Discover the plan that works for you
Your path to complete mobile app security starts here.
|
CoreRequest pricing |
ControlRequest pricing |
CommandRequest pricing |
||
Multilayered protection | |||||
---|---|---|---|---|---|
All-in-one static and dynamic protection | ✓ | ✓ | ✓ | ||
Application code and resource protection | ✓ | ✓ | ✓ | ||
Environment, application and code integrity | ✓ | ✓ | ✓ | ||
Malware defense | ✓ | ✓ | ✓ | ||
Mobile app security testing | |||||
Multi-analysis (static, dynamic, and interactive) | ✓ | ✓ | ✓ | ||
CLI for continuous integration (CI) | ✓ | ✓ | ✓ | ||
Verification against security standards | ✓ | ✓ | ✓ | ||
Downloadable PDF report of findings | ✓ | ✓ | ✓ | ||
Filter out issues in 'dead code' | ✓ | ||||
Support for larger apps | ✓ | ||||
Real-time threat monitoring | |||||
Detailed threat intelligence | ✓ | ✓ | |||
Forensic threat analysis | ✓ | ✓ | |||
Web hook connections | ✓ | ✓ | |||
Raw data access, CSV exports, and weekly reports | ✓ | ✓ | |||
Server-side attestation | |||||
Protect APIs from non-genuine apps | ✓ | ||||
Instant security policy changes | ✓ | ||||
Continuous threat detection updates | ✓ | ||||
Configuration and support | |||||
Guided configuration | ✓ | ✓ | ✓ | ||
Team management | ✓ | ✓ | ✓ | ||
Standard support | ✓ | ✓ | ✓ | ||