×
- Security Platform
- Data & App Security
- Network Security
- Security Operation & Response
- User Security
- Infrastructure Security
- Policy & Compliance Management
- Security Threat Advisory
- Looking Glass
- FireEye
- Governance Risk and Compliance
- Governance / Risk / Compliance
- Strategic Consulting
- ADSIC
- FISMA
- ISO 20000 ITSM
- ISO 22301 BCMS
- ISO 27001 ISMS
- PCI DSS
- Information Security Review
- Events
- Trade Shows
- Webinars
×
Database Security & Protection Data Encryption & Control Enterprise Digital Rights Management Data Vulnerability Assessment Application Protection Vulnerability Assessment & Penetration Testing Web Application Firewall Data Governance
Network Access Control Next Generation Firewall Email Security Network IPS Web Gateway Next Generation APT Next Generation DDoS Mitigation Smart DDI
Governance Risk & Compliance Cyber Security Transaction Monitoring Compromised Card Monitoring Incident Response & Orchestration Encrypted Calls and Messaging Travel Risk Management & Crisis Avoidance Anti Phishing Services
Identity Management Single Sign On Two Factor Authentication Privileged User Password Management Insider Threat Management Endpoint Security Management Endpoint Detection & Remediation Employee Monitoring Tool
Virtual Security SCADA Security Mobile Device Management Public Key Infrastructure Certificates
NETconsent Compliance Suite File Integrity Monitoring, Network Configuration, and Compliance
Data & App Security
Database Security & Protection Data Encryption & Control Enterprise Digital Rights Management Data Vulnerability Assessment Application Protection Vulnerability Assessment & Penetration Testing Web Application Firewall Data Governance
Network Security
Network Access Control Next Generation Firewall Email Security Network IPS Web Gateway Next Generation APT Next Generation DDoS Mitigation Smart DDI
Security Operation & Response
Governance Risk & Compliance Cyber Security Transaction Monitoring Compromised Card Monitoring Incident Response & Orchestration Encrypted Calls and Messaging Travel Risk Management & Crisis Avoidance Anti Phishing Services
User Security
Identity Management Single Sign On Two Factor Authentication Privileged User Password Management Insider Threat Management Endpoint Security Management Endpoint Detection & Remediation Employee Monitoring Tool
Infrastructure Security
Virtual Security SCADA Security Mobile Device Management Public Key Infrastructure Certificates
Policy & Compliance Management
NETconsent Compliance Suite File Integrity Monitoring, Network Configuration, and Compliance
- Home
- Data & App Security
- Applications Security
Product Overview
Arxan’s application protection enables enterprises to prevent application attacks and empower applications to self-protect and defend themselves so they can be resilient.
Arxan is trusted by many of the world’s largest enterprises to protect applications from advanced, pervasive security threats. Our application protection covers all types of applications, with products that include:
- Application Protection for Mobile
- Application Protection for Internet of Things (IoT) and Embedded
- Application Protection for Desktop
- Application Protection for Server
Arxan’s application protection includes code hardening, cryptographic key and data protection and professional services, which gives you and your customers the security assurance you need.