See Plans comparison

Features Subscription LicensefreeRASPRASP+ StarterFull App Safety Suite StarterFull App Safety Suite Business
Best fit for
Low value apps and educational purpose
Try RASP+ and perform Penetration testing Try advanced resilience and protection of App and APIs Production usage
App Shielding SDK
Easy to Integrate SDK. Provides strong protection, flexibility and transparency for developers. All  or only necessary features can be used.  Mature and well-maintained technology proven by thousands of Apps and 500M+ end-users protected.
freeRASP
freeRASP is a free, easy-to-integrate runtime threat detection solution for small businesses and
projects, supporting up to 100,000 downloads. It helps you quickly grasp the main features,
experiment, and try integrating Talsec SDKs. While it is a good threat detection tool, freeRASP’s
limited resilience against bypasses and limited telemetry data collection make it unsuitable for
commercial use in production, especially in regulated or privacy-sensitive domains.
RASP+
Advanced premium version of RASP delivers banking-grade security designed for professional, regulated, or high-risk apps
needing maximum hardening. Its customizable SDKs include advanced threat prevention like
AppiCrypt for API and Transaction Integrity protection. RASP+ is built to pass rigorous
penetration tests, ensuring real-time detection and mitigation of attacks. With strict privacy (no
data sent to Talsec), it guarantees compliance and robust defense.
RASP+
Advanced premium version of RASP delivers banking-grade security designed for professional, regulated, or high-risk apps
needing maximum hardening. Its customizable SDKs include advanced threat prevention like
AppiCrypt for API and Transaction Integrity protection. RASP+ is built to pass rigorous
penetration tests, ensuring real-time detection and mitigation of attacks. With strict privacy (no
data sent to Talsec), it guarantees compliance and robust defense.
RASP+
Advanced premium version of RASP delivers banking-grade security designed for professional, regulated, or high-risk apps
needing maximum hardening. Its customizable SDKs include advanced threat prevention like
AppiCrypt for API and Transaction Integrity protection. RASP+ is built to pass rigorous
penetration tests, ensuring real-time detection and mitigation of attacks. With strict privacy (no
data sent to Talsec), it guarantees compliance and robust defense.
Runtime App Self Protection (RASP)
Runtime Application Self Protection. Due to hundreds of different security controls, RASP-protected App becomes “aware” of risk factors coming from the compromises of the OS and/or app execution environment. Threat signals are also being sent to the monitoring and auditing backend for security analysis and alarming by automatic watchers.
Resilience to Reverse Engineering and bypass
Basic .freeRASP threats detection mechanisms allow developers to manage reactions on detected security issues. Active threats prevention and configurable reactions make .RASP+ more resilient to bypass techniques. It implies threats prevention vs detection only in .freeRASP (API callbacks that developers would need to obscure and implement). The reactions to threats (like killing the app) can be configured to be triggered from within .RASP+ SDK at a lower level of deeply obscured Native C code. Hence it is much harder to locate and bypass by reverse engineering than reaction maid in App logic code as in .freeRASP.
Limited
Advanced
Advanced
Advanced
SDK obfuscation
.RASP+ binary SDK is built individually with binding to App-specific data (signing cert hash, package name, teamID , etc.). freeRASP SDK is entirely the same binary for all users i.e. "known for attackers". Practically the .freeRASP-protected app may be too weak to pass the professional pentesting because an experienced pentester will be capable of bypassing it.
Limited
(same for all users)
Advanced (individual per build)
Advanced (individual per build)
Advanced (individual per build)
Root & jailbreak protections
Rooting/Jailbreaking is a technique of acquiring privileged control over the operating system of an Android/iOS device. While most users root their devices to overcome the limitations put on the devices by the manufacturers, it also enables those with malicious intent to abuse privileged access and steal sensitive information. Many different attack vectors require privileged access to be performed. Tools such as Magisk or Shadow can hide privileged access and are often used by attackers.
Basic
Advanced
Advanced
Advanced
Runtime reverse engineering controls
  • Debugger
While most developers use debuggers to trace the flow of their program during its execution, the same tool can be attached to an application in an attempt to reverse engineer, check memory values, and steal confidential information.
  • Emulator / Simulator (e.g. Nox Player, BlueStacks)
Running an application inside an emulator/simulator allows an attacker to hook or trace program execution. Common disadvantages of emulators are:
- leakage of data (malicious emulators)
- cheating in games (gaming emulators)
- broken sandbox (easier to get root privilege)
- sign of reverse engineering.
  • Hooking protections (e.g. Frida, Cydia Substrate)
The application can be analyzed or modified even though its source code has not been changed, applying a technique known as hooking. This technique can be used to intercept system or application calls and then modify them. An attacker can exploit this by inserting new (often malicious) code or by altering existing one to obtain personal client data. The most well-known hooking frameworks are Frida or Cydia Substrate.
Basic
Advanced
Advanced
Advanced
Runtime integrity controls
  • App tampering
Every application can be easily modified and then resigned by an attacker. This process is known as application repackaging. There may be many reasons for application repackaging, whether it's trojan-code insertion, RAT weaponization, altering app's behavior, credential/JWT harvesting, or bypassing app licensing. A modified/tampered application is often distributed using third-party stores or other side channels.
  • Malicious repackaging / cloning
Every application can be easily modified and then resigned by an attacker. This process is known as application repackaging. There may be many reasons for application repackaging, whether it's trojan-code insertion, RAT weaponization, altering app's behavior, credential/JWT harvesting, or bypassing app licensing. A modified/tampered application is often distributed using third-party stores or other side channels.
  • Sideloading / unofficial store installation
Users can share a copy of the application on unofficial stores or various pirate forums. While some users download these copies to avoid paying for the product, they can include unknown and possibly dangerous modifications. Verifying an official installation consequently protects both the users and the owner. This reaction is also triggered, if you install the application through alternative ways like Android Debug Bridge (ADB) or file manager.
Basic
Advanced
Advanced
Advanced
Device OS security status check
  • HW security module
  • Device screen lock
  • Google Play Services availability
  • Huawei Mobile Services availability
  • Last security patch update
  • System VPN
  • Developer options
Yes
Yes
Yes
Yes
UI protection
  • Tapjacking / Overlay attack
A screen overlay attack, also known as a tapjacking, is a technique in which a portion of the application screen is obscured by a malicious transparent screen. This deceptive overlay steals user’s clicks (PIN, password, etc.).
  • Accessibility Services misuse protection
Malicious screen readers are considered one of the weakest points of the Android OS from a security standpoint. These dangerous apps can retrieve any content on the screen by misusing the accessibility features primarily intended for users with disabilities. Captured data typically involve personal information, account balances, and credentials. Hiding the sensitive information is advised in case unwanted screen reader apps are detected.
No
Yes
Yes
Yes
Remote Configuration
Ability to change the SDK setting and behavior remotely without a need to app re-publishing.
No
Yes
Yes
Yes
App Hardening Suite
Set of tools for Mobile Apps developers that help to solve and mitigate some specific security issues, like combat a man-in-the-middle (MiTM) attacks, client secrets protection, Application Layer End-2-End Encryption, User/Device Binding, suspicious apps detection.
Security hardening suite
  • Secure Vault to protect keys, URLs, etc.
If you put your secrets in plain sight without any additional protection, they can be easily stolen from your app. Not only may reverse engineers do this manually but there are even automated scanners that extract secrets from every public app. Protect API keys, encryption keys, tokens, secret strings (URL), certificates, key rotations, and configuration files easily.
With the Secret Vault:
-No secrets in your code
-Secrets can be dynamically updated
  • Dynamic TLS pinning
Certificate pinning forces the client app to validate the server’s certificate against known characteristics/fingerprint (certificate, public key, hashed public key, etc.). Application without certificate pinning is prone to man-in-the-middle or DNS spoofing attacks.

