Dotfuscator

Dotfuscator

PreEmptive
+
+

Related Products

  • Jscrambler
    38 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • Reflectiz
    29 Ratings
    Visit Website
  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • Aikido Security
    226 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • NordVPN
    1,722 Ratings
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • Time Tracker by eBillity
    3,431 Ratings
    Visit Website

About

Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. These days, intellectual property theft is just the beginning – apps are also gateways to trade secret theft, customer/user data theft, and to identifying further attack vectors. Breaches in any of these areas can cause serious revenue, reputation, and brand damage. Sophisticated app dev organizations know that investing in app protection is good risk management. Basic renaming obfuscation isn’t enough. PreEmptive Protection Dotfuscator for .NET provides many layers of protection: multiple forms of obfuscation (renaming, string encryption, control flow, and more) plus active runtime checks (tamper, debug, root, and more). But it’s not just about protection – we design and test all these layers to be sure that they won’t break your app as the runtime platform evolves.

About

Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Application development teams in need of an advanced Application Shielding solution

Audience

IT teams that want to prevent breaches with complete attack prevention and detection

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 4.5 / 5
ease 5.0 / 5
features 4.0 / 5
design 4.5 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

PreEmptive
Founded: 1996
United States
www.preemptive.com/products/dotfuscator/

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/cyber-security/endpoint/end-user

Alternatives

Alternatives

DashO

DashO

PreEmptive
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
JSDefender

JSDefender

PreEmptive
Zimperium MAPS

Zimperium MAPS

Zimperium
QShield

QShield

Quarkslab

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

BackBox
CYREBRO
FortiADC
Google Digital Risk Protection
KeyScaler
Keyfactor Command for IoT
NXLog
NorthStar Navigator
OctoXLabs
Portnox Security
Sequretek Percept XDR
Swimlane
Symantec Secure Web Gateway
Tenable One
ThreatConnect Risk Quantifier (RQ)
ThreatQ

Integrations

BackBox
CYREBRO
FortiADC
Google Digital Risk Protection
KeyScaler
Keyfactor Command for IoT
NXLog
NorthStar Navigator
OctoXLabs
Portnox Security
Sequretek Percept XDR
Swimlane
Symantec Secure Web Gateway
Tenable One
ThreatConnect Risk Quantifier (RQ)
ThreatQ
Claim Dotfuscator and update features and information
Claim Dotfuscator and update features and information
Claim Symantec Endpoint Protection and update features and information
Claim Symantec Endpoint Protection and update features and information