Protect High-Value Data From
Unauthorized Extraction and
Redistribution

Data platforms deliver clean, structured data through mobile APIs for performance and developer convenience. Once those APIs are penetrated by unauthorized clients, they can bypass the app entirely and access datasets directly.
This enables large-scale extraction without browsers, UI automation, or obvious abuse signals. If your backend can’t verify what is calling your API, data scraping becomes invisible.
Structured Data is Way Easy to Extract,
and Hard to Control
Data platforms deliver clean, structured data through mobile APIs for performance and developer convenience. Once those APIs are penetrated by unauthorized clients, they can bypass the app entirely and access datasets directly.
This enables large-scale extraction without browsers, UI automation, or obvious abuse signals. If your backend can’t verify what is calling your API, data scraping becomes invisible.
Common Threats Facing Data Platform Apps
Bulk Dataset Extraction
Automated clients harvest structured API responses at scale.
Unauthorized Redistribution
Data is repackaged, resold, or embedded into third-party products without consent.
Competitive Intelligence Leakage
Scraped data reveals coverage, freshness, and differentiation.
AI Model Training Without Permission
Extracted datasets are used to train proprietary or commercial models.
API Replay and Cloned Clients
Reverse-engineered apps are replaced with scripts that access data continuously.
Verify the App Before Delivering Data
The Approov Solution for Data Platforms:
Approov ensures that every protected API request includes cryptographic proof that it originated from a genuine, untampered mobile app.
Approov evaluates the app and runtime environment and issues a short-lived, signed JSON Web Token (JWT) that your backend verifies before returning listing data.
Requests without valid proof are denied—before property data is exposed.
How it works:
App integrity is evaluated at runtime
Approov checks that the app and environment are genuine and untampered.
A short-lived JWT is issued
The token represents the attestation result.
The token is added to API requests
Automatically included in headers for protected endpoints.
Your backend verifies the token
Using standard JWT verification libraries.
Policy is enforced
Valid requests proceed; invalid or missing tokens are blocked.

Remove Third-Party API Keys From Mobile Apps
Protect Your Most Valuable Data Endpoints
Core dataset and query APIs
Search, filter, and aggregation endpoints
Preview and sample data APIs
Account-specific or tiered access endpoints
Usage and analytics APIs
Deploy Without Disrupting Data Access
Approov works with existing authentication and entitlement models and requires no changes to dataset logic or schemas.
Q: Will this block legitimate customers or developers?
No. Only unauthorized mobile clients are blocked; approved access paths remain unchanged.
Q: Does this affect performance or query latency?
No. Token validation adds negligible overhead compared to data processing.
Q: Can we protect only certain datasets or tiers?
Yes. Protection can be applied selectively by endpoint.
Q: Does this prevent web scraping entirely?
It prevents extraction via mobile APIs, web access must be controlled separately.
Take Control of Who can Access Your Data
Ensure your datasets are delivered only to genuine mobile apps, not automated or unauthorized clients.
