Discover the plan that works for you
Your path to complete mobile app security starts here.
|
CoreRequest pricing |
ControlRequest pricing |
CommandRequest pricing |
||
| Multilayered protection | |||||
|---|---|---|---|---|---|
| All-in-one static and dynamic protection | ✓ | ✓ | ✓ | ||
| Application code and resource protection | ✓ | ✓ | ✓ | ||
| Environment, application, and code integrity | ✓ | ✓ | ✓ | ||
| Malware defense | ✓ | ✓ | ✓ | ||
| Mobile app security testing | |||||
| Multi-analysis (static, dynamic, and interactive) | ✓ | ✓ | ✓ | ||
| CLI for continuous integration (CI) | ✓ | ✓ | ✓ | ||
| Verification against security standards | ✓ | ✓ | ✓ | ||
| Downloadable PDF report of findings | ✓ | ✓ | ✓ | ||
| Filter out issues in 'dead code' | ✓ | ||||
| Support for larger apps | ✓ | ||||
| Real-time threat monitoring | |||||
| Detailed threat intelligence | ✓ | ✓ | |||
| Forensic threat analysis | ✓ | ✓ | |||
| Webhook connections | ✓ | ✓ | |||
| Raw data access, CSV exports, and weekly reports | ✓ | ✓ | |||
| Server-side attestation | |||||
| Protect APIs from non-genuine apps | ✓ | ||||
| Instant security policy changes | ✓ | ||||
| Continuous threat detection updates | ✓ | ||||
| Configuration and support | |||||
| Guided configuration | ✓ | ✓ | ✓ | ||
| Team management | ✓ | ✓ | ✓ | ||
| Standard support | ✓ | ✓ | ✓ | ||


