{"id":4559,"date":"2025-12-30T15:03:36","date_gmt":"2025-12-30T13:03:36","guid":{"rendered":"https:\/\/www.ergonomics.ch\/?page_id=4559"},"modified":"2026-02-18T15:18:17","modified_gmt":"2026-02-18T13:18:17","slug":"promon-shield","status":"publish","type":"page","link":"https:\/\/www.ergonomics.ch\/en\/products\/promon-shield\/","title":{"rendered":"Promon Shield \u2013 Runtime App Protection for Mobile, Desktop &amp; SDKs"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h2 class=\"wp-block-heading\"><strong>Maximum security for apps and SDKs \u2013 protection against reverse engineering, manipulation, injection attacks and supply chain risks.<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/PROMON_Logo_Charcoal.png\" alt=\"Promon Logo\" class=\"wp-image-4462\"\/><\/figure><\/div>\n\n\n<p>Promon Shield works directly on the binary after build, without requiring any modifications to the source code. This protects applications at runtime without any performance impact and allows for seamless integration into existing DevOps and CI\/CD processes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Promon Shield for Mobile<\/h3>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/promon-shield-for-mobile.png\" alt=\"\" class=\"wp-image-4587\" style=\"width:400px\"\/><\/figure>\n\n\n\n<p><strong>Protects apps on iOS, Android, HarmonyOS, Chrome OS and Amazon Fire from:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reverse Engineering &amp; Static Analysis \u2013 Protection against code analysis and symbolic manipulation<\/li>\n\n\n\n<li>Dynamic Attacks \/ Runtime Manipulation \u2013 Defense against Code Injection, Hooking, Debugging and Emulators<\/li>\n\n\n\n<li>Fraud and data misuse \u2013 runtime integrity checks, anti-keyloggers and protection of sensitive data<\/li>\n\n\n\n<li>Protection of on-device models \u2013 secure runtime execution for AI and ML models<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Runtime Shielding: Real-time protection against memory manipulation and hooking<\/li>\n\n\n\n<li>Integrity &amp; Root\/Jailbreak Detection<\/li>\n\n\n\n<li>Minimal performance impact<\/li>\n\n\n\n<li>Audit &amp; Compliance Ready<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">&nbsp;Promon Shield for Desktop<\/h3>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/promon-shield-for-desktop.png\" alt=\"\" class=\"wp-image-4586\" style=\"width:400px\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Promon Shield for Desktop protects applications on Windows and macOS from:<\/li>\n\n\n\n<li>Reverse Engineering &amp; Binary Patching<\/li>\n\n\n\n<li>Injection &amp; Debugging Attacks \u2013 DLL Injection, API Hooking, Thread Injection<\/li>\n\n\n\n<li>Keylogging &amp; Credential Theft \u2013 Runtime Anti-Keylogger<\/li>\n\n\n\n<li>Offline Protection \u2013 independent of external security solutions<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Post-build shielding without source code modification<\/li>\n\n\n\n<li>Continuous runtime integrity check<\/li>\n\n\n\n<li>Auditable security events<\/li>\n\n\n\n<li>Easily integrated into CI\/CD pipelines<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Promon Shield for SDKs<\/h3>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/promon-shield-for-sdk.png\" alt=\"\" class=\"wp-image-4588\" style=\"width:400px\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Promon Shield for SDKs protects embedded SDKs from:<\/li>\n\n\n\n<li>Reverse engineering \u2013 analysis, repackaging and cloning \u2013 becomes more difficult.<\/li>\n\n\n\n<li>Tampering &amp; Hooking \u2013 Protection through Runtime Mechanisms<\/li>\n\n\n\n<li>Debugging &amp; Emulator Attacks<\/li>\n\n\n\n<li>Supply chain threats \u2013 integrity of SDK usage is maintained<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IP and logic protection for SDKs<\/li>\n\n\n\n<li>Post-build protection without source code changes<\/li>\n\n\n\n<li>Runtime Security Enforcement<\/li>\n\n\n\n<li>Easy integration into CI\/CD pipelines<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Maximum security for apps and SDKs \u2013 protection against reverse engineering, manipulation, injection attacks and supply chain risks. Promon Shield works directly on the binary after build, without requiring any modifications to the source code. This protects applications at runtime without any performance impact and allows for seamless integration into existing DevOps and CI\/CD processes. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1017,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-product.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4559","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.1","language":"en","enabled_languages":["de","en"],"languages":{"de":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false}}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/4559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/comments?post=4559"}],"version-history":[{"count":16,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/4559\/revisions"}],"predecessor-version":[{"id":4906,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/4559\/revisions\/4906"}],"up":[{"embeddable":true,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/1017"}],"wp:attachment":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/media?parent=4559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}