Documentation

Go to Portal Website

AppTego - Mobile Application Security Platform

How AppTego works: configure, upload, protect, monitor

What Is AppTego?

AppTego protects Android and iOS apps from runtime threats, tampering, reverse engineering, unsafe device conditions, and network interception. In Standard Mode, it does this without requiring source code changes: you upload a compiled APK, AAB, or IPA, select a protection configuration, and download a protected app for QA or release.

The platform is built for teams that need mobile security to fit into real release workflows. You can start manually in the portal, then move the same protection process into CI/CD or API-driven automation when you are ready.

Who AppTego Is For

What Problems AppTego Solves

RiskWhat can go wrongHow AppTego helps
Reverse engineeringAttackers inspect app structure, business logic, strings, and symbols.Obfuscation, string protection, symbol reduction, and build hardening make analysis more difficult.
Runtime tamperingModified apps, injected code, or altered runtime behavior can change how the app works.Integrity checks and runtime detections help identify tampered or untrusted conditions.
Unsafe device postureRooted, jailbroken, emulated, cloned, or otherwise risky environments can weaken trust assumptions.Device and runtime detections can log, message, redirect, or terminate based on your policy.
Debugging and instrumentationRuntime inspection can observe or alter app behavior.Debugger, hooking, memory, and analysis detections provide visibility and enforcement options.
Network interceptionTraffic inspection or weakened transport policy can expose sensitive sessions.Certificate pinning, TLS policy, cleartext prevention, and network posture detections strengthen trust.
Data exposure through OS surfacesScreenshots, recordings, clipboard, keyboard, backups, or sharing surfaces can leak sensitive data.Prevention controls reduce common leakage paths for sensitive mobile workflows.

How It Works

AppTego supports two integration models. Start with Standard Mode unless you have a specific source-level integration requirement.

Standard Mode: Automatic Protection

Standard Mode is the default path. No source code changes are required, and the same protected-build process can be used from the portal, CI/CD integrations, or the Automation API.

StageWhat you doWhat AppTego does
ConfigureChoose controls, response actions, environments, and signing strategy.Stores a reusable protection policy for portal, API, and CI/CD workflows.
UploadSubmit a compiled APK, AAB, or IPA through the portal, Automation API, or CI/CD integrations.Validates the artifact, starts a build record, and prepares the protected-build environment.
ProtectWait for the build to complete, then download the protected output.Applies selected protection, packaging, and signing behavior to create a protected app.
ValidateInstall the protected app on representative devices and test critical flows.Gives your team confidence before you promote configuration or release externally.
MonitorReview build history, device events, audit activity, and dashboard signals.Helps tune controls as your rollout expands.

Library Mode: Source-Level Integration

Enterprise teams that need programmatic runtime control can embed the MobileDefender SDK directly in source code:

  1. Request a custom library build from the portal
  2. Add the AAR (Android) or framework (iOS) to your project
  3. Initialize the SDK and register detection callbacks in your code
  4. Build and distribute your app normally

Library Mode is best when your app needs custom callbacks, source-level enforcement logic, or a release process where your own build pipeline must produce the final artifact. See Library Mode for setup instructions.


First Protected Build

Before You Begin

Step 1: Sign in to the portal

Open the AppTego Portal and sign in with email/password, Google, Apple, or your organization's SSO.

Step 2: Select or create a tenant

If this is your first login, create a tenant. A tenant is your workspace for apps, users, builds, configuration, logs, and subscription settings.

Step 3: Configure a safe baseline

Go to the control configuration area and enable a small baseline:

Start gently. A good first build should prove that protection can be applied, installed, and tested before you enforce stricter policy.

Step 4: Upload the app

Go to Application Builds -> Upload:

  1. Select your platform (Android or iOS)
  2. Choose the configuration environment (production, staging, or development)
  3. Select your compiled app file
  4. Click Upload

Build time depends on app size, platform, signing, and selected controls. The build list shows live status updates.

Build Process Stages

The Application Builds view shows the live status of your build. Each job moves through these stages:

StageWhat it meansWhat to do
queuedAppTego accepted the upload and is waiting for build capacity.No action needed.
launching workerA protected-build environment is starting.No action needed.
downloadingThe build environment is retrieving the uploaded app, selected configuration, and signing inputs.No action needed.
buildingAppTego is applying protection and producing the output artifact.Wait for completion; larger apps can take longer.
completedThe protected app is ready to download.Download and test on real devices.
failedThe build could not complete.Review the error message and see Troubleshooting.

Large apps, native-heavy apps, and iOS builds may spend more time in the building stage.

Step 5: Download and validate

When the build completes, download the protected app. Install it on real devices and run the same smoke tests you use for release candidates: launch, login, critical workflows, offline behavior, network calls, and any screens affected by prevention controls.

Step 6: Distribute after signoff

After QA approval, distribute the protected artifact through your normal channel:


Key Capabilities

Threat Detection (27 Controls)

Detection controls continuously monitor the device and app runtime. When a threat is detected, the configured action fires:

CategoryControlsPlatforms
Device IntegrityRoot detection, jailbreak detection, device attestation (Play Integrity / App Attest)Android, iOS
Runtime ThreatsDebugger detection, hooking framework detection, and method swizzling detectionAndroid, iOS
EnvironmentEmulator/simulator detection, virtual environment detectionAndroid, iOS
Screen SecurityScreen capture detection, screen recording detection, screen mirroring detectionAndroid, iOS
NetworkVPN detection, proxy detection, time tampering, and location spoofingAndroid, iOS
App IntegrityBinary tampering detection, signature verification, checksum validationAndroid, iOS
InputThird-party keyboard and accessibility-service detectionAndroid, iOS

See Detection Controls for the full reference.

