Best Software for 2025 is now live!
|| products.size

Best Application Shielding Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Application shielding software enables users to modify and application’s source to make it more resistant to outside tampering.

To qualify for inclusion in the Application Shielding category, a product must:

Protect an application from data leakage
Prevents code injections to your application
Ensure users’ protection while they use your product

Best Application Shielding Software At A Glance

Best for Mid-Market:
Highest User Satisfaction:
Show LessShow More
Highest User Satisfaction:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
31 Listings in Application Shielding Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built on top of V-Key’s patented V-OS Virtual Secure Element as the security foundation, V-OS App Protection adds another layer of tamper protection and security enhancements.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • V-OS App Protection features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    8.3
    Quality of Support
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    V-Key
    Twitter
    @vkey_inc
    250 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

Built on top of V-Key’s patented V-OS Virtual Secure Element as the security foundation, V-OS App Protection adds another layer of tamper protection and security enhancements.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
V-OS App Protection features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
8.3
Quality of Support
Average: 8.8
Seller Details
Seller
V-Key
Twitter
@vkey_inc
250 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    V-OS is a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app, and creates a safe operating environment where data can be stored and cryptographic

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • V-OS Virtual Secure Element features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    8.3
    Quality of Support
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    V-Key
    Twitter
    @vkey_inc
    250 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

V-OS is a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app, and creates a safe operating environment where data can be stored and cryptographic

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
V-OS Virtual Secure Element features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
8.3
Quality of Support
Average: 8.8
Seller Details
Seller
V-Key
Twitter
@vkey_inc
250 Twitter followers

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RamQuest’s solutions include our fully integrated closing, escrow accounting, imaging, transaction management, esigning, and digital marketplace solutions and are available on-premise or in a hosted e

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Data Theorem features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RamQuest’s solutions include our fully integrated closing, escrow accounting, imaging, transaction management, esigning, and digital marketplace solutions and are available on-premise or in a hosted e

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Data Theorem features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Digital.ai Application Protection offers protection and management solutions for IoT, mobile, and other applications.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Digital.ai Application Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Plano, Texas
    Twitter
    @digitaldotai
    801 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    975 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Digital.ai Application Protection offers protection and management solutions for IoT, mobile, and other applications.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Digital.ai Application Protection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Plano, Texas
Twitter
@digitaldotai
801 Twitter followers
LinkedIn® Page
www.linkedin.com
975 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domdog is the most flexible and no-nonsense solution for compliance with 6.4.3 and 11.6.1 requirements of PCI DSS 4.0.1. Every organization has different preferences and constraints regarding what

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domdog features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Domdog
    HQ Location
    Delaware, US
    LinkedIn® Page
    linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Domdog is the most flexible and no-nonsense solution for compliance with 6.4.3 and 11.6.1 requirements of PCI DSS 4.0.1. Every organization has different preferences and constraints regarding what

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Domdog features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Domdog
HQ Location
Delaware, US
LinkedIn® Page
linkedin.com
8 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mob

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Endcrypt features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Procenne
Product Description
How are these determined?Information
This description is provided by the seller.

EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mob

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Endcrypt features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Procenne
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forces Unseen's bread and butter is application security, particularly with bleeding-edge technologies often used by startups. Forces Unseen excels at helping companies secure products that use techno

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forces Unseen features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Forces Unseen's bread and butter is application security, particularly with bleeding-edge technologies often used by startups. Forces Unseen excels at helping companies secure products that use techno

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Forces Unseen features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HackGuard focus 100% on keeping your important App secure, everywhere it runs, at all times, on every device.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HackGuard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

HackGuard focus 100% on keeping your important App secure, everywhere it runs, at all times, on every device.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
HackGuard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KyberSecurity protection is a suite of advanced multilayered cybersecurity technologies. The security engines operate interconnected leveraging an outstanding protection against the most sophisticated

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KyberSecurity Application Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

KyberSecurity protection is a suite of advanced multilayered cybersecurity technologies. The security engines operate interconnected leveraging an outstanding protection against the most sophisticated

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
KyberSecurity Application Protection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quarks AppShield is a Software Protection Tool intended to protect applications and firmware running on embedded, mobile and desktop platforms. It provides core technologies such as code obfuscation,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • QShield features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Quarkslab
Product Description
How are these determined?Information
This description is provided by the seller.

Quarks AppShield is a Software Protection Tool intended to protect applications and firmware running on embedded, mobile and desktop platforms. It provides core technologies such as code obfuscation,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
QShield features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Quarkslab
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StarForce ProActive for Business is recommended for protection of business applications that are designed to work in either a “thin client-server”/”fat client-server” configuration, or as a stand-alon

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StarForce ProActive for Business features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    StarForce
    Twitter
    @ILoveStarForce
    151 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

StarForce ProActive for Business is recommended for protection of business applications that are designed to work in either a “thin client-server”/”fat client-server” configuration, or as a stand-alon

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
StarForce ProActive for Business features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
StarForce
Twitter
@ILoveStarForce
151 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symbiotic Security is an IDE plugin that allows developers to spellcheck their code for vulnerabilities in real time, providing instant detection and prescriptive remediation recommendations as they w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symbiotic Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Efficiency Improvement
    3
    Speed
    3
    Ease of Use
    2
    Security
    2
    Accuracy
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symbiotic Security features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Quality of Support
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2024
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Symbiotic Security is an IDE plugin that allows developers to spellcheck their code for vulnerabilities in real time, providing instant detection and prescriptive remediation recommendations as they w

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Symbiotic Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Efficiency Improvement
3
Speed
3
Ease of Use
2
Security
2
Accuracy
1
Cons
This product has not yet received any negative sentiments.
Symbiotic Security features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.9
10.0
Quality of Support
Average: 8.8
Seller Details
Year Founded
2024
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SBOM management platform for your application silos. Reduce cost to identify and remove unwanted artifacts like Log4j by up to 90%. Expose security issues earlier and lower remediation costs by up to

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustCenter features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

SBOM management platform for your application silos. Reduce cost to identify and remove unwanted artifacts like Log4j by up to 90%. Expose security issues earlier and lower remediation costs by up to

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TrustCenter features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mobile applications are now part of most organizations’ business models. With the increase in applications comes the increase of threats. Trusted Software brings the renowned Cloakware® Software Prote

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trusted Software features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Irdeto
    Year Founded
    1969
    HQ Location
    Hoofddorp, Noord-Holland
    Twitter
    @Irdeto
    3,044 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,134 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mobile applications are now part of most organizations’ business models. With the increase in applications comes the increase of threats. Trusted Software brings the renowned Cloakware® Software Prote

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Trusted Software features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Irdeto
Year Founded
1969
HQ Location
Hoofddorp, Noord-Holland
Twitter
@Irdeto
3,044 Twitter followers
LinkedIn® Page
www.linkedin.com
1,134 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Verimatrix XTD stands at the forefront of application security, offering unmatched protection for mobile, web desktop and embedded applications in critical industries while streamlining implementation

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verimatrix XTD features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Diego, CA
    Twitter
    @VerimatrixInc
    4,869 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    297 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Verimatrix XTD stands at the forefront of application security, offering unmatched protection for mobile, web desktop and embedded applications in critical industries while streamlining implementation

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Verimatrix XTD features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Diego, CA
Twitter
@VerimatrixInc
4,869 Twitter followers
LinkedIn® Page
www.linkedin.com
297 employees on LinkedIn®