You have now been logged out of the Support Portal.
You can also access the Support Portal using the following URL: https://support.promon.io/
Should you experience any issues or wish to contact us, please send email customer-success@promon.co.
Stay updated on the latest news on
application security
-
Mobile app security
On-prem vs cloud for mobile app protection: A guide to customer choice
What are the main deployment options available for mobile app security products? Does an on-prem or cloud model best suit your organizational needs?12 Mar 2026
Andrew Whaley
-
Mobile app security
Three reasons why your payment app needs to get EMVCo certified: How app shielding can help you get there
This paper will look at the three main reasons why mobile payment apps need to get EMVCo certified and the benefits of EMVCo SBMP certified Software Protection Tool solutions.3 Mar 2026
Morten Ruud
-
Mobile app securityFramework migration and mobile app security: Prevent coverage gaps as code changes
Learn about the main risks after a framework migration, what scenarios trigger a mobile app security re-evaluation, and how to protect your code.26 Feb 2026
Andrew Whaley
-
Mobile app securityThe revenue leak you don’t see: When attackers rewrite your monetization rules
Discover the common routes attackers use to change mobile app monetization outcomes with their business impacts. Learn how to reduce revenue loss upstream and check for on-device bypasses, whatever your industry.19 Feb 2026
Byron McNaught
-
ComplianceInside an EMVCo evaluation: What labs test and how to prepare
Recognize the business case for EMVCo SBMP certification and why it matter now. Discover what labs examine during an evaluation, where mobile payment apps fail, and how teams can prepare effectively.12 Feb 2026
Morten Ruud
-
Mobile app security
Mobile game security in Unity and Unreal: Reducing cheat ROI at runtime
How do attackers exploit runtime logic in Unity and Unreal engine mobile games? What does runtime hardening change for integrity, trust, and revenue?10 Feb 2026
Byron McNaught
-
Development
Secure by design: How SDK teams can protect code without compromising speed
Learn why SDKs are uniquely exposed in the security-by-design model. Explore the tactics teams can employ to secure SDKs without slowing down development.10 Dec 2025
Morten Ruud
-
Mobile app securityCybersecurity predictions for 2026: A peek into Promon's crystal ball
As 2025 draws to a close and we stand on the brink of a new year, let's take a look at what Promon predicts for cybersecurity in 2026, from compliance and cryptography to OS environments and AI threats.8 Dec 2025
Chris Meyer
Blogs
Keep up with the latest developments in iOS and Android security, code obfuscation, compliance, API protection, and more.
View all-
PCI DSS compliance checklist
Streamline PCI DSS compliance with our security checklist. Ensure data security, protect customer information, and meet industry standards. -
Beginner's guide to code obfuscation
Learn app code obfuscation with our expert guide. Protect intellectual property, prevent reverse engineering, and strengthen your app's defenses. -
StrandHogg 2.0: A new Android vulnerability
Understand the StrandHogg 2.0 Android vulnerability. Learn about this serious security threat, protect your apps, and safeguard user data from potential exploits.
eBooks & whitepapers
Download detailed mobile app protection checklists, reports, ebooks, and more.
View all