Active Prevention (20 Controls)

Prevention controls actively block specific behaviors at the OS level. The table below shows common examples; use the Prevention Controls Reference for the full catalog.

ControlDescriptionPlatforms
Screenshot preventionApplies iOS visual privacy protections for screenshots and related capture surfacesiOS
Screen recording preventionDisplays a privacy screen during iOS recording and castingiOS
Clipboard protectionBlocks protected app content from being copied to the system clipboardAndroid, iOS
Storage permission hardeningRestricts Android internal files and SharedPreferences permissionsAndroid
Storage encryptionApplies iOS Data Protection to supported local app dataiOS
Android screen capture protectionBlocks screenshots, recordings, task switcher previews, and unsafe external displayAndroid
Task switcher blurBlurs or blanks app preview in the recent apps switcherAndroid, iOS
TLS 1.3 enforcementForces minimum TLS version for all network connectionsAndroid, iOS
Set debuggable to falseRemoves Android debuggable posture and prevents debugger attachment where supportedAndroid, iOS

See Prevention Controls for the full reference.

Code Obfuscation (Team+)

Obfuscation transforms your app's compiled code to resist reverse engineering:

See Code Obfuscation for details.

Certificate Pinning (Enterprise)

Pin TLS certificates to specific domains to prevent man-in-the-middle attacks:

See Certificate Pinning for setup instructions.


Integration Options

AppTego can start as a manual portal workflow and mature into release automation.

Web Portal

Use the browser-based AppTego Portal when you are evaluating AppTego, configuring a tenant, running manual QA builds, or reviewing dashboard and log data.

CI/CD Integration

Use a first-party integration when protected builds should be produced automatically after your normal mobile build step:

Management API

Use the Management API when internal tooling needs to inspect configuration, manage builds, administer users, query logs, or integrate AppTego data into dashboards and compliance workflows.

SDK / Library Mode (Enterprise)

Use Library Mode when your app needs source-level callbacks, custom reactions to detections, or a release process where your own build pipeline must produce the final protected binary.


Supported Platforms

PlatformFile TypesMinimum OS VersionArchitecture
AndroidAPK, AABAndroid 8.0 (API 26)arm64-v8a, armeabi-v7a
iOSIPAiOS 13.0+arm64

Tested with 15+ Frameworks

AppTego works with apps built using any framework — it operates on compiled binaries, so the build toolchain doesn't matter:

CategoryFrameworks
NativeKotlin, Java (Android), Swift, Objective-C (iOS)
Cross-platformReact Native, Flutter, Kotlin Multiplatform (KMP), .NET MAUI
HybridIonic/Capacitor, Cordova
Game enginesUnity, Unreal Engine, Godot, Cocos2d-x, LibGDX, MonoGame, Phaser

Subscription Plans

FeatureFreeTeamEnterprise
Concurrent builds125
Detection controls✅ (Very Limited)
Prevention controls✅ (Very Limited)
Code obfuscation
Certificate pinning
Connection settings
Code signing
User management & roles
Support tickets
API tokens & automation
Custom messages
Config promotion (dev → staging → prod)
AI-powered search & help
Live configuration push
Audit logs
Device logs & analytics
App integrity monitoring
Custom library / Library Mode (BYOA)
String encryption
SAML SSO
Real-time security dashboard

Choosing a Plan

Upgrade at any time from the portal under Settings.


Architecture Overview

AppTego architecture overview

The architecture is designed around compiled-artifact protection. Teams configure policy in AppTego, upload an APK, AAB, or IPA through the portal, API, or CI/CD, and receive a protected app for testing and release.

Builds run in isolated AppTego environments. Embedded runtime controls execute on device unless a specific feature uses service validation or telemetry. Build history, audit logs, device events, and dashboard views help teams monitor the release and tune future configurations.

App artifacts, signing material, tenant configuration, logs, and platform data are protected in transit and at rest.


Frequently Asked Questions

Will protection break my app?

The protected app is intended to behave like the original app with the selected protections active. Validate every release candidate on real devices, especially when enabling prevention, networking, signing, or obfuscation features. If you encounter an issue, see Troubleshooting or contact support.

How long does a build take?

Build time depends on platform, app size, native libraries, signing, and selected protection options. Small builds may finish quickly; larger or more complex apps can take longer.

Can I protect apps built with React Native / Flutter / Unity?

Yes. AppTego works with any framework because it operates on the compiled binary, not source code.

What happens when a threat is detected?

You choose the response per detection control. Common rollout stages are Log for observation, Message or Redirect for user-friendly remediation, and Terminate for conditions where the app should not continue.

Can I update security settings without rebuilding?

Enterprise tenants can use Live Configuration Push for supported runtime settings when the app was built with live updates enabled. Structural changes, build-time protection, and many prevention settings require a new protected build.

Is there a size limit for uploads?

Hard limits are set in line with Apple App Store and Google Play requirements. Large files are handled via multipart upload.

How do I integrate AppTego into my CI/CD pipeline?

Use the GitHub Action, CircleCI Orb, or call the Automation API directly from any CI system.


Next Steps

GoalGuide
Explore the portal UINavigating the Portal
Protect your first appUploading Apps
Understand all controlsSecurity Controls Reference
Set up CI/CD automationGitHub Actions · CircleCI
Use the API programmaticallyAutomation API · Management API
Embed the SDK in your codeLibrary Mode
Configure team accessUser Management
Set up SSOSAML SSO