SPARK Matrix in App Protection Zimperium
SPARK Matrix in App Protection Zimperium
SPARK Matrix™:
In-App Protection, Q1 2024
Market Insights, Competitive Evaluation, and Vendor Rankings
March, 2024
TABLE OF CONTENTS
Research Methodologies.............................................................................................21
Executive Overview
With the rise in cloud computing and continued use of mobile devices across
different walks of life, mobile application developers are increasingly adopting a
user-friendly, web-enabled, and more flexible approach to develop applications
that drive the end users to visit hundreds of websites, enter dozens of search
terms, upload a batch of photos, or use tap on the phone for payments. Data
and information stored in different formats like databases, messages, emails,
spreadsheets, and documents can be at risk of misuse, unauthorized access, or
destruction. Companies that handle large numbers of applications spread across
different data centers and cloud platforms invest in protecting this sensitive
information.
Due to the versatile nature of mobile applications, developers often take advantage
of the device’s size and mobility to develop web-based or native apps for social
networking, entertainment, and productivity but often lack an incident response
plan to mitigate high risks associated with malware or physical attacks throughout
the application development process. Although basic administrative controls
such as processes, policies, and plans exist to establish control and restriction
over some threat landscapes, a more secure and technical approach may help
application developers protect their application components such as JavaScript/
app code, data, intellectual property, or APIs.
The in-app protection market offers products and services to cater to the needs of
these problems. They categorize a security threat, determine the cause, preserve
any evidence, and get the systems back online so the applications can resume
their functions. In-app vendors consider many issues, beginning with a clear
understanding of what information assets need protection with strict adherence
to regulations and laws of respective geographies. Their solutions are centered
on identifying threats in the form of malware and botnets that steal victim’s
confidential data. Additionally, the vendors also provide vulnerability assessment
measures to determine the effectiveness of existing security posture for app
development teams and develop innovative ways to present failure analysis data
through metric dashboards.
In-app protection or mobile app protection vendors offer solutions with a strong
emphasis on technical security controls such as account management, access
controls, information flow, and separation of duties, all of which are necessary to
protect sensitive data within the applications from the inside out.
The following are the key capabilities provided by an In-app protection solution:
Appdome distinguishes itself with a rapid, no-code build system for mobile app
defense and threat detection. It integrates with DevOps CI/CD pipelines and offers
a Certified Secure™ certificate for build verification. Appdome provides RBAC
controls, agentless threat monitoring via ThreatScope™, and attack intelligence
reports. It also offers Build2Test automated testing services and an enforcement
mechanism to shut down applications, protect user data, and maintain acceptable
crash rates in case of incidents such as malware attacks, phishing attacks, and
man-in-the-middle attacks.
Build38 distinguishes itself with an active hardening server that provides enhanced
security to both on-premises and cloud environments. The platform offers
multiple layers of mobile protection, including runtime environment verification,
app integrity guarantee, and data protection. With Mobile XDR, Build38 protects
applications from fraud and minimizes revenue impact with Mobile XDR (app
shielding, monitoring, detection, and response) to provide real-time monitoring
and response. The company also offers next-generation RASP with granular
detection capabilities and full control over the app lifecycle management.
Digital.ai offers a comprehensive security solution for mobile apps. The solution
embeds security in the development process to protect code, keys, and data
and prevent reverse engineering and tampering. It also provides visibility into
at-risk apps and responds to threats in real-time with Runtime Application Self
Protection (RASP), including step-up authentication and altering app features.
This ensures robust application security from development to deployment and
effective response to threats.
F5 provides a robust solution for app security that reduces risks and prevents
threats like app repackaging and malware. It also ensures compliance with
privacy, payment, and health standards, including CCPA, GDPR, PCI-DSS,
EMVCo SBMP, PSD2, and HIPAA. F5’s low-code integration technology enables
rapid deployment and scaling.
data fencing. It also offers comprehensive dashboards and custom reporting that
offers actionable insights, security posture adjustment, and compliance reports,
ensuring revenue safeguarding.
PreEmptive’s DashO offers app shielding and hardening solutions directly infused
into .NET, Java, Android, or iOS. Their continuous threat and protection research
services keep track of cybersecurity vulnerabilities and mitigation measures up to
date to stay ahead of attacks. The platform simplifies app protection, enabling the
creation of a protected build for Android, Web, or Java in minutes, irrespective of
the build environment. The platform support covers both mature apps facing new
risks and unreleased apps.
Promon SHIELD stands out with its developer-friendly integration that ensures
timely adoption of security and advanced obfuscation techniques that cover
not only CI/CD lifecycles but also post-compilation workflows/procedures with
minimal impact on user experience. These capabilities empower developers to
focus on core functionalities such as managing software toolchains or writing
effective code while Promon safeguards their creations.
Verimatrix XTD platform stands out with its multi-layered protection and AI/
ML analysis for Android and iOS, along with support for hybrid development
frameworks. It offers flexible deployment options, including a SaaS offering and an
on-site toolchain with full automation for CI/CD pipeline integration. Verimatrix’s in-
house VMX labs provide the latest threat advisories, while its real-time monitoring
and control with XTD detection enhance security. Its wide platform support further
strengthens its competitive position.
visibility and protection against advanced cyber threats. Its approach to mitigating
internal network breaches is thorough, with protection spanning across devices,
networks, applications, and phishing attempts, along with sophisticated mitigation
strategies.
