
DexGuard
Runtime application self-protection (RASP) software
Application security software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if DexGuard and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
-
What is DexGuard
DexGuard is an Android application security and hardening tool that protects mobile apps against reverse engineering, tampering, and repackaging. It is used by Android development and security teams to add code obfuscation, runtime checks, and anti-debug/anti-hooking protections as part of the build process. The product focuses on protecting the app binary and runtime behavior rather than scanning source code for vulnerabilities. It is commonly deployed for consumer and enterprise Android apps where IP protection and anti-fraud controls are required.
Strong Android obfuscation controls
DexGuard provides code obfuscation and shrinking capabilities tailored to Android bytecode and common reverse-engineering workflows. It supports configuration-driven protection rules that teams can integrate into Android build pipelines. This makes it suitable for protecting proprietary logic and reducing the usefulness of static analysis on released APKs/AABs.
Runtime anti-tamper protections
DexGuard includes runtime checks intended to detect tampering, repackaging, and debugging attempts. These controls help apps respond when integrity checks fail, which is relevant for fraud prevention and protecting sensitive workflows. The runtime focus aligns with mobile threat models where attackers modify or instrument apps on-device.
Build-time integration for Android
DexGuard is designed to be applied during the Android build process, enabling repeatable protection across releases. This approach supports CI/CD usage where protections are applied consistently per build variant. It can complement broader application security programs by hardening the shipped mobile artifact.
Potential build and tuning effort
Obfuscation and runtime protections often require rule tuning to avoid breaking reflection-heavy frameworks, SDKs, or app functionality. Teams may need iterative testing to balance protection strength with app stability and performance. This can add time to release cycles, especially for complex apps.
Android-only scope
DexGuard primarily targets Android applications and does not cover iOS or server-side runtimes. Organizations with multi-platform mobile portfolios typically need additional tooling for other platforms. This can increase operational overhead when standardizing mobile app protection across teams.
Not a full AppSec suite
DexGuard focuses on hardening and runtime defenses rather than providing broad vulnerability discovery such as SAST/DAST, dependency analysis, or centralized risk reporting. Security teams may still need separate tools for code scanning, policy management, and remediation workflows. As a result, it typically fits as one component within a larger application security stack.
Plan & Pricing
| Plan | Price | Key features & notes |
|---|---|---|
| Core | Request pricing / Contact sales | Multilayered protection for Android (DexGuard) or iOS (iXGuard); mobile app security testing with AppSweep; guided configuration and support; CLI for CI; team management; standard support. |
| Control | Request pricing / Contact sales | Everything in Core plus real-time threat monitoring (ThreatCast); detailed threat intelligence; forensic threat analysis; webhook connections; raw data access, CSV exports, and weekly reports; project-specific support options. |
| Command | Request pricing / Contact sales | Everything in Control plus server-side attestation (protect APIs from non-genuine apps); instant security policy changes; continuous threat detection updates; support for larger apps and advanced configuration. |