Skip to main content

Security Can Accelerate the Race for Better Mobile App UX

Michael Olechna
Guardsquare

Last year, the typical person on Earth spent more than 500 hours using mobile applications (a year-over-year increase of 5.8%) with an average of 26 different apps used per month (+9.2% YoY). These steady increases are evidence of an ongoing shift in consumer preference toward "mobile-first" experiences. For example, smartphones are now involved in nearly half of all retail purchases, and 75% of banking customers prefer mobile applications over online account access.

In response to the increasing demand for new mobile applications and advanced capabilities, developers have been prioritizing time-to-market, application performance, and user experience (UX) at the expense of security. A recent Enterprise Strategy Group survey of mobile app developers and security professionals uncovered that only 38% of organizations currently analyze their mobile applications for vulnerabilities on a weekly basis, while nearly 20% have a gap of a quarter or more between vulnerability tests.

To further accelerate delivery pipelines, more than half of organizations are already using AI coding agents in production, with another 78% planning to deploy them soon. But AI-generated code notoriously falls short in terms of technical debt, quality concerns, and maintainability issues — all of which can impact both user experience and mobile app security. Stanford research shows that AI-assisted coders are 80% more likely to write less secure code than coders without generative AI assistance.

Common security gaps across the mobile application software development lifecycle (SDLC) include:

  • Inconsistent or infrequent use of mobile application security testing (MAST)
  • Trusting default mobile device/OS protections post-release as sufficient protection
  • Using simple, single-layer code protection tools (i.e., wrappers)
  • Leaving APIs and application backends exposed
  • Waiting for a security incident instead of proactively analyzing real-time threats and regularly updating code

Security Is Part of the Mobile App User Experience

With everyday mobile apps (e.g., social media, maps, browsers, entertainment), most people don't give security a second thought. However, many users are concerned about tasks such as making retail purchases, managing finances, or accessing sensitive information (like personal medical records or confidential work communications). Unfortunately, those aren't the only kinds of mobile apps that need to be secured. For example, a recent modified version of the TikTok social video app included malware (dubbed "SparkKitty") that spied on users in search of credentials for cryptocurrency wallets.

Building and retaining user trust requires continuous and effective security throughout the useful life of a mobile app because they are increasingly attractive targets for attackers. Research into more than 156,000 iOS apps revealed over 815,000 hardcoded secrets, including thousands that are highly sensitive and could lead directly to breaches or data leaks. The number of detected Android-based malware samples increased by more than a quarter (27%) from Q4 2024 to Q1 2025.

Traditionally, the limitations of many mobile application security solutions have forced developers to "pick their poison" — trying (and often failing) to find a sweet spot between two different negative outcomes for their users: 

  • Security obstructs app functionality: the protections in place are not seamlessly integrated, which disrupts ease of use and/or degrades application performance for users.
  • Security proves to be ineffective: the protections fail to prevent an unwanted event, such as credential exposure, data leakage, unauthorized account access, fraud, compliance violations, or malware attacks.

Mobile app and SDK developers need to serve the needs of user experience, application performance, and security, without compromising on any one area. With the right tools and approach, security can help accelerate CI/CD pipelines and improve mobile application performance.

From "Unsafe at Any Speed" to "F1" Performance

Mobile app development is a bit like Formula One auto racing — the faster the engine goes, the better all the other systems need to be to keep everyone safe. Security isn't just about braking, but also steering, visibility, telemetry, and physical infrastructure within the chassis to protect the driver when unexpected incidents occur. It's a multi-layered system designed to work in lockstep with all the other parts of the machine, as well as the operator.

Effectively securing your mobile applications and SDKs creates a better user experience. Ultimately, the goal of mobile app security should be to protect both the intended functionality and the user's experience, without any tradeoffs.

In fact, some key performance metrics (e.g., crash rate, app start time, page load time) can be negatively impacted without rigorous and regular security testing throughout the development process. App publishers also need strong code protections post-release to prevent malicious tampering or unauthorized modifications that alter the designer's original UX (which ultimately degrade how the app was intended to operate).

