Introducing G2.ai, the future of software buying.Try now
cside
Sponsored
cside
Visit Website
Product Avatar Image
Trusted Software

By Irdeto

0 out of 5 stars

How would you rate your experience with Trusted Software?

cside
Sponsored
cside
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Trusted Software Reviews & Product Details

Profile Status

This profile is currently managed by Trusted Software but has limited features.

Are you part of the Trusted Software team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Trusted Software before?

Answer a few questions to help the Trusted Software community

Trusted Software Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Trusted Software for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(572)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Appdome Logo
Appdome
4.8
(63)
AI-Native Platform to automate mobile app protection. 400+ defenses Certified Secure™ for mobile app security, fraud prevention, anti-malware, anti-bot, anti-ATO, and anti-cheat. Full lifecycle automated build, test, monitor, detect, respond, support. All Android & iOS apps.
3
DoveRunner Logo
DoveRunner
4.7
(51)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
4
Codacy Logo
Codacy
4.6
(28)
Codacy is an automated code review tool that allows developers to improve code quality and monitor technical debt.
5
Jscrambler Logo
Jscrambler
4.4
(24)
Jscrambler, the power to protect your code
6
Dotfuscator Logo
Dotfuscator
4.6
(23)
Dotfuscator is a .NET Obfuscator & much more. It provides enterprise-grade app protection, greatly reducing the risk of piracy, intellectual property theft and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering and alerting and defense technology provides protection for hundreds of thousands of applications around the world.
7
Zimperium Mobile Application Protection Suite (MAPS) Logo
Zimperium Mobile Application Protection Suite (MAPS)
4.0
(21)
Zimperium’s Mobile Application Protection Suite (MAPS) enables enterprises to secure mobile apps from development through runtime—ensuring both compliance and protection in production environments. MAPS includes four core components: zScan: Identifies compliance, privacy, and security risks in the development process before apps are released. zShield: Protects source code, IP, and app data from reverse engineering and tampering. zKeyBox: Secures encryption keys and secrets using white-box cryptography to prevent extraction or misuse. zDefend: An embedded SDK that provides on-device detection and defense against device, network, phishing, and malware threats. Together, these capabilities deliver comprehensive in-app protection with centralized threat visibility—trusted by enterprises in regulated and high-risk industries.
8
LIAPP Logo
LIAPP
4.8
(20)
LIAPP, the powerful mobile app protector, integrated in a minute.
9
Feroot Security Logo
Feroot Security
4.9
(21)
Feroot AI agents to automate complex security and compliance processes, replacing manual work, human errors, and overhead costs with continuous, real-time automation. While traditional tools, Feroot’s AI-driven approach provides: • One-Click Compliance and Security: Achieve compliance with over 50 global laws and standards—including PCI DSS 4.0.1, HIPAA, CCPA/CPRA, GDPR, and CIPA—in just 45 seconds. What once took teams months, Feroot streamlines into a single, effortless action. • Proactive Protection: Feroot’s AI doesn’t just detect threats—it prevents them. By automating the monitoring and securing of web assets, Feroot stops hidden risks like Magecart, formjacking, and unauthorized data collection in real time. • Cost and Efficiency Gains: Automation eliminates labor-intensive tasks, reducing operational costs and ensuring consistent, error-free results.
10
DashO Logo
DashO
4.5
(12)
DashO is a Java and Android Obfuscator plus much more. It provides enterprise-grade app hardening and shielding, greatly reducing the risk of intellectual property theft, data theft, piracy, and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering, anti-rooted device solution provides protection for applications all around the world.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Trusted Software
View Alternatives