You have now been logged out of the Support Portal.
You can also access the Support Portal using the following URL: https://support.promon.io/
Should you experience any issues or wish to contact us, please send email customer-success@promon.co.
Stay updated on the latest news on
application security
-
AI & the future of cybersecurity
The future of on-device GenAI: Why mobile app security must protect at runtime
On-device GenAI changes what runs locally and what attackers can reach. If the intelligence lives in the app, protection has to hold at runtime.23 Apr 2026
Sarah Sanders
-
Gain app threat intelligenceHow to make mobile attack telemetry useful for fraud, security operations, and audit teams
What does strong, mature mobile telemetry look like today? What telemetry data is the most valuable for mobile app security? Is there a practical operating model for mobile attack telemetry, with common execution failures to avoid?16 Apr 2026
Volker Gerstenberger
-
Mobile app security
Behind the shield: A guided approach to protecting mobile apps and SDKs
App shielding is the baseline for mobile app security. But can black-box shielding slow teams down? Does post-compile protection still matter? And is protecting an app and an SDK the same? Find clarity and guidance here.9 Apr 2026
Byron McNaught
-
Mobile app security
Red flags: How dating apps ignore security until revenue waves goodbye
Trace the fragile economics and untracked revenue killers of the dating app industry. Investigate how mobile malware and device compromise are creating a industry-wide security crisis. Learn how runtime protection is revenue protection for dating apps.30 Mar 2026
Byron McNaught
-
AI & the future of cybersecurity
App Threat Report 2026 Q1: The State of Code Obfuscation Against AI
Discover what happened when Promon's security team tested leading AI models against OLLVM obfuscation. Where did mobile app code protection hold up and where did it fall short? What are the key takeaways and recommendations for security and product teams?26 Mar 2026
Dr. Anton Tkachenko
-
Malware and the threat landscape
Protection is not intelligence: Why blocking mobile threats is no longer enough
Uncover the cost of mobile app protection without intelligence. Discover the plan to take you from protection to intelligence, and the products that transform protection into intelligence.18 Mar 2026
Volker Gerstenberger
-
Mobile app security
On-prem vs cloud for mobile app protection: A guide to customer choice
What are the main deployment options available for mobile app security products? Does an on-prem or cloud model best suit your organizational needs?12 Mar 2026
Andrew Whaley
-
Mobile app security
Three reasons why your payment app needs to get EMVCo certified: How app shielding can help you get there
This paper will look at the three main reasons why mobile payment apps need to get EMVCo certified and the benefits of EMVCo SBMP certified Software Protection Tool solutions.3 Mar 2026
Morten Ruud
Blogs
Keep up with the latest developments in iOS and Android security, code obfuscation, compliance, API protection, and more.
View all-
PCI DSS compliance checklist
Streamline PCI DSS compliance with our security checklist. Ensure data security, protect customer information, and meet industry standards. -
Beginner's guide to code obfuscation
Learn app code obfuscation with our expert guide. Protect intellectual property, prevent reverse engineering, and strengthen your app's defenses. -
StrandHogg 2.0: A new Android vulnerability
Understand the StrandHogg 2.0 Android vulnerability. Learn about this serious security threat, protect your apps, and safeguard user data from potential exploits.
eBooks & whitepapers
Download detailed mobile app protection checklists, reports, ebooks, and more.
View all