Feature Matrix
Digital.ai Application Security helps organizations protect the software they build and deliver—from mobile apps to desktop executables to client-side web apps. Our layered protections include code obfuscation, anti-tamper, runtime threat detection, and Runtime Application Self Protection (RASP). Whether you're releasing a consumer-facing mobile app or deploying software in regulated environments, we help you harden your applications to resist reverse engineering, tampering, and abuse.
Our modular product suite offers the flexibility to apply the right protections for every app. From lightweight, no-code deployment to advanced threat monitoring and analytics to White Box Cryptography, teams can choose the protection tier that aligns with their security needs, performance requirements, and development workflow.
We make it easy to apply deep, standards-aligned protections that frustrate attackers—not developers.
Digital.ai App Security for Mobile Feature Matrix
Digital.ai Mobile App Security Features | Essentials | Pro | Premium |
---|---|---|---|
Apply protections automatically in cloud thru SDK | X | ||
Monitors when app run is in unsafe environments | X | X | X |
Reacts to attacks using Runtime Application Self Protection (RASP) | X | X | X |
Detects Dynamic Instrumentation Toolkits | X | X | X |
Protects apps written in/with Swift, ObjC, C/C++, Java, Kotlin, .NET | X | X | X |
Frustrates static analysis through code obfuscation | X | X | |
Monitors, identifies, and reports on code modifications | X | X | |
Protects apps built in hybrid frameworks such as React, Flutter | X | X | |
Applies protections on premises | X | X | |
Symbol renaming | X | X | |
Quick Protect Agent - Configure protection in 3 steps | X | X | |
Adjustable up to 3 levels of security to meet performance needs | X | X | |
Adjustable to nearly limitless levels of security to meet performance needs | X | ||
Android native protections | X | ||
Guard Network | X | ||
App Aware entitlements | X | ||
Key and Data Premium-ready | X | ||
Integration with Continuous Testing (Automated QA Testing) | X | ||
Customized actions and guards | X | ||
Support Tiers | 24/7 Support Pro |
24/7 Support Premium |
AppSec for Desktop/Web/Mobile Essentials Pro Premium
Hardening Feature | Mobile Essentials | Mobile Pro | Mobile Premium | Desktop Premium | Web Premium |
---|---|---|---|---|---|
Apply protections automatically in cloud thru SDK | X | ||||
Monitors when app run is in unsafe environments | X | X | X | X | X |
Reacts to attacks using Runtime Application Self Protection (RASP) | X | X | X | X | X |
Detects Dynamic Instrumentation Toolkits | X | X | X | X | X |
Protects apps written in/with Swift, ObjC, C/C++, Java, Kotlin, .NET | X | X | X | X* | X* |
Frustrates static analysis through code obfuscation | X | X | X | X | |
Monitors, identifies, and reports on code modifications | X | X | X | X | |
Protects apps built in hybrid frameworks such as React, Flutter | X | X | n/a | n/a | |
Applies protections on premises | X | X | X | X | |
Symbol renaming | X | X | X | X | |
Quick Protect Agent - Configure protection in 3 steps | X | X | n/a | X | |
Adjustable up to 3 levels of security to meet performance needs | X | X | n/a | X | |
Adjustable to nearly limitless levels of security to meet performance needs | X | X | X | ||
Android native protections | X | n/a | n/a | ||
Guard Network | X | X | X | ||
App Aware entitlements | X | X* | X | ||
Key and Data Premium-ready | X | X | X | ||
Integration with Continuous Testing (Automated QA Testing) | X | n/a | n/a | ||
Customized actions and guards | X | X | X | ||
Support Tiers | 24/7 Support Pro |
24/7 Support Premium |
24/7 Support Premium |
24/7 Support Premium |
App Aware
Feature | Essentials | Pro | Premium |
---|---|---|---|
Receive notification every time your protected app starts | X | X | X |
Geo-location of every running app instance | X | X | X |
OS type/version on which every instance is being run | X | X | X |
Receive information on type of protection being triggered | X | X | X |
Receive notification every time app is launched in a compromised OS | X | X | X |
Portal Dashboard | X | X | X |
Receive notification every time app is launched in debugger/harness/dynamic instrumentation toolkit | X | X | X |
API requests/sec | 10 | 100 | 100 |
Integration with leading SIEM, SOAR, and BI tools | X | X | |
Webhook notifications | X | X | |
Custom Alert and Events reports | X | X | |
AI-informed user classification | X | ||
AI-informed individual (Geo and customer) Threat Reports | X | ||
Support Tiers | 24/7 Support Pro |
24/7 Support Premium |
Key and Data
Feature | Pro | Premium |
---|---|---|
White Boxing of keys so that they never exist in canonical form | X | X |
Interoperable with other open-source cryptography implementations (OpenSSL compatible) | X | X |
Symmetric Encryption | X | X |
Mitigates side channel attacks (such as DFA) | X | X |
Prevents code lifting | X | X |
Supports whiteboxed ciphertext which cannot be decrypted using standard crypto algorithms | X | X |
Key Exchange – ECC/DH (Diffie-Helman) and FCC/DH | X * | X |
Secure Hashing and HMAC -- SHA-1/2/3, HMAC (SHA), CMAC (AES), DES MAC3 | X * | X |
Integrity and Authenticity Algorithms – MAC/HMAC/CMAC | X * | X |
Runtime WB format key generation | X | X |
Supports custom cryptography architectures | X | |
Offline WB format key generation | X | |
Uniquely obfuscated key/data encoding/decoding per customer | X | |
Option to use AES (128 or 256 bit, CBC, ECB, GCM, CTR, OFB, CFB) and DES (Single, Triple) modes | X | |
Asymmetric encryption – ECC/EG (EI Gamal), RSA (2048, 3072, 4096 and larger key sizes) | X | |
Signature Generation – ECC/DSA (Digital Signature Algorithm), RSA (2048, 3072, 4096 and larger key sizes) | X | |
Key Wrapping and Derivation -- NIST and CMLA Key Wrapping, NIST CMLA and OMA Key Derivation | X | |
Linear and BigInteger Algebra – Provides means to perform modular arithmetic (addition and multiplication) in white-box form | X | |
Shamir Secret Sharing – Divides secrets that need to be encrypted into various unique parts | X | |
Offline obfuscated data encoding/decoding per customer | X | |
Runtime obfuscated data encoding/decoding per customer | X | |
Support Tiers | 24/7 Support Pro |
24/7 Support Premium |