Best Mobile Threat Defense Software in Asia

Find and compare the best Mobile Threat Defense software in Asia in 2026

Use the comparison tool below to compare the top Mobile Threat Defense software in Asia on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    ESET PROTECT Advanced Reviews

    ESET PROTECT Advanced

    ESET

    $275/month/5 devices
    2,263 Ratings
    See Software
    Learn More
    ESET Protect Advanced offers a comprehensive cybersecurity solution for businesses of any size. It offers advanced endpoint security against ransomware and zero-day threats. It also includes full disk encryption to ensure legal compliance and data security. The solution uses adaptive scanning, cloud sandboxing and behavioral analysis for proactive cloud-based threats defense. Mobile threat protection secures Android and iOS with anti-malware and anti-theft. It also offers cloud app security, mail server protection, vulnerability and patch management, and cloud app protection. Multi-factor authentication and extended detection and reaction (XDR) improve threat detection and response. The solution provides a single pane of glass remote management to provide visibility into threats and users. It also offers advanced reporting and customized notifications.
  • 2
    IBM MaaS360 Reviews

    IBM MaaS360

    IBM

    $5/device and $10/user/month
    1 Rating
    Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights. Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes. Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7. Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
  • 3
    Lookout Reviews
    Our goal is to enhance and protect productivity in a world that prioritizes privacy, allowing work and leisure to take place in any location. As everything transitions to the cloud, it is vital that cybersecurity moves with you, safeguarding your information from the endpoint to the cloud environment. The importance of mobility and cloud technology cannot be overstated, as many of us now navigate our professional and personal lives through digital means. Lookout’s solutions offer a platform that merges endpoint and cloud security technologies, customizable for any industry and suitable for a range of organizations, from solo users to expansive global firms and government entities. Cloud access can be managed flexibly, ensuring that security measures do not hinder productivity or diminish user experience. By providing comprehensive visibility and insights, we empower you to protect your data through precise access controls while delivering a smooth and effective user experience. Ultimately, our commitment is to ensure that security and productivity coexist harmoniously in your daily activities.
  • 4
    Trend Micro Mobile Security Reviews
    Prioritize your safety wherever you are and in everything you engage in. Experience top-notch security and privacy measures as you navigate your mobile life with robust protection across all of your devices. Enhance your device's capabilities by utilizing optimization tools designed to boost performance. Steer clear of online scams and fraudulent activities by identifying harmful phishing emails and deceitful websites. Benefit from the assurance that comes with nearly 30 years of security expertise, providing you with peace of mind through reliable mobile solutions. Counter threats effectively by leveraging the cloud-based Smart Protection Network™ alongside mobile app reputation technology, which intercepts dangers before they can affect you. Browse freely while safeguarding yourself from malicious applications, ransomware, perilous websites, insecure Wi-Fi networks, and unauthorized access to your device. Additionally, ensure that your mobile phone remains at its best performance by optimizing its functionality regularly. Embrace a safer mobile experience that empowers you to explore the digital world with confidence and security.
  • 5
    MYAndroid Protection Reviews
    It's challenging for individuals to rely on personal judgment to determine which applications may have harmful intentions. Our innovative technology provides robust features such as malware defense, privacy management, data backup and recovery, theft protection, and safeguards against credit card and identity fraud. MYAndroid Protection combines a user-friendly graphical interface with industry-leading technology and pre-set configurations, ensuring that users can easily initiate the setup process while maintaining a high level of security. Numerous applications have been identified as containing hidden malware, which poses serious risks by potentially stealing personal information, erasing data, or incurring unexpected charges through premium rate communications without the user’s consent. Additionally, spyware applications have the capability to monitor your location, access your email, and perform other intrusive actions. To ensure the safety of your smartphone, it is essential to scan your Android device and verify that it is free from malicious software, maintaining its integrity and security over time. Regularly updating your security measures is crucial in combating evolving threats in the digital landscape.
  • 6
    V-OS Virtual Secure Element Reviews
    V-OS represents the fundamental patented technology developed by V-Key, functioning as a virtual secure element. This technology acts as a secure sandbox integrated within a native mobile application for iOS or Android, establishing a protected environment for storing data and executing cryptographic operations separately from the main application. In this presentation, we will provide an overview and a detailed explanation of the essence of our V-OS technology. By leveraging V-OS as the security backbone of your mobile application, your organization can create a diverse array of solutions that are secure, reliable, scalable, and tailored to your specific business requirements. Additionally, V-OS features advanced tamper detection and responsive mechanisms, a patented cryptographic virtual machine, and compliance with standards such as FIPS 140-2 Level 1 and Common Criteria EAL3+. This technology significantly reduces total ownership costs while enabling quicker market entry through seamless over-the-air updates. Moreover, it offers a flexible and extensible SDK framework, allowing businesses to eliminate the burdensome reliance on expensive hardware. Ultimately, V-OS empowers organizations to innovate confidently and securely in the digital landscape.
  • 7
    Jamf Executive Threat Protection Reviews
    More than ever, users rely on mobile devices to access vital company and personal information. To safeguard this sensitive data from increasingly advanced threats, Jamf Executive Threat Protection offers robust security solutions. For individuals who demand the utmost in security, advanced detection and response capabilities are essential, delivering insights into complex attacks that Apple's Lockdown Mode seeks to mitigate. Jamf ensures this level of security by verifying device integrity and assessing potential compromises while maintaining user privacy. It goes beyond merely monitoring applications and device management; it swiftly identifies indicators of compromise and enriches the understanding of sophisticated mobile threats. Importantly, it does not gather personal data such as passwords, images, messages, call logs, contacts, or browsing history. As the modern workforce embraces mobile technology, it is crucial to recognize that while mobile offers convenience, it also presents significant vulnerabilities. Therefore, comprehensive mobile security is vital for effective advanced detection and response strategies.
  • 8
    ESET PROTECT Complete Reviews

