App Vigil – A Security solution for developing secure apps

2

App Vigil is a security loop hole scanner which is used to safeguard your android apps.It helps you identify security and privacy vulnerabilities in the app development life cycle and curbs the chances being damaged on produciton level.When the scan has completed with the help of its scan reports the Appvigil provides the exact location of the loophole and and provide some recommendations.

App Vigil

App Vigil

Wegilant is an emerging android application security company which has an enterprise version of its flagship product Appvigil which helps to build secure android apps. Its a B2B technology for app developers which helps them provide secure app environment for their users and clients and to save the cost of company by encouraging BYOD usage in their organisation.

This is a cloud based app which helps the user to detect any loopholes and vulnerabilities present in their android apps.It helps locate the exact location of the bugs along with suggested patch recommendations and it can be integrated with SDLC of android app via Eclipse plugin and Continuous integration server plugin.

The beta version of App vigil has attained  500+ users globally and it is primarily targeted at the android developer community which includes developers, mid-large size app development companies, start-ups,companies with standalone mobile apps and products, enterprises opting for BYOD solutions and more.

This is a friendly solution to them being an absolute pocket friendly. The service only requires .apk executable of an android app and performs static code analysis(byte code structure of app is analyzed to look for any vulnerable connection) and dynamic code analysis (Run time behavior of app is tested against vulnerabilities) of app the on the cloud based server of Appvigil.

The following two tabs change content below.

Srikanth Kulkarni

author at technary

2 COMMENTS

  1. Thanks Shrikant
    A very helpful article you have come up with. Our android apps really need to be safe from vulnerabilities, so that it doesn’t come up with any hindrance while in use and users have trust on what they use.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.