Instead of just showing you the stack trace, Crashlytics performs deep analysis of each and every thread. We de-prioritize lines that don't matter while highlighting the interesting ones. This makes reading stack traces easier, faster, and far more useful! Crashlytics' intelligent grouping can take 50,000 crashes, distill them down to 20 unique issues, and then tell you which 3 are the most important to fix. | It provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. |
Instead of just showing you the stack trace, Crashlytics performs deep analysis of each and every thread. We de-prioritize lines that don't matter while highlighting the interesting ones. This makes reading stack traces easier, faster, and far more useful!;Crashlytics' intelligent grouping can take 50,000 crashes, distill them down to 20 unique issues, and then tell you which 3 are the most important to fix.;Now you'll get precise information on the performance of the devices that your apps run on. We'll let you know if the crash only happens on a specific model or generation of a device. We'll even tell you other information, like whether your app only crashes in landscape mode, or whether the proximity sensor is always on.;Through our smart reports, we'll provide key insights into your data so you can spend more time fixing and less time triaging.;Going one layer deeper, Crashlytics examines the operating system that your app is running on. We answer questions like: is it crashing only on jailbroken devices? Is this a memory issue? Does this only affect a specific version of iOS? Through our interactive reports, you'll know instantly.;Our cutting edge architecture can handle all the traffic you'll throw at us. For example, suppose a buggy update is released and all your users experience issues across all of their devices. Our system processes every crash in a record-breaking 18 milliseconds so you can take action — immediately.;Each crash we receive gets analyzed by our banks of servers. While pasting a stack trace is the simplest way to get it to you, we wanted to do better. We analyze the entire stack trace, for every crash, and apply carefully-tuned algorithms. Some lines are de-emphasized while others are highlighted, so we can take you straight to the threads and stack-frames that matter.;We've built a layer of intelligent post-processing to alert you to new issues in real-time. We've also built the channels to get that intelligence to you. Whether you're on the Crashlytics dashboard on your iPad, coding on your MacBook with Crashlytics for Mac, watching your third-party issue tracker or even your email inbox, you'll get notified when something important happens.;You're always in control — all notifications are customizable to minimize noise and maximize action.;The Crashlytics SDK uses a multi-step symbolication process to provide progressively higher levels of detail. We start with on-device symbolication. Once a crash report makes it into our system, stack frames are then re-processed against your application's dSYM on our servers. This two-step symbolication process, coupled with our advanced aggregation algorithms, provides the highest information fidelity available.;On average, Crashlytics adds only 40 KB — or the size of a single image — to the weight of your application.;We don't require linking against any additional frameworks or libraries.;When initialized at start-up, Crashlytics performs only the minimal amount of required work and defers the rest until a few seconds after app startup completes. This delay is configurable — we want your app to launch as quickly as possible;Our memory footprint has been carefully tuned to minimize overhead. We guarantee Crashlytics will not impact gameplay, video processing, or any memory-intensive operations you perform.;We care tremendously about the stability of your app and the experience for your users. If for any reason our SDK fails, its defensive design will ensure it has no negative impact.;We use run-time feature detection to ensure compatibility with iOS 4 to iOS 6 and beyond. | Cryptographic protection of data; Encryption; Intrusion detection; Encryption proxy; Trust compartmentalisation; Key management tools |
Statistics | |
GitHub Stars - | GitHub Stars 1.4K |
GitHub Forks - | GitHub Forks 132 |
Stacks 1.0K | Stacks 10 |
Followers 614 | Followers 12 |
Votes 340 | Votes 0 |
Pros & Cons | |
Pros
| No community feedback yet |
Integrations | |

Instabug is a platform for Real-Time Contextual Insights that completely takes care of your bug reporting and user feedback process; to accelerate your workflow and allow you to release with confidence.

AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys. AWS Key Management Service is integrated with other AWS services including Amazon EBS, Amazon S3, and Amazon Redshift. AWS Key Management Service is also integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.

Crittercism, based in San Francisco, California, is the world’s first mobile application performance management (APM) solution. The company’s products monitor every aspect of mobile app performance, allowing Developers and IT Operations to deliver high performing, highly reliable, highly available mobile apps. Crittercism provides a real-time global view of app diagnostics and crashes across iOS, Android, Windows Phone 8, Hybrid and HTML5 apps and is used on more than 800 million unique devices and in more than 250 billion app sessions. The company’s investors include Google Ventures, Opus Capital and Shasta Ventures.

Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS 140-2 Level 2 validated HSMs (hardware and firmware). With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.

It powers apps from development through their entire life cycle, so our customers can deliver differentiated, high-performing, and secure digital experiences.

It is an enterprise security information and event management (SIEM) product. It includes out-of-the-box analytics, correlation rules and dashboards to help customers address their most pressing security use cases — without requiring significant customization effort.

A platform to help organizations be more trusted, and operationalize privacy, security, data governance, and compliance programs.

It provides complete cyber security by protecting what really matters most—your data and applications—whether on-premises or in the cloud.

The AWS CloudHSM service allows you to protect your encryption keys within HSMs designed and validated to government standards for secure key management. You can securely generate, store, and manage the cryptographic keys used for data encryption such that they are accessible only by you. AWS CloudHSM helps you comply with strict key management requirements without sacrificing application performance.
It is a comprehensive data protection platform that enables security teams to automatically analyze what is happening in sensitive-data environments (databases, data warehouses, big data platforms, cloud environments, files systems, and so on) to help minimize risk and protect sensitive data.