Threat-Events™ for Better UX

Mobile Attacks are Certain
Bad Experiences are Not

Use Threat-Event data from Appdome’s 300+ mobile app security, anti-fraud, anti-malware, anti-bot, anti-cheat, geo compliance and other defenses to create on-brand experiences that build trust and loyalty when attacks happen with ease. Threat-Events™ is Appdome’s in-app framework that empowers mobile developers with real-time event data and control when Android & iOS attacks happen. 

Don't Let Security & Anti-Fraud Defenses
Hurt the User Experience

Create Threat Aware
Experiences Users Love​

Threat-Events™ lets mobile developers consume rich mobile attack intelligence, meta-data, and AI-powered risk profiles from the Appdome defenses in the Android & iOS app, control the user experience and tailor the experience to delight users when attacks happen. No SDK or Servers are needed.

Get the Guide >

Enjoy Full-Range
of Enforcement Options​

Threat-Events provides multiple evaluation and enforcement options. This gives mobile brands and developers the power to choose when and how to evaluate mobile app, user or transaction risk and/or enforce each defense. Use Threat-Events for teaching, monetizing, offers, Enhanced Due Diligence and more.

Get the Guide >

Monitor & Improve
Business Impact ​

Threat-Event implementations can be monitored via Appdome's ThreatScope™ Mobile XDR service. This allows brands to verify engineering work on Threat-Events, enrich or validate data used by fraud analysts, confirm enforcement or data collection, and monitor and improve business impact.

Get the Guide >

Create Amazing Threat Response
in Mobile Apps with Threat-Events™

Threat-Events lets mobile developers customize threat handling in their mobile apps. Use Threat-Events to get threat and risk data at the mobile device, user, and transaction level. Use the data in Know Your Customer (KYC) and Enhanced Due Diligence (EDD) workflows, or to verify user identity and transaction integrity. When attacks strike, you can also use Threat-Events' multiple enforcement options to create new workflows and keep users in your app. Here are just some of the options available using Threat-Events:

100s of Threat-Events™ for 100s of Attacks

Appdome offers hundreds of in-app Threat-Events™, each with a unique name, identifier, and definition to match the wide range of runtime and dynamic threats detected on Android and iOS. Developers can register and listen for only the events they need, or leverage all Threat-Events for full coverage. Each event can be consumed in part or whole to fine-tune how the app responds. This ensures the user experience and protections align with the threats that matter most to the app and business.

Learn More >

Secure Event Channel for all Threat-Events™

Threat-Events are passed from Appdome’s mobile intelligence framework to the protected app over a secure channel, ensuring reliability and safety. Events work across all native languages and mobile frameworks including Swift, Objective C, Kotlin, Java, React Native, Xamarin, Cordova, Unity, Flutter, and more. Android developers register, and iOS developers listen, to receive Threat-Events directly in the app. This design guarantees secure delivery of detection and response data regardless of app architecture.

Learn More >

Granular Threat-Event™ Handling

Every Threat-Event is modular and configurable, offering flexible ways to pass threat and attack intelligence. Developers can choose between simple true/false data or detailed telemetry such as event source, description, device metadata, and ThreatScores™. Each time an event is triggered, the developer can instruct Appdome to enforce protection automatically. Alternatively, the developer can manage enforcement and customize how the app responds to each threat.

Learn More >

No-Harm Back Up Enforcement Options

To guarantee protection, Threat-Events include a built-in failsafe enforcement option. If a developer’s enforcement thread is delayed, busy, or under attack, Appdome automatically applies the chosen protection in the background. This prevents threats from bypassing defenses or going unhandled. With backup enforcement in place, organizations can be sure protections are always applied at every event.

Learn More >

ThreatScores™ for Mobile Threat Ranking

ThreatScores™ add prioritization to Threat-Events by assigning a numeric value (1–1000) to each active threat detected on the device. Developers can use these scores to rank the importance of individual events and assess overall device risk. The aggregated ThreatScore helps identify when multiple attacks are present at once. This provides a fast, reliable way to guide enforcement decisions and escalate critical cases.

Learn More >

ThreatCodes™ for Fast End-User Resolution

ThreatCodes™ extend Threat-Events with unique identifiers for specific on-device threats. These identifiers provide direct resolution paths for Level 1 support teams, helping them quickly identify the cause and guide remediation. ThreatCodes are also integrated into Appdome’s Threat Remediation Center, part of ThreatScope™, to streamline SOC workflows. This makes resolving customer issues faster and more accurate.

Learn More >

Mobile Meta Data with each Threat-Event™

Every Threat-Event can be enriched with detailed mobile attack and threat meta data including device, device manufacturer, Device ID and other attributes to distinguish specific attacks and threats and block attacks fast. Meta data is available on all mobile RASP security, Jailbreak, Root, Mobile Malware, Man-in-the-Middle Attacks, Synthetic Mobile Fraud, IVTs, Auto-Clickers, Injection Attacks, Cheats, Mods, Modding, Emulator Players, Mobile Spyware, Credential Stuffing and other attacks.

Learn More >

Certified Secure™ with Every Build

Every mobile app release on Appdome comes with a Certified Secure™ certification, proving protections were successfully added to Android and iOS apps. Certified Secure™ can be used in compliance reviews, “go/no-go” release meetings, and internal audits to validate readiness. It supports DevSecOps strategies by providing automated proof of security in every build. This reduces reliance on manual scanning tools and gives teams confidence in each release.

Learn More >

Knowledge Base Illustration

Explore the Threat-Event™ Knowledge Base

Find detailed “step-by-step” instructions on adding in-app mobile threat intelligence via Threat-Events in Android and iOS apps built in Android Studio, Java, Kotlin, C++, Ionic, React Native, Flutter, Cordova, Swift, Objective-C, Xcode, Xamarin, PhoneGap, and more.  Learn how to protect any Android and iOS app from mobile threats of all kind.  Includes information on the patented technology powering the Appdome mobile security platform, plus illustrated guides, developer tips and more.

Best Ai Platform For Cyber Resilience

Best AI Platform for Cyber Resilience

This week at RSA, Appdome won several awards, including Best AI Platform for Cyber Resilience. I want to take this opportunity to explain why this one award is a significant…

Search Appdome Solutions

Search
Image Blog 2 Text

Device Binding in the Age of AI

Summary
For years, fraud prevention solutions have tried to use Device IDs to bind (or link) a user’s account or session to a specific device to prevent unauthorized access…