Purpose-Built Mobile App Security in Your Pipeline

The pressure to accelerate development cycles isn't going away. Neither are the shiny new GenAI development tools that frequently introduce code flaws, open-source vulnerabilities, and even maliciously poisoned LLM content.

More than ever, developers need effective and practical security tools — ones that operate within this rapidly evolving reality by integrating into CI/CD pipelines at speed. They also need security that's purpose-built for the unique nature of mobile applications, not adapted solutions for web applications and/or mobile devices. This should include:

  • Relentless testing, at speed. Automated testing (MAST) that seamlessly integrates into CI/CD pipelines helps eliminate exposure to attacks that will disrupt normal mobile app operation. Combine these automated scans with thorough manual penetration tests before each release. Effective testing also helps identify potential compliance issues that can erode customer trust. Some testing tools can even help developers directly improve application performance by identifying unused code and libraries that increase application size and bog down efficient operation.
  • Multi-layered performance protection. Multi-layered code hardening (obfuscation and encryption techniques) plus runtime application self-protection (RASP) can protect apps from malicious tampering or unauthorized feature modifications that can disrupt optimized performance. RASP also offers dynamic defenses against targeted attacks to prevent mobile app downtime.
  • Cover your backend. Application attestation verifies that only your genuine app can access your APIs, while at the same time blocking clones, bots, and other unauthorized clients from exploiting backend logic or causing service disruptions. An effective app attestation solution should also prevent false positives that block genuine users from accessing their accounts.
  • Visibility helps avoid disruptions. Threat monitoring can provide real-time visibility into the application's attack surface to manage suspicious users and respond to potential security issues. In addition, it should provide actionable analytics that inform optimizations for both security and performance in version updates and future app releases.

Proactively integrating security across the mobile app SDLC offers a value-added benefit for users: peace of mind that the application has been thoroughly tested in development and remains comprehensively protected against attacks in the wild. It helps mobile app developers establish an environment that supports zero trust principles by tightly integrating security into development and operations workflows (also known as DevSecOps).

Test, Protect and Monitor — for the Win

Security shouldn't be a detour or a delay en route for mobile application and SDK developers. With purpose-built tools for testing, protection, and monitoring, mobile application security can become both an accelerator and a navigator that helps you build better, faster, and safer without any compromises.

Michael Olechna is Product Marketing Manager at Guardsquare

The Latest

Seeing is believing, or in this case, seeing is understanding, according to New Relic's 2025 Observability Forecast for Retail and eCommerce report. Retailers who want to provide exceptional customer experiences while improving IT operations efficiency are leaning on observability ... Here are five key takeaways from the report ...

Technology leaders across the federal landscape are facing, and will continue to face, an uphill battle when it comes to fortifying their digital environments against hostile and persistent threat actors. On one hand, they are being asked to push digital transformation ... On the other hand, they are facing the fiscal uncertainty of continuing resolutions (CR) and government shutdowns looming near and far. In the face of these challenges, CIOs, CTOs, and CISOs must figure out how to modernize legacy systems and infrastructure while doing more with less and still defending against external and internal threats ...

Reliability is no longer proven by uptime alone, according to the The SRE Report 2026 from LogicMonitor. In the AI era, it is experienced through speed, consistency, and user trust, and increasingly judged by business impact. As digital services grow more complex and AI systems move into production, traditional monitoring approaches are struggling to keep pace, increasing the need for AI-first observability that spans applications, infrastructure, and the Internet ...

If AI is the engine of a modern organization, then data engineering is the road system beneath it. You can build the most powerful engine in the world, but without paved roads, traffic signals, and bridges that can support its weight, it will stall. In many enterprises, the engine is ready. The roads are not ...

In the world of digital-first business, there is no tolerance for service outages. Businesses know that outages are the quickest way to lose money and customers. For smaller organizations, unplanned downtime could even force the business to close ... A new study from PagerDuty, The State of AI-First Operations, reveals that companies actively incorporating AI into operations now view operational resilience as a growth driver rather than a cost center. But how are they achieving it? ...

