2026 Best Software Awards are here!See the list
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at C-Prot Embedded AppDefense, reclaim access to make changes.
C-Prot Embedded AppDefense

By C-Prot Siber Güvenlik Teknolojileri A.S

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at C-Prot Embedded AppDefense, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with C-Prot Embedded AppDefense?

It's been two months since this profile received a new review
Leave a Review

C-Prot Embedded AppDefense Reviews & Product Details

C-Prot Embedded AppDefense Media

C-Prot Embedded AppDefense Demo - C-Prot Embedded AppDefense
Provide lightweight, embedded SDK protection for your applications against all threats.
Product Avatar Image

Have you used C-Prot Embedded AppDefense before?

Answer a few questions to help the C-Prot Embedded AppDefense community

C-Prot Embedded AppDefense Reviews (1)

Reviews

C-Prot Embedded AppDefense Reviews (1)

5.0
1 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
YC
Small-Business (50 or fewer emp.)
"C-Prot Appdefense is a comprehensive, powerful application for mobile application security needs"
What do you like best about C-Prot Embedded AppDefense?

Working with C-Prot provides absolute assurance of mobile app security. Thanks to their strong security measures as well as Anti-Malware, Device Fingerprinting, Root/jailbreak Detection, Anti-Debugging, Anti-Screenreader features and constant updates, they ensure that our apps are always protected against the latest threats. The customer service is also outstanding, we get a quick response to every question we have. Review collected by and hosted on G2.com.

What do you dislike about C-Prot Embedded AppDefense?

There is nothing not to like. It was a great experience using C-Prot and communicating with the support team. They always responded to me on time and helped me to deal with every issue Review collected by and hosted on G2.com.

There are not enough reviews of C-Prot Embedded AppDefense for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Jamf Logo
Jamf
4.7
(2,088)
A complete Apple management solution for IT pros to empower users and simplify the deployment, inventory, and security of Macs, iPads, and iPhones. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro (formerly Casper Suite) is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.
2
Dynatrace Logo
Dynatrace
4.5
(1,359)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
3
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(593)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
4
Appdome Logo
Appdome
4.8
(75)
AI-Native Platform to automate mobile app protection. 400+ defenses Certified Secure™ for mobile app security, fraud prevention, anti-malware, anti-bot, anti-ATO, and anti-cheat. Full lifecycle automated build, test, monitor, detect, respond, support. All Android & iOS apps.
5
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.5
(69)
Palo Alto Networks' GlobalProtect is a comprehensive network security solution designed to extend the protection of the Next-Generation Security Platform to mobile users, regardless of their location. By establishing a secure connection between remote devices and the corporate network, GlobalProtect ensures consistent enforcement of security policies, safeguarding sensitive data and applications from potential threats. Key Features and Functionality: - Identity-Based Access Control: GlobalProtect simplifies remote access management by implementing identity-aware authentication, allowing organizations to enforce access policies based on user identity and device posture. - Device Trust Enforcement: Before granting network access, GlobalProtect assesses the health and security posture of devices, ensuring compliance with organizational security standards and supporting Zero Trust Network Access principles. - Consistent Security Policies: The solution extends industry-leading security controls across all mobile application traffic, regardless of the user's location or connection method, providing seamless protection against threats. - Comprehensive Security: GlobalProtect delivers transparent, risk-free access to sensitive data through an always-on, secure connection, ensuring that remote users are protected without compromising performance. - Full Visibility: By eliminating blind spots, GlobalProtect offers complete visibility into remote workforce traffic across all applications, ports, and protocols, enabling organizations to monitor and manage network activity effectively. Primary Value and Problem Solved: GlobalProtect addresses the challenges associated with securing a hybrid workforce by providing a robust solution that ensures secure remote access to corporate resources. It mitigates increased security risks associated with remote work by enforcing consistent security policies and maintaining visibility into network traffic. By integrating identity-based access control and device trust enforcement, GlobalProtect supports organizations in implementing Zero Trust principles, thereby reducing the attack surface and enhancing overall security posture. This comprehensive approach enables businesses to maintain productivity and performance without compromising on security, effectively protecting against advanced threats targeting remote users.
6
Check Point Harmony Mobile Protection Logo
Check Point Harmony Mobile Protection
4.5
(55)
Check Point Harmony Mobile is a comprehensive mobile threat defense solution designed to safeguard corporate data by securing employees' mobile devices across all attack vectors, including applications, networks, and operating systems. It seamlessly integrates into existing mobile environments, ensuring robust protection without compromising user experience or privacy. Key Features and Functionality: - App and File Protection: Detects and blocks the download of malicious apps and files in real-time, preventing malware from infiltrating devices. - Network Protection: Offers a range of network security capabilities, including anti-phishing, safe browsing, anti-bot measures, URL filtering, protected DNS, and Wi-Fi network security to detect and prevent network-based attacks. - User-Friendly Deployment: Integrates seamlessly with existing mobile environments, allowing for quick deployment and scaling without impacting user experience or privacy. - Comprehensive Threat Defense: Utilizes advanced technologies to prevent threats to the operating system, applications, and network, ensuring a high threat catch rate with minimal impact on device performance. Primary Value and User Solutions: Harmony Mobile addresses the growing need for robust mobile security in organizations by providing complete protection against sophisticated cyber threats targeting mobile devices. It ensures that corporate data remains secure, even as employees access resources from various devices and locations. By offering a user-friendly and easily deployable solution, Harmony Mobile enables organizations to enforce security policies effectively, maintain compliance, and protect sensitive information without disrupting productivity or user privacy.
7
Prey Logo
Prey
4.7
(55)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
8
DoveRunner Logo
DoveRunner
4.7
(52)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
9
Contrast Security Logo
Contrast Security
4.5
(49)
Is a production app and API protection blocking attacks and reducing false positives, that helps developer and security teams prioritize vulnerability backlogs
10
Symantec Mobile Threat Defense Logo
Symantec Mobile Threat Defense
4.1
(45)
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
C-Prot Embedded AppDefense