Menu
Menu
inquire

Design Elements

Accordions


Simple Accordion

DexProtector works directly with compiled apps at both bytecode and native levels to harden strings, classes, and metadata, as well as app resources, assets, and internal data. A combination of obfuscation, encryption, and virtualization mechanisms stops reverse engineering, modification, and IP theft.

Two columns accordions

DexProtector works directly with compiled apps at both bytecode and native levels to harden strings, classes, and metadata, as well as app resources, assets, and internal data. A combination of obfuscation, encryption, and virtualization mechanisms stops reverse engineering, modification, and IP theft.

Two columns accordions

DexProtector works directly with compiled apps at both bytecode and native levels to harden strings, classes, and metadata, as well as app resources, assets, and internal data. A combination of obfuscation, encryption, and virtualization mechanisms stops reverse engineering, modification, and IP theft.

Heading lined

DexProtector works directly with compiled apps at both bytecode and native levels to harden strings, classes, and metadata, as well as app resources, assets, and internal data. A combination of obfuscation, encryption, and virtualization mechanisms stops reverse engineering, modification, and IP theft.

Image Accordeon

Crypto Module is a software-based security module which provides a safe place for sensitive transactions to take place. It works in a similar way to hardware secure enclaves and chips used to create secure environments. But the fact that Crypto Module is virtual means it’s much easier to update.

Article elements


Heading

Heading H0+(84)

Heading H0 (56)

Heading H1(48)

Heading H2(40)

Heading H3(32)

Heading H4(24)

Heading H5(19)

Heading H6 button (15)


Note

Note

If you imagine for a second that your physical passport is a representation of an application, then you’ll be able to visualise the different anti-tampering measures it can leverage, such as watermarks, hologram images, and unique ID numbering. But by far the most impressive anti-tampering measure of all is the chip that is built into it that enables quick and easy verification. This chip is the vTEE inside your application.


Lid box

It's crucial to recognize that these are illustrative examples and that actual attack vectors may vary. A comprehensive threat modelling exercise is essential to identify all potential attack vectors and develop effective countermeasures.

It's crucial to recognize that these are illustrative examples and that actual attack vectors may vary. A comprehensive threat modelling exercise is essential to identify all potential attack vectors and develop effective countermeasures.

It's crucial to recognize that these are illustrative examples and that actual attack vectors may vary. A comprehensive threat modelling exercise is essential to identify all potential attack vectors and develop effective countermeasures.

It's crucial to recognize that these are illustrative examples and that actual attack vectors may vary. A comprehensive threat modelling exercise is essential to identify all potential attack vectors and develop effective countermeasures.

It's crucial to recognize that these are illustrative examples and that actual attack vectors may vary. A comprehensive threat modelling exercise is essential to identify all potential attack vectors and develop effective countermeasures.

It's crucial to recognize that these are illustrative examples and that actual attack vectors may vary. A comprehensive threat modelling exercise is essential to identify all potential attack vectors and develop effective countermeasures.

It's crucial to recognize that these are illustrative examples and that actual attack vectors may vary. A comprehensive threat modelling exercise is essential to identify all potential attack vectors and develop effective countermeasures.

Optional title

The most obvious opportunities for vTEEs right now lie in mobile payment security for the reasons outlined above.

Optional title

The most obvious opportunities for vTEEs right now lie in mobile payment security for the reasons outlined above.


Dividers

Light - small padding

Light - big padding

Dark - small padding

Dark - big padding

Dark - default padding


Product Cards

DexProtector 15.0.9.25

The latest version of DexProtector secures your Mobile APIs and expands your reach.

learn more