In live financial environments, capital markets software cannot pause for rebuilds. New capabilities are introduced as stacked technology layers to meet evolving demands while systems remain active, data keeps moving, and controls stay intact. AI is no exception, and its opportunities are significant: accelerated decision cycles, compressed manual workflows, and more effective operations across complex environments. The constraint isn't the models themselves, but the architectural environments they enter ...

Like most digital transformation shifts, organizations often prioritize productivity and leave security and observability to keep pace. This usually translates to both the mass implementation of new technology and fragmented monitoring and observability (M&O) tooling. In the era of AI and varied cloud architecture, a disparate observability function can be dangerous. IT teams will lack a complete picture of their IT environment, making it harder to diagnose issues while slowing down mean time to resolve (MTTR). In fact, according to recent data from the SolarWinds State of Monitoring & Observability Report, 77% of IT personnel said the lack of visibility across their on-prem and cloud architecture was an issue ...

In MEAN TIME TO INSIGHT Episode 23, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the NetOps labor shortage ... 

Technology management is evolving, and in turn, so is the scope of FinOps. The FinOps Foundation recently updated their mission statement from "advancing the people who manage the value of cloud" to "advancing the people who manage the value of technology." This seemingly small change solidifies a larger evolution: FinOps practitioners have organically expanded to be focused on more than just cloud cost optimization. Today, FinOps teams are largely — and quickly — expanding their job descriptions, evolving into a critical function for managing the full value of technology ...

Enterprises are under pressure to scale AI quickly. Yet despite considerable investment, adoption continues to stall. One of the most overlooked reasons is vendor sprawl ... In reality, no organization deliberately sets out to create sprawling vendor ecosystems. More often, complexity accumulates over time through well-intentioned initiatives, such as enterprise-wide digital transformation efforts, point solutions, or decentralized sourcing strategies ...

Security Can Accelerate the Race for Better Mobile App UX

Michael Olechna
Guardsquare

Last year, the typical person on Earth spent more than 500 hours using mobile applications (a year-over-year increase of 5.8%) with an average of 26 different apps used per month (+9.2% YoY). These steady increases are evidence of an ongoing shift in consumer preference toward "mobile-first" experiences. For example, smartphones are now involved in nearly half of all retail purchases, and 75% of banking customers prefer mobile applications over online account access.

In response to the increasing demand for new mobile applications and advanced capabilities, developers have been prioritizing time-to-market, application performance, and user experience (UX) at the expense of security. A recent Enterprise Strategy Group survey of mobile app developers and security professionals uncovered that only 38% of organizations currently analyze their mobile applications for vulnerabilities on a weekly basis, while nearly 20% have a gap of a quarter or more between vulnerability tests.

To further accelerate delivery pipelines, more than half of organizations are already using AI coding agents in production, with another 78% planning to deploy them soon. But AI-generated code notoriously falls short in terms of technical debt, quality concerns, and maintainability issues — all of which can impact both user experience and mobile app security. Stanford research shows that AI-assisted coders are 80% more likely to write less secure code than coders without generative AI assistance.

Common security gaps across the mobile application software development lifecycle (SDLC) include:

  • Inconsistent or infrequent use of mobile application security testing (MAST)
  • Trusting default mobile device/OS protections post-release as sufficient protection
  • Using simple, single-layer code protection tools (i.e., wrappers)
  • Leaving APIs and application backends exposed
  • Waiting for a security incident instead of proactively analyzing real-time threats and regularly updating code

Security Is Part of the Mobile App User Experience

With everyday mobile apps (e.g., social media, maps, browsers, entertainment), most people don't give security a second thought. However, many users are concerned about tasks such as making retail purchases, managing finances, or accessing sensitive information (like personal medical records or confidential work communications). Unfortunately, those aren't the only kinds of mobile apps that need to be secured. For example, a recent modified version of the TikTok social video app included malware (dubbed "SparkKitty") that spied on users in search of credentials for cryptocurrency wallets.

