Best Runtime Application Self-Protection (RASP) Software - Page 2

Compare the Top Runtime Application Self-Protection (RASP) Software as of December 2025 - Page 2

  • 1
    DexGuard

    DexGuard

    Guardsquare

    Protecting Android applications and SDKs against reverse engineering and hacking. Android applications and SDKs are easy to decompile using readily available tools. This opens the way for various forms of abuse, including intellectual property theft, credential harvesting, tampering and cloning. DexGuard protects native Android and cross-platform apps and SDKs against reverse engineering and hacking. It hardens apps' code and enables them to defend themselves at runtime. DexGuard is a command-line tool that processes, optimizes and protects Android applications and libraries. It enables you to fully protect your application or SDK without requiring you to share or alter the source code. DexGuard offers built-in support for both native Android (Java, Kotlin) and cross-platform applications (Cordova, Ionic, React Native, Unity). DexGuard’s functionality can be extended with the NDK add-on to process and protect native libraries.
  • 2
    Validian Protect
    Validian’s technology secures data in use, in memory, in databases, at rest, in transit and against interception by untrusted operating systems. It works on all devices, operating systems and technology platforms — and everywhere in between. Our unique Application & Data Protection Software, ValidianProtect, is a powerful, flexible, scaleable and rapidly integrated cyber security middleware. Seamlessly securing data in use, in memory, in databases, at rest, in transit and against interception by untrusted operating systems is a major breakthrough in cyber security. Dynamically rotating symmetrical keys for encrypting and decrypting data in memory, in databases, in storage, in transit and against interception by untrusted operating systems make Validian Protect unique with new industry-shaping features in data protection. Our peer-to-peer security encrypts decentralized data in transit from point to point while securing transitions to secure data at rest and secure data in use.