Create On Brand Experiences when Mobile Attacks Happen

Threat-Events™ is an in-app framework that empowers mobile developers with real-time event data and control when Android & iOS attacks happen. Use Threat-Event data from Appdome’s 300+ mobile app security, anti-fraud, anti-malware, anti-bot, anti-cheat, geo compliance and other defenses to create on-brand experiences that build trust and loyalty with ease. 

Don't Let Mobile Cyberattacks & Fraud
Destroy Brand Trust & Loyalty

Bring Threat Intelligence
into Your Mobile App

Threat-Events delivers rich, in-app, mobile attack intelligence inside Android & iOS apps, including attack detail, type, and source, device, location, and event meta data, all to gauge the severity and risk of each attack. Threat-Events uses standard interfaces to communicate with the app. No SDK or Server Required.

Get the Guide >

Enjoy Full-Range of
Enforcement Options

Threat-Events provides multiple evaluation and enforcement options. This gives mobile brands and developers the power to choose when and how to evaluate mobile app, user or transaction risk and/or enforce each defense. Use Threat-Events for teaching, monetizing, offers, Enhanced Due Diligence and more.

Get the Guide >

Monitor & Improve
Business Impact

Threat-Event implementations can be monitored via Appdome's ThreatScope™ Mobile XDR service. This allows brands to verify engineering work on Threat-Events, enrich or validate data used by fraud analysts, confirm enforcement or data collection, and monitor and improve business impact.

Get the Guide >

Multiple Enforcement Options
for 300+ Mobile App Defenses

With Appdome’s Threat-Events™, mobile brands gather granular attack data from 300+ Appdome defenses in a mobile app and design the in-app response that’s best for their business and brand. Using Threat-Events requires no servers, external call-outs or SDKs. All threat detection and data is contained within the app, ensuring the highest fidelity, fastest response and best user experience when attacks strike. Below are just some of the enforcement options available today.

Mobile Users Deserve
Better Experiences When Attacks Happen

Threat-Events is the fastest, easiest and best way to get the mobile device, user, and transaction risk needed to ensure Know Your Customer (KYC), Enhanced Due Diligence (EDD) and mobile transaction security. Threat-Events can also be used to explore alternative enforcement options such as education, transaction limits, monetization, offers, upgrades and more. Explore the benefits of Threat-Events or contact us to learn more.

100s of Threat-Events™ for 100s of Attacks

There are 100s of in-app Threat-Events™, each with a unique name, identifier, etc. to match the 100s of runtime and dynamic threat and attack vectors detected and protected via Appdome. This allows Android & iOS mobile developers to register and listen for only the Threat-Events they need, or part or all of each Threat-Event as needed, to control the user experience for the Threat-Events that matter most to the mobile app and business.

Learn more >

Secure Event Channel for all Threat-Events™

Threat-Events are security, attack and threat detection events passed from the Appdome Threat-Event mobile intelligence framework to the code of the Android and iOS app, including apps written natively and in frameworks like Swift, Objective C, C++, Java, Kotlin, React Native, Xamarin, Cordova, Ionic, Unity, Flutter, and more. Android developers register, and iOS developer listen, on a secure channel to receive Threat-Events inside the Appdome protected app.

Learn more >

Granular Threat-Event™ Handling

Threat-Events are modular and configurable. Each Threat-Event is designed to pass binary true/false security, attack and threat data to Android & iOS mobile apps or detailed threat and attack intelligence, including source, description, device and event meta data, ThreatScores™ and more when an attack or threat occurs. Each time an event is triggered, the developer can ask Appdome to enforce the defense or the developer can control the enforcement and response to each threat.

Learn more >

No-Harm Back Up Enforcement Options

Appdome Threat-Events also come with a failsafe back up option allowing developers to utilize Appdome enforcement options in a "back up" or "failsafe" configuration so that attacks and threats do not go unchecked. This is critical as it provides a back up option in the event the developer's enforcement thread is busy or under attack and guarantees protection at every event.

Learn more >

ThreatScores™ for Mobile Threat Ranking

Appdome ThreatScores™ are an optional feature with each Threat-Event and can be used to set the priority of each Threat-Event, attack or threat on a mobile customer's mobile device. ThreatScores provide a value (1-1000) for each active Threat-Event as well as the aggregated ThreatScore for all Threat-Events on the user's mobile device.

Learn more >

ThreatCodes™ for Fast End-User Resolution

ThreatCodes™ are additional attack and threat telemetry data available via Threat-Events. ThreatCodes are unique identifiers for specific on-device threats and provide a quick and easy resolution path for L1 mobile support teams. ThreatCodes can also be used on Appdome Threat Remediation Center, a part of ThreatScope™ mobile intelligence center (or SOC).

Learn more >

Mobile Meta Data with each Threat-Event™

Every Threat-Event can be enriched with detailed mobile attack and threat meta data including device, device manufacturer, Device ID and other attributes to distinguish specific attacks and threats and block attacks fast. Meta data is available on all mobile RASP security, Jailbreak, Root, Mobile Malware, Man-in-the-Middle Attacks, Synthetic Mobile Fraud, IVTs, Auto-Clickers, Injection Attacks, Cheats, Mods, Modding, Emulator Players, Mobile Spyware, Credential Stuffing and other attacks.

Learn more >

Certified Secure™ with Every Build

With Appdome's Certified Secure™ mobile app security certification, every mobile app release is certified-protected with the mobile app security and other protections added to Android and iOS apps on Appdome. Certified Secure™ is the perfect complement to DevSecOps strategies. It can be used in "go, no-go" release meetings, compliance verification and to reduce reliance on code scanning services.

Learn more >

Explore the Threat-Event™ Knowledge Base

Find detailed “step-by-step” instructions on adding in-app mobile threat intelligence via Threat-Events in Android and iOS apps built in Android Studio, Java, Kotlin, C++, Ionic, React Native, Flutter, Cordova, Swift, Objective-C, Xcode, Xamarin, PhoneGap, and more.  Learn how to protect any Android and iOS app from mobile threats of all kind.  Includes information on the patented technology powering the Appdome mobile security platform, plus illustrated guides, developer tips and more.

Blog Using 3 Levels Of Data In Mobile Devsecops

Using 3 Levels of Data in Mobile DevSecOps

Anyone that knows me knows I love golf.

Golf is a challenging sport because it involves so many variables. A big part of golf is knowing, or playing with someone…

Better Mobile Intelligence & Control Framework
Across the Entire DevOps Stack

Search Appdome Solutions

Blog Top 3 Ways Screen Overlay Attacks Are Used for Mobile Fraud

How Attackers Use Overlay Attacks to Commit Mobile Fraud

A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button…