Building and retaining user trust requires continuous and effective security throughout the useful life of a mobile app because they are increasingly attractive targets for attackers. Research into more than 156,000 iOS apps revealed over 815,000 hardcoded secrets, including thousands that are highly sensitive and could lead directly to breaches or data leaks. The number of detected Android-based malware samples increased by more than a quarter (27%) from Q4 2024 to Q1 2025.

Traditionally, the limitations of many mobile application security solutions have forced developers to "pick their poison" — trying (and often failing) to find a sweet spot between two different negative outcomes for their users: 

  • Security obstructs app functionality: the protections in place are not seamlessly integrated, which disrupts ease of use and/or degrades application performance for users.
  • Security proves to be ineffective: the protections fail to prevent an unwanted event, such as credential exposure, data leakage, unauthorized account access, fraud, compliance violations, or malware attacks.

Mobile app and SDK developers need to serve the needs of user experience, application performance, and security, without compromising on any one area. With the right tools and approach, security can help accelerate CI/CD pipelines and improve mobile application performance.

From "Unsafe at Any Speed" to "F1" Performance

Mobile app development is a bit like Formula One auto racing — the faster the engine goes, the better all the other systems need to be to keep everyone safe. Security isn't just about braking, but also steering, visibility, telemetry, and physical infrastructure within the chassis to protect the driver when unexpected incidents occur. It's a multi-layered system designed to work in lockstep with all the other parts of the machine, as well as the operator.

Effectively securing your mobile applications and SDKs creates a better user experience. Ultimately, the goal of mobile app security should be to protect both the intended functionality and the user's experience, without any tradeoffs.

In fact, some key performance metrics (e.g., crash rate, app start time, page load time) can be negatively impacted without rigorous and regular security testing throughout the development process. App publishers also need strong code protections post-release to prevent malicious tampering or unauthorized modifications that alter the designer's original UX (which ultimately degrade how the app was intended to operate).

Purpose-Built Mobile App Security in Your Pipeline

The pressure to accelerate development cycles isn't going away. Neither are the shiny new GenAI development tools that frequently introduce code flaws, open-source vulnerabilities, and even maliciously poisoned LLM content.

More than ever, developers need effective and practical security tools — ones that operate within this rapidly evolving reality by integrating into CI/CD pipelines at speed. They also need security that's purpose-built for the unique nature of mobile applications, not adapted solutions for web applications and/or mobile devices. This should include:

  • Relentless testing, at speed. Automated testing (MAST) that seamlessly integrates into CI/CD pipelines helps eliminate exposure to attacks that will disrupt normal mobile app operation. Combine these automated scans with thorough manual penetration tests before each release. Effective testing also helps identify potential compliance issues that can erode customer trust. Some testing tools can even help developers directly improve application performance by identifying unused code and libraries that increase application size and bog down efficient operation.
  • Multi-layered performance protection. Multi-layered code hardening (obfuscation and encryption techniques) plus runtime application self-protection (RASP) can protect apps from malicious tampering or unauthorized feature modifications that can disrupt optimized performance. RASP also offers dynamic defenses against targeted attacks to prevent mobile app downtime.
  • Cover your backend. Application attestation verifies that only your genuine app can access your APIs, while at the same time blocking clones, bots, and other unauthorized clients from exploiting backend logic or causing service disruptions. An effective app attestation solution should also prevent false positives that block genuine users from accessing their accounts.
  • Visibility helps avoid disruptions. Threat monitoring can provide real-time visibility into the application's attack surface to manage suspicious users and respond to potential security issues. In addition, it should provide actionable analytics that inform optimizations for both security and performance in version updates and future app releases.

Proactively integrating security across the mobile app SDLC offers a value-added benefit for users: peace of mind that the application has been thoroughly tested in development and remains comprehensively protected against attacks in the wild. It helps mobile app developers establish an environment that supports zero trust principles by tightly integrating security into development and operations workflows (also known as DevSecOps).

