This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Trusted Software Reviews (0)
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of Trusted Software for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Cloudflare Application Security and Performance
4.5
(572)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Appdome
4.8
(63)
AI-Native Platform to automate mobile app protection. 400+ defenses Certified Secure™ for mobile app security, fraud prevention, anti-malware, anti-bot, anti-ATO, and anti-cheat. Full lifecycle automated build, test, monitor, detect, respond, support. All Android & iOS apps.
3
DoveRunner
4.7
(51)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
4
Codacy
4.6
(28)
Codacy is an automated code review tool that allows developers to improve code quality and monitor technical debt.
5
Jscrambler
4.4
(24)
Jscrambler, the power to protect your code
6
Dotfuscator
4.6
(23)
Dotfuscator is a .NET Obfuscator & much more. It provides enterprise-grade app protection, greatly reducing the risk of piracy, intellectual property theft and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering and alerting and defense technology provides protection for hundreds of thousands of applications around the world.
7
Zimperium Mobile Application Protection Suite (MAPS)
4.0
(21)
Zimperium’s Mobile Application Protection Suite (MAPS) enables enterprises to secure mobile apps from development through runtime—ensuring both compliance and protection in production environments. MAPS includes four core components: zScan: Identifies compliance, privacy, and security risks in the development process before apps are released. zShield: Protects source code, IP, and app data from reverse engineering and tampering. zKeyBox: Secures encryption keys and secrets using white-box cryptography to prevent extraction or misuse. zDefend: An embedded SDK that provides on-device detection and defense against device, network, phishing, and malware threats. Together, these capabilities deliver comprehensive in-app protection with centralized threat visibility—trusted by enterprises in regulated and high-risk industries.
8
LIAPP
4.8
(20)
LIAPP, the powerful mobile app protector, integrated in a minute.
9
Feroot Security
4.9
(21)
Feroot AI agents to automate complex security and compliance processes, replacing manual work, human errors, and overhead costs with continuous, real-time automation. While traditional tools, Feroot’s AI-driven approach provides: • One-Click Compliance and Security: Achieve compliance with over 50 global laws and standards—including PCI DSS 4.0.1, HIPAA, CCPA/CPRA, GDPR, and CIPA—in just 45 seconds. What once took teams months, Feroot streamlines into a single, effortless action. • Proactive Protection: Feroot’s AI doesn’t just detect threats—it prevents them. By automating the monitoring and securing of web assets, Feroot stops hidden risks like Magecart, formjacking, and unauthorized data collection in real time. • Cost and Efficiency Gains: Automation eliminates labor-intensive tasks, reducing operational costs and ensuring consistent, error-free results.
10
DashO
4.5
(12)
DashO is a Java and Android Obfuscator plus much more. It provides enterprise-grade app hardening and shielding, greatly reducing the risk of intellectual property theft, data theft, piracy, and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering, anti-rooted device solution provides protection for applications all around the world.
Pricing
Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.