The following are the key competitive factors and differentiators for the evaluation
of the network operating system platform and its vendors. While most In-app
protection solutions provide all core functionalities, the breadth and depth of
functionality may differ depending on different vendor offerings. Some of the key
competitive factors and technology differentiators are:
Zero-Code Injection Technology: Users should look for vendors who offer zero-
code injection techniques such as signature-based, and anomaly-based detection
as well as behavioral analysis to prevent bad actors deploy threats like reverse-
engineering.
JSON Web Tokens: Users should look for vendors who provide secure ways to
exchange short-lived and one-time authentication information.
Certificate Pinning: Users should look for vendors who provide a certificate
pinning feature as a part of an end-to-end security offering that informs the users
and developers of a remote host’s identity while operating in a hostile environment.
AI/ML Based Monitoring: Users should look for vendors who provide use cases
and capabilities to monitor, detect, and prevent code injection attacks using
machine learning algorithms that focus on several most common vulnerabilities
in JavaScript, and TypeScript.
Bot Defense for Mobile Apps: Users should look for vendors who protect internet
applications from malware bots by using native Mobile SDK to collect telemetry
from web applications and mobile endpoints.
Integration and Interoperability: Users should look for vendors offering fully
automated integration/interoperable capabilities with other cross-functional areas
such as CI/CD, API gateway, cloud-native API Gateway, and WAF.
Scalability and Availability: Users should look for vendors who ensure high
availability during traffic surges and provide options for businesses to execute
large-scale deployments of security features.
Comprehensive Use Case Coverage: Users should look for vendors who
have coverage of use cases such as account takeover prevention, credit fraud
prevention, and MitM attack prevention and conduct a thorough analysis of costs
and benefits offered to them and critically evaluate the feasibility of the solutions
offered by the respective vendors.
Competition Differentiation
15% Customer Service Excellence 15%
Strategy
SPARK Matrix™:
In-App Protection
SPARK Matrix
x : In-App Protection, Q1 2024
Aspirants Strong Contenders Technology Leaders
Zimperium
Verimatrix
F5
OneSpan Promon
Appdome
Customer Impact
Guardsquare
rdsq
Digital.ai
igital
Jscrambler
ramb
Emp
PreEmptive Build38
Approov
pproo
Technology Excellence
Vendor Profile
Zimperium
URL: https://www.zimperium.com/
Company Introduction:
Product Introduction:
Technology Perspective:
• Some of the differentiators of Mobile Application Suite (MAPS) include its ability
to offer tailored industry solutions to develop in-app protection mechanisms
tailored to specified industries like finance, biotech, manufacturing, media,
government, retail, and transportation & and logistics to address sector-
specific security needs.
Market Perspective:
• The top use cases of Zimperium include Payment Information and Transaction
Protection, Credential Theft Prevention, Account Takeover Prevention, Identity
Theft Prevention, On-Device Fraud Prevention, IP and Data Protection, and PII
Protection
Challenges:
Roadmap:
• To keep up with the evolving threats and continue offering robust security,
Zimperium plans to upgrade anti-tampering mechanisms like hooking, anti-
jailbreak, and anti-rooting protections to keep pace with evolving threats,
ensuring robust security.
• The company’s roadmap also includes integrations with DevOps platforms for
seamless security integration, protection of Hybrid Apps, and the launch of
MAPS Platform, offering end-to-end application security.
• Lastly, to meet the security standards quickly and easily, Zimperium continues
to work towards enhancing compliance and risk protection features that cater
to businesses with market-specific regulatory requirements.
Research Methodologies
Secondary Research
Following are the major sources of information for conducting secondary research:
Literature Research
Primary Research
Quadrant analysts use a two-step process for conducting primary research that
helps us in capturing meaningful and most accurate market information. Below is
the two-step process of our primary research:
Market Estimation: Based on the top-down and bottom-up approach, our analyst
analyses all industry participants to estimate their business in the technology
market for various market segments. We also seek information and verification of
client business performance as part of our primary research interviews or through
a detailed market questionnaire. The Quadrant research team conducts a detailed
analysis of the comments and inputs provided by the industry participants.
Quadrant’s analysts’ team gathers all the necessary information from secondary
research and primary research to a computer database. These databases are
then analyzed, verified, and cross-tabulated in numerous ways to get the right
picture of the overall market and its segments. After analyzing all the market data,
industry trends, market trends, technology trends, and key issues, we prepare
preliminary market forecasts. This preliminary market forecast is tested against
several market scenarios, economic most accurate forecast scenario for the
overall market and its segments.
SPARK Matrix:
Strategic Performance Assessment and Ranking
After finalization of market analysis, our analyst prepares necessary graphs, charts,
and table to get further insights and preparation of the final research report. Our
final research report includes information including competitive analysis; major
market & technology trends; market drivers; vendor profiles, and such others.
Client Support