Test, Protect and Monitor — for the Win

Security shouldn't be a detour or a delay en route for mobile application and SDK developers. With purpose-built tools for testing, protection, and monitoring, mobile application security can become both an accelerator and a navigator that helps you build better, faster, and safer without any compromises.

Michael Olechna is Product Marketing Manager at Guardsquare

The Latest

Seeing is believing, or in this case, seeing is understanding, according to New Relic's 2025 Observability Forecast for Retail and eCommerce report. Retailers who want to provide exceptional customer experiences while improving IT operations efficiency are leaning on observability ... Here are five key takeaways from the report ...

Technology leaders across the federal landscape are facing, and will continue to face, an uphill battle when it comes to fortifying their digital environments against hostile and persistent threat actors. On one hand, they are being asked to push digital transformation ... On the other hand, they are facing the fiscal uncertainty of continuing resolutions (CR) and government shutdowns looming near and far. In the face of these challenges, CIOs, CTOs, and CISOs must figure out how to modernize legacy systems and infrastructure while doing more with less and still defending against external and internal threats ...

Reliability is no longer proven by uptime alone, according to the The SRE Report 2026 from LogicMonitor. In the AI era, it is experienced through speed, consistency, and user trust, and increasingly judged by business impact. As digital services grow more complex and AI systems move into production, traditional monitoring approaches are struggling to keep pace, increasing the need for AI-first observability that spans applications, infrastructure, and the Internet ...

If AI is the engine of a modern organization, then data engineering is the road system beneath it. You can build the most powerful engine in the world, but without paved roads, traffic signals, and bridges that can support its weight, it will stall. In many enterprises, the engine is ready. The roads are not ...

In the world of digital-first business, there is no tolerance for service outages. Businesses know that outages are the quickest way to lose money and customers. For smaller organizations, unplanned downtime could even force the business to close ... A new study from PagerDuty, The State of AI-First Operations, reveals that companies actively incorporating AI into operations now view operational resilience as a growth driver rather than a cost center. But how are they achieving it? ...

In live financial environments, capital markets software cannot pause for rebuilds. New capabilities are introduced as stacked technology layers to meet evolving demands while systems remain active, data keeps moving, and controls stay intact. AI is no exception, and its opportunities are significant: accelerated decision cycles, compressed manual workflows, and more effective operations across complex environments. The constraint isn't the models themselves, but the architectural environments they enter ...

Like most digital transformation shifts, organizations often prioritize productivity and leave security and observability to keep pace. This usually translates to both the mass implementation of new technology and fragmented monitoring and observability (M&O) tooling. In the era of AI and varied cloud architecture, a disparate observability function can be dangerous. IT teams will lack a complete picture of their IT environment, making it harder to diagnose issues while slowing down mean time to resolve (MTTR). In fact, according to recent data from the SolarWinds State of Monitoring & Observability Report, 77% of IT personnel said the lack of visibility across their on-prem and cloud architecture was an issue ...

In MEAN TIME TO INSIGHT Episode 23, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the NetOps labor shortage ... 

Technology management is evolving, and in turn, so is the scope of FinOps. The FinOps Foundation recently updated their mission statement from "advancing the people who manage the value of cloud" to "advancing the people who manage the value of technology." This seemingly small change solidifies a larger evolution: FinOps practitioners have organically expanded to be focused on more than just cloud cost optimization. Today, FinOps teams are largely — and quickly — expanding their job descriptions, evolving into a critical function for managing the full value of technology ...

Enterprises are under pressure to scale AI quickly. Yet despite considerable investment, adoption continues to stall. One of the most overlooked reasons is vendor sprawl ... In reality, no organization deliberately sets out to create sprawling vendor ecosystems. More often, complexity accumulates over time through well-intentioned initiatives, such as enterprise-wide digital transformation efforts, point solutions, or decentralized sourcing strategies ...