In CI/CD pipelines, automated testing services validate the functionality of apps across hundreds of real-world mobile devices and OS versions. However, automated testing services can also leverage methods and tools that violate cybersecurity policies or that cybersecurity professionals find problematic and dangerous, including emulators, virtualization, resigning, debugging, dual spaces, Magisk, and more. Once protections are added to a mobile app, security features detect these methods and tools, and the resulting cyber defense may prevent testers from using parts of these testing services. Join Karen to learn how you can eliminate the need to test protected and unprotected builds separately, reduce complexity when testing protected mobile apps in automated environments, and automate testing of mobile apps that are protected from the same tools/methods used by testing services.