a Microsoft Windows Server running with the default settings. There are most probably hundreds of missing security settings on the computer that you have. In an enterprise network with hundreds or thousands of IT assets, reporting and remediating all these deficiencies can be an operation that will take years for IT teams.

With SecHard, enterprises can easily add their own, unique controls and run them on thousands of different assets. In this way, special audit and automatic remediations can be produced for both common and non-common technologies such as Operating Systems, Network Devices, Applications, IoT, SCADA, Swift, POS and many more.

Show More Details
Logo of Jscrambler

Jscrambler

By Jscrambler

2.2
(9 Ratings)

Jscrambler is a software designed for JavaScript protection and webpage security. It provides features to transform and obfuscate JavaScript code, making it difficult for unauthorized parties to reverse engineer or tamper with critical application logic. The software includes client-side security modules that detect and prevent code modifications, debugging, and other forms of interference on web applications. Jscrambler aims to address business risks such as intellectual property theft, code misuse, and security vulnerabilities in client-side code, assisting organizations in safeguarding sensitive functionality and data integrity within their web applications.

Show More Details
Logo of AppProtectt

AppProtectt

By Protectt.ai

4.9
(8 Ratings)

AppProtectt is a software designed to enhance the security of mobile applications by providing protection against reverse engineering, tampering, and unauthorized access. The software incorporates obfuscation, encryption, and runtime application self-protection features to safeguard sensitive data and intellectual property within mobile apps. AppProtectt aims to address the business problem of securing applications from threats that could compromise user data or application functionality. By offering mechanisms to harden the app code and monitor for suspicious activities, the software helps organizations maintain the integrity and reliability of their mobile offerings in various operating environments.

Show More Details
Logo of Lookout Embedded AppDefense

Lookout Embedded AppDefense

By Lookout

4.9
(8 Ratings)

Lookout Embedded AppDefense is a software designed to protect embedded applications on mobile and connected devices. It provides pre-execution and runtime application protection, focusing on preventing code tampering, unauthorized access, and exploitation of vulnerabilities. The software utilizes threat detection mechanisms that monitor application behavior and enforce security policies to reduce exposure to application threats. By safeguarding sensitive data within the application, it addresses security challenges for organizations deploying apps in environments where devices interact with critical systems or handle confidential information. This software aims to mitigate risks associated with mobile malware, reverse engineering, and unauthorized modification, assisting businesses in maintaining the integrity and confidentiality of their mobile applications.

Show More Details
Logo of Build38 Mobile App Security Platform

Build38 Mobile App Security Platform

By Build38

4.6
(7 Ratings)

Build38 Mobile App Security Platform is a software designed to protect mobile applications by offering real-time monitoring, threat detection, and response capabilities. The software provides runtime application self-protection, encryption, and tamper detection features to secure sensitive data and prevent unauthorized access. It addresses business challenges related to mobile application vulnerabilities, fraud, and data breaches by enabling continuous protection and compliance with security regulations. The software integrates with existing development workflows to deliver security for various mobile operating systems and is used by organizations seeking to safeguard their mobile app assets throughout the lifecycle.

Show More Details
Logo of Gemalto

Gemalto

By Thales

4.7
(6 Ratings)

Gemalto software provides digital security solutions designed to manage identities, protect data, and secure digital transactions across various platforms. The software offers functionalities such as encryption, authentication, and access management to help organizations safeguard sensitive information and ensure compliance with regulatory standards. It addresses business challenges related to data protection, identity management, and secure connectivity in digital environments. Gemalto software is utilized by businesses seeking to protect data at rest and in transit, manage digital identities, and enable secure access to applications and networks. The software integrates with existing IT infrastructure and supports a range of deployment options, including on-premises and cloud-based environments, to meet security requirements for digital transformation initiatives.

Show More Details
Logo of iXGuard

iXGuard

By GuardSquare

4.8
(5 Ratings)

iXGuard is a software designed to protect mobile applications developed for iOS against reverse engineering and unauthorized tampering. The software employs code obfuscation techniques and runtime application self-protection to make it difficult for attackers to analyze and modify the app’s code. iXGuard helps organizations safeguard intellectual property and sensitive data within their mobile applications by making the apps more resilient against threats such as code injection, debugging, and decompilation. The software integrates into development workflows and provides configuration options to address different security requirements, reducing risks associated with mobile application vulnerabilities and maintaining app integrity throughout the lifecycle.

Show More Details
Logo of Bugsmirror MASST

Bugsmirror MASST

By Bugsmirror

4.8
(4 Ratings)

Bugsmirror MASST is a software designed to support mobile app security testing by enabling users to analyze mobile applications for vulnerabilities and compliance issues. The software offers features for automated static and dynamic analysis, code review, and risk assessment across various mobile platforms. It assists security teams and developers in identifying security weaknesses, mitigating risks, and ensuring adherence to industry security standards. Bugsmirror MASST addresses the need for a systematic approach to uncovering security flaws in mobile applications, supporting organizations in strengthening their mobile software’s security posture and reducing potential vulnerabilities prior to deployment.

Show More Details
Logo of Mobile Application Protection Suite (MAPS)

Mobile Application Protection Suite (MAPS)

By Zimperium

4.3
(4 Ratings)

Mobile Application Protection Suite is a software designed to secure mobile applications against cyber threats and vulnerabilities. It incorporates features such as application scanning, risk detection, and remediation guidance, aiming to protect sensitive data and ensure compliance with security standards. The software identifies malicious behavior, unauthorized access, and potential exploits across the mobile application lifecycle. By analyzing the security posture of applications, it addresses risks related to code, libraries, and third-party integrations. This software supports organizations in maintaining the integrity and confidentiality of mobile applications, helping them mitigate risks associated with mobile usage, and safeguard digital assets in various business environments.

Show More Details
Logo of Application Protection for Web

Application Protection for Web

By Digital.ai

4.6
(3 Ratings)

Application Protection for Web is a software that provides security for web-based applications by protecting them against threats such as tampering, reverse engineering, and unauthorized access. The software offers features such as runtime protection, code obfuscation, and anti-debug capabilities to safeguard critical application logic and sensitive data. It is designed to address business problems related to data breaches and intellectual property theft, helping organizations maintain the integrity of web applications and comply with regulatory standards. The software allows businesses to deploy secure web applications and prevent attacks that could lead to loss of data or disruption of service.

Show More Details
Logo of BShield

BShield

By Verichains

5
(3 Ratings)

BShield is a software designed to provide browser isolation and security for web-based applications. It offers a remote browser solution that separates web content from the user’s endpoint, aiming to prevent malicious code from reaching devices and networks. The software includes features such as real-time threat detection, granular policy controls, and compatibility with existing security frameworks. BShield addresses challenges related to secure browsing, protection against phishing, and mitigation of web-based attacks by containing and managing internet activities within isolated environments. It is used for reducing risks associated with internet usage, managing web access policies, and improving overall organizational cybersecurity posture.

Show More Details
Logo of Imperva Advanced Bot Protection

Imperva Advanced Bot Protection

By Thales Group (Imperva)

4
(3 Ratings)

Imperva Advanced Bot Protection delivers defense against malicious bots, safeguarding digital assets from sophisticated attacks like credential stuffing, scraping, carding, inventory hoarding, & fraud. With advanced machine learning & behavioral analysis, Imperva detects & mitigates OWASP automated threats in real-time, ensuring legitimate traffic remains unaffected. The solution goes beyond basic bot mitigation, offering comprehensive visibility into bot traffic patterns, & enabling organizations to distinguish between good & bad bots. It provides robust security regardless of where the attack originates by defending against evolving bot tactics across websites, APIs, & mobile apps. Granular control features allow security teams to customize protection based on needs. Whether deployed on-premises, in the cloud, or in hybrid environments, Advanced Bot Protection ensures uninterrupted service & optimized performance while safeguarding critical business operations.

Show More Details
Logo of The Shape Botwall Service (Legacy)

The Shape Botwall Service (Legacy)

By F5

4
(3 Ratings)
Show More Details
Logo of F5 MobileSafe (Legacy)

F5 MobileSafe (Legacy)

By F5

4
(2 Ratings)
Show More Details
Logo of Quixxi Shield

Quixxi Shield

By Quixxi Security

4.5
(2 Ratings)

Quixxi Shield is a software designed to protect mobile applications against security threats and unauthorized access. It provides features such as code obfuscation, encryption, and runtime protection to safeguard applications from reverse engineering and tampering. The software helps businesses secure sensitive data and intellectual property within their mobile apps by integrating automated security mechanisms during the development process. Quixxi Shield aims to address challenges related to app vulnerabilities and compliance by offering a solution that enhances the resilience of applications across different platforms. The software supports non-intrusive integration and enables developers to focus on functionality while maintaining security standards.

Show More Details
Logo of Seraphic

Seraphic

By Seraphic Security

5
(2 Ratings)

Seraphic is a software designed to provide web application security by protecting browsers and endpoints against various threats including phishing, malicious downloads, and data leakage. The software operates through the deployment of an agent that integrates with existing browsers to monitor and secure web sessions without altering user workflows. It addresses business challenges related to unauthorized access, unsafe browsing activities, and compliance requirements by enforcing security policies, preventing credential theft, and detecting anomalous behaviors in real-time. Seraphic supports managed and unmanaged endpoints, offering visibility into web application usage while enabling organizations to maintain security over distributed or hybrid work environments.

Show More Details
Logo of Application Protection for IoT & Embedded Devices (Legacy)

Application Protection for IoT & Embedded Devices (Legacy)

By Digital.ai

4
(1 Rating)

Application Protection for IoT & Embedded Devices is a software designed to secure applications running on connected and embedded devices typically used within the Internet of Things ecosystem. The software provides features such as code obfuscation, runtime application self-protection, and integrity verification to prevent unauthorized access, tampering, and reverse engineering. It addresses business problems related to intellectual property theft, data breaches, and device manipulation by working to ensure that only authorized operations occur within the protected application environment. The software aims to maintain operational reliability and safeguard sensitive assets deployed in distributed or resource-constrained environments.

Show More Details

Gartner Research

Market Guide for In-App Protection (Transitioning to App shielding)

Popular Product Comparisons

AppDome No-Code Mobile App Security vs DexGuardDexGuard vs JscramblerDexGuard vs Mobile Application Protection Suite (MAPS)DexGuard vs Lookout Embedded AppDefenseAppDome No-Code Mobile App Security vs Lookout Embedded AppDefenseDashO vs DexGuardDexGuard vs Dotfuscator

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.