Mobile applications are now part of most organizations’ business models. With the proliferation of Apps comes the proliferation of threats. Trusted Software brings the renowned Cloakware Software Protection to iOS and Android applications in a fully automated way. Protection can be applied by the App developers, without specialized expertise, in no time.


Trusted Software: A fully automated managed service to protect your iOS and Android applications

Got a question about Trusted Software?

  • Trusted Software protects your code and data, including critical IP / trade secrets, credentials and other private data.
  • Our fully automated process leverages Machine Learning (ML) to selectively adjust protections applied to your code with expert-like precision.
  • No source modification is necessary. App-store ready applications are the input and output for Trusted Software.
  • You remain in full control of your spending, avoiding vendor lock-in, with our flexible ‘pay-as-you-go,’ model including automated SaaS delivery.

Simple Web UI

  • Drag-and-drop your file for instant protection
  • Provided as a cloud-hosted service
  • Can be hosted on your own cloud (inquire)
  • Click below to expand the GIF

Expert-level protection

  • Applies sophisticated Cloakware protections, developed over twenty years, to your software
  • The full context of data and code enables complex entanglement to make reverse engineering almost impossible
  • Now available for your application binaries, without the need for source code
  • Trusted Software gives you unparalleled protection, including diversity and renewability of the security

Optimized by machine learning

  • Trusted Software utilizes multiple convolutional neural networks, trained separately on things like security and performance
  • The ML models help to selectively adjust the protection levels applied to your code, segment by segment

Part of Cloakware® Security Services

Trusted Software is part of the family of Cloakware Security Services. These new managed services have been created to enable quick and effective security, particularly on edge devices where the risk of compromise is greatest. Starting with the world’s best code protection technology, Cloakware Security Services work flexibly with the business model of our customers to maintain safety and security at the edge, backed by 24/7 support from our Security Operations Centre (SOC).

View our Trusted Software resources: