Enterprise-grade Piracy Protection Now Available for Mobile Java App
Cryptanium Code Protection for Java delivers the next level of obfuscation, self-defense and tamper resistance technology against piracy. This new level of security hardening protects Java apps with:
“Poorly protected Java apps are exposed to theft of sensitive data, reverse engineering and malicious attacks that can result in angry customers and loss of revenue,” said
With well over a million Android apps in the market and millions more to come, malware is a constant threat to the security of the app ecosystem for brands, consumers, and developers alike. Adding tamper resistance to a mobile app is now a must in order to help thwart the many fake banking applications, Trojan Horses, and other malware appearing on the Android Market every day.
Added Held, “Malware threatens businesses’ confidential and proprietary data by attacking sensitive information via mobile apps. Cryptanium Code Protection for Java combined with our existing Cryptanium Secure Key Box for Java product, delivers enterprise grade protection for mission-critical mobile applications.”
Earlier this year, whiteCryption introduced Cryptanium™ for Mobile Payment, a security solution that protects mobile payment and financial apps using Cryptanium Secure Key Box and Cryptanium Code Protection. Among Cryptanium for Mobile Payment’s unique features is the ability to protect a consumer’s checks, credit card and bank information from being stolen.
Availability: Cryptanium Code Protection for Java will be available early in the second quarter of 2014. To learn more, contact us at: firstname.lastname@example.org
whiteCryption is a leading provider of software code and data protection. Its Cryptanium line of products include Cryptanium Code Protection, a source code protection solution for hardening software applications, and Cryptanium Secure Key Box, a unique white-box library designed to hide and protect cryptographic keys at all times. whiteCryption is an
Media Contacts for whiteCryption: