Phantom

Phantom

Intelligent Waves
+
+

Related Products

  • Jscrambler
    38 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Feroot
    28 Ratings
    Visit Website
  • Aikido Security
    226 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Fraud.net
    56 Ratings
    Visit Website

About

Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk. Obfuscates source code, inserts honeypots, and implements other deceptive code patterns to deter and confuse threat actors. Triggers defensive measures automatically if suspicious activity is detected, including app shutdown, user sandbox, or code self-repair. Injects essential app code protections and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.

About

The Phantom Next Generation, award-winning solution provides the ability for organizations to access foreign points of presence to conduct remote open-source information gathering and research while at the same time protecting organizations and individuals from exposure to foreign intelligence. Intelligent Waves has achieved this by combining the GRAYPATH software-defined obfuscated network with the managed attribution capability of the Phantom platform in a secure but unclassified package. The system uses all the capability of the GRAYPATH network to provide low probability of detection, intercept, and exploitation of application traffic and obfuscate the user’s location while the Phantom platform matches the user’s digital signature with the intended point of presence. The user’s true IP, location, and data usage are obfuscated while user-generated traffic is made to “originate” from a remote point of presence (PoP) or interface server.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

DevOps teams

Audience

Organizations interested in an advanced Browser Isolation platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Digital.ai
United States
digital.ai/application-protection

Company Information

Intelligent Waves
Founded: 2006
United States
intelligentwaves.com/phantom/

Alternatives

ThreatCast

ThreatCast

Guardsquare

Alternatives

QShield

QShield

Quarkslab
EndCrypt

EndCrypt

Procenne
Zimperium MAPS

Zimperium MAPS

Zimperium
JavaScript Obfuscator Pro

JavaScript Obfuscator Pro

JavaScript Obfuscator

Categories

Categories

Integrations

BMC AMI Ops Automation for Capping
BMC Compuware Topaz Connect
BMC Middleware Management
BlueSwan
Facebook
Google
Planview Viz
SD Elements
TikTok
X (Twitter)
YouTube

Integrations

BMC AMI Ops Automation for Capping
BMC Compuware Topaz Connect
BMC Middleware Management
BlueSwan
Facebook
Google
Planview Viz
SD Elements
TikTok
X (Twitter)
YouTube
Claim Digital.ai Application Protection and update features and information
Claim Digital.ai Application Protection and update features and information
Claim Phantom and update features and information
Claim Phantom and update features and information