Documentation

Go to Portal Website

Security Controls

AppTego controls are organized by the kind of risk they reduce: runtime detection, active prevention, app integrity, network protection, code obfuscation, privacy telemetry, and build configuration.

Use this section to choose a protection posture before you edit individual controls. A strong rollout starts with the outcome you want, then selects the smallest effective set of controls, validates behavior, and promotes only after protected-app testing.

Plan names in these guides show the minimum tier where a control starts. Enterprise tenants include Team controls unless an individual control page says otherwise.

Start Here

GuideUse it to...
Security Controls OverviewUnderstand categories, response actions, platform guidance, and rollout strategy.
Detection ControlsChoose detections for device posture, runtime analysis, screen capture, network, and app integrity signals.
Prevention ControlsChoose active protections for screens, input, storage, backup, runtime, components, and transport.
App IntegrityPlan tamper checks, app update enforcement, Play Integrity, App Attest, and release-control policy.
Network ProtectionPlan certificate pinning, certificate transparency, TLS policy, cleartext blocking, and proxy detection.
Certificate PinningDesign domain pinning, backup pins, rotation, and failure behavior.
Code ObfuscationSelect binary hardening options for Android and iOS builds.
Privacy And TelemetryDecide what device, IP, location, and configuration-refresh data should be collected.
Build ConfigurationChoose simulator, emulator, and architecture support for protected artifacts.
Individual Control ReferenceLook up customer-facing details for a specific control.
  1. Start with detection controls in Log mode to measure real-world device posture.
  2. Validate false-positive behavior on QA and internal pilot devices.
  3. Move critical threats to Message, Redirect, or Terminate responses only after testing.
  4. Add prevention controls for sensitive screens, data entry, local storage, and network transport.
  5. Enable obfuscation and integrity checks for release builds.
  6. Review dashboard and device logs after each production rollout.

Common Starting Points

App profileSensible first posture
General consumer appStart with core detections in Log mode, screen/privacy prevention where needed, and basic release validation.
Financial, healthcare, identity, or regulated appAdd app integrity, stronger runtime detections, screen protections, network protection, obfuscation, and clear user messaging.
Enterprise-managed appAlign device posture detections, VPN/proxy policy, device lock, SSO, and support messaging with your device management policy.
Fraud-sensitive appAdd app cloning, virtual environment, location/time posture, emulator, unknown sources, and integrity controls before strict enforcement.
Internal QA or CI buildEnable emulator or simulator architecture support only where testing requires it, then validate final release behavior on physical devices.

Control Configuration Vocabulary

TermMeaning
DetectionA control that observes a threat condition and triggers a response action.
PreventionA control that blocks or hardens a behavior without a separate response action.
IntegrityA control that verifies the app, device attestation result, or protected binary state.
Build-timeProtection applied while AppTego processes the app binary.
RuntimeProtection that executes on the end user's device.
Live configurationSupported Enterprise settings that can be updated without rebuilding when the app was prepared for live updates before release.
Minimum planThe lowest public plan tier that can use the control; higher tiers include it unless the control page says otherwise.