    ESET PROTECT Complete

    ESET

    $287.72 one-time payment
    ESET PROTECT Complete serves as a holistic cybersecurity solution aimed at securing business endpoints, cloud services, and email infrastructures. It employs cutting-edge measures to defend against ransomware and zero-day vulnerabilities, utilizing cloud sandboxing technology alongside machine learning-enhanced detection methods. Additionally, it offers full disk encryption features that support adherence to data protection laws. The solution extends its robust protections to mobile devices, file servers, and email servers, integrating anti-malware, anti-phishing, and anti-spam functionalities. With its centralized management console hosted in the cloud, organizations can efficiently deploy, monitor, and respond to security threats. Furthermore, it includes essential vulnerability and patch management tools, ensuring that any software weaknesses are swiftly detected and rectified. This comprehensive approach not only fortifies the organization's cybersecurity posture but also simplifies the overall management of security protocols and responses.
  • 9
    ESET PROTECT Elite Reviews

    ESET PROTECT Elite

    ESET

    $275 one-time payment
    ESET PROTECT Elite serves as a top-tier cybersecurity platform designed for enterprises, seamlessly combining extensive detection and response capabilities with a robust multilayered defense system. Utilizing cutting-edge techniques like adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis, it effectively combats zero-day vulnerabilities and ransomware threats. The solution delivers modern endpoint protection for both computers and mobile devices, along with server security that ensures real-time data safety and mobile threat defense. Additionally, it incorporates full disk encryption, which aids organizations in meeting data protection compliance requirements. ESET PROTECT Elite also boasts powerful email security features that encompass anti-phishing, anti-malware, and anti-spam measures, while providing protection for cloud applications such as Microsoft 365 and Google Workspace. Its vulnerability management and patch capabilities automate the identification and remediation of security flaws across all endpoints, fostering a proactive approach to cybersecurity. Overall, ESET PROTECT Elite is a comprehensive solution that addresses the evolving challenges of modern cybersecurity threats.
  • 10
    Cynet All-in-One Cybersecurity Platform Reviews
    Cynet equips MSPs and MSSPs with a fully managed, all-in-one cybersecurity platform that brings together essential security functions in a single, user-friendly solution. By consolidating these capabilities, Cynet simplifies cybersecurity management, reduces complexity, and lowers costs, eliminating the need for multiple vendors and integrations. With multi-layered breach protection, Cynet delivers robust security for endpoints, networks, and SaaS/Cloud environments, ensuring comprehensive defense against evolving threats. Its advanced automation enhances incident response, enabling swift detection, prevention, and resolution. Supported by a 24/7 Security Operations Center (SOC), Cynet’s CyOps team provides continuous monitoring and expert guidance to keep client environments secure. Partnering with Cynet allows you to deliver cutting-edge, proactive cybersecurity services while improving operational efficiency. See how Cynet can redefine your security offerings and empower your clients today.
  • 11
    Pradeo Reviews
    The digital transformation has created a mobile-first and cloud-first world. This has greatly increased the amount of mobile data that can be transferred between mobile devices, apps, servers, and other mobile devices. Companies digitalizing their services and frameworks has led to corporate and personal data being easily accessed by mobile devices. This exposes them to a whole new set of threats, including data theft, malware, network exploit, and device manipulation. A mobile fleet is a direct link to an organization's information system, regardless of whether it's made up of corporate devices or BYOD. The proliferation of mobile devices in all industries (government, banking and health) increases the risk of sensitive corporate data being stolen or leaked. IT security departments often refuse to manage personal devices in the corporate environment, but grant them access to corporate mobile services. This is to preserve privacy, financial security, and flexibility.
  • 12
    Traced Trustd MTD Reviews

    Traced Trustd MTD

    Traced

    £9/device/year
    Traced MTD delivers a groundbreaking MTD (mobile threats defense) for businesses that gives you instant visibility and analysis of mobile threat. Every mobile