Implementation of certificate pinning will usually use certificates hard-coded in applications. This approach will enforce both the rebuild of an application and the update for users when the hardcoded certificate is about to expire or is revoked. In applications that are pinning multiple certificates, this enforcement may occur too often.

Talsec implements dynamic certificate pinning. It solves the problem by transferring trust from hard-coded certificates to hard-coded "master" keys. This way, we can separate the lifecycles of certificates and trusted keys.
No
No
Yes
Yes
AppiCrypt® – App Integrity Cryptogram
Innovative technology that allows the backend to control the state of the Client App and mobile OS integrity. It provides and calculates the online risk score and allows filtering the malicious calls at the API gateway or at the backend App logic level.
API protection and anti- API abuse
  • Transactions authenticity and integrity verification
  • Device Risk Scoring
  • RASP advanced anti-bypass
No
No
Yes
Yes
AppiCrypt® for Web
  • Browser-based Apps protection using WebAssembly
  • Transactions authenticity and integrity verification
  • Anti- bot and sesion hijacking
  • Anti- web scraping
No
No
No
Yes
Malware Detection
Active protection against known malware, ongoing malware campaigns, counterfeit app clones, and other potentially risky apps is essential for the overall security posture.

Malware detection scans the device for blocklisted apps, apps installed from untrusted app stores or side-loaded from elsewhere, and apps requiring risky permissions. Any unwanted findings are reported back to the app and logged.
Malware detection for Android apps
  • Detection of apps installed from untrusted stores or side-loaded
  • Detection of apps with suspicious permissions
No
Advanced
Advanced
Silver Support and maintenance for commercial plans with committed Reaction, Restoration and Resolution time.
Silver Support and maintenance for commercial plans with committed Reaction, Restoration and Resolution time.
App Security Monitoring and Logging
App security monitoring service is shared both for Android and iOS. App security monitoring service (i.e., reports and email alerts) for .freeRASP is provided by Talsec free of charge within FUP.

Only commercial plans currently support customer managed or inhouse audit/monitoring data collection cloud service.
Threat events data collection
Mandatory collection to Talsec services
Mandatory collection to Talsec services
Mandatory collection to Talsec services
Optional and customizable logs destination
App and threats data monitoring portal and Dashboard
Limited functionality, no raw data access
Full functionality with access to raw data search
Full functionality with access to raw data search
Full functionality with access to raw data search
Self-care portal for the SDK configuration
No
Yes
Yes
Yes
Support and Maintenance
Silver Support and maintenance for commercial plans with committed Reaction, Restoration and Resolution time.
SLA and maintenance updates
Not commited
Yes
Yes
Yes (Advanced variants)
Fair Usage Policy
Total apps download limit
Up to 100K
(premium upgrade required for more)
Up to 10K
Up to 10K
100K and more
(per purchased plan)
End-users' threats data collection and processing by Talsec
Mandatory
Mandatory
Mandatory
Optional and customizable logs destination