Customized solutions focused on the client

App shielding

At Wigilabs, we are partners with Promon, the expert security
platform that has protected applications used by over a billion users.

Application security
App Shielding
We work with a partner software for App Shielding that covers different layers and aims to prevent attackers from reverseengineering your application.
Sensitive Data
You can protect sensitive data and safeguard your end users from sophisticated malware.
Benefits of shielding your application

Cutting-edge protection for your application.
State-of-the-art application code protection.
Comprehensive protection against runtime attacks (malware).
By establishing a standardized allocation, the CCL ensures consistent configuration of security controls across various AWS services within an organization.
We guarantee that the application runs in a secure environment.

Additional security layer
Key features of app shield
Prevent
Stop attackers from reverse-engineering or tampering with your apps to avoid repackaging and related attacks.
Protect
Safeguard cryptographic keys and application data against malicious intent.
Detect
Identify rooted and jailbroken devices that may put your mobile eID applications and end users at risk.
Establish
Ensure the integrity of the app and device for trusted end-user authentication.



Security
Malware
Debuggers
Emulator or fake execution environment
Device cloning
Code injection
Hooking
App repackaging
Screenshots
Keylogging
Screen-Scraping
Code hooking
Screen sharing
Integrity checks
File integrity
Identity spoofing (Overlay)
Password theft
OWASP Mobile top 10

Efficiency improved by automation

Insecure data storage

Efficiency improved by automation

Efficiency improved by automation

Insufficient cryptography

Insecure authorization

Client code
quality

Code
tampering

Reverse engineering

Extraneous functionality