Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Hypori provides a secure, private virtual workspace solution that empowers employees to use their own devices for work without compromising privacy or security. Instead of moving data to the device, Hypori streams pixels of enterprise applications and data, ensuring that sensitive information never resides locally and cannot be compromised. This zero-trust architecture supports total personal privacy while meeting stringent compliance standards such as DOD CC SRG IL5, FedRAMP High, CMMC, HIPAA, and the No TikTok on Government Devices Act. Hypori’s platform is trusted by defense, government, healthcare, and other regulated industries to enable secure mobile access, including for contractors and hybrid workforces. It simplifies device management, reduces risk and liability by isolating work and personal data, and eliminates the need for costly second devices. Hypori also mitigates corporate travel risk by securing international access without exposing data to interception or ransomware. The solution is easy to deploy, scalable, and designed to increase BYOD adoption by removing invasive management tools. Employees gain seamless access to enterprise resources from anywhere, with the organization retaining full control over data security.

Description

Zimperium Mobile Threat Defense (MTD) - formerly known as zIPS - is a privacy-first application that provides comprehensive mobile security for enterprises. Zimperium MTD is designed to protect an employee’s corporate-owned or BYO device from advanced persistent threats without sacrificing privacy or personal data. Once deployed on a mobile device, Zimperium MTD begins protecting the device against all primary attack vectors, even when the device is not connected to a network. Zimperium reduces risk by analyzing risky apps and jailbreaks on the device before giving access to corporate email and apps. Zimperium MTD provides comprehensive protection for mobile devices. It provides the risk intelligence and forensic data necessary for security administrators to raise their mobile security confidence. As the mobile attack surface expands and evolves, so does Zimperium’s on-device, machine learning-powered detection. Zimperium MTD detects across all four threat categories — device compromises, network attacks, phishing and content, and malicious apps.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
BlackBerry Access
Citrix Endpoint Management
Google Cloud Platform
IBM MaaS360
Ivanti Neurons for MDM
Jamf Now
Microsoft 365
Microsoft Intune
SOTI MobiControl
Samsung Messages
VMware Cloud
Workspace ONE

Integrations

Amazon Web Services (AWS)
BlackBerry Access
Citrix Endpoint Management
Google Cloud Platform
IBM MaaS360
Ivanti Neurons for MDM
Jamf Now
Microsoft 365
Microsoft Intune
SOTI MobiControl
Samsung Messages
VMware Cloud
Workspace ONE

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Hypori

Founded

2012

Country

United States

Website

www.hypori.com

Vendor Details

Company Name

Zimperium

Founded

2010

Country

United States

Website

www.zimperium.com/mtd/

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

Alternatives

Alternatives

Q-scout Reviews

Q-scout

Quokka
Soliton Reviews

Soliton

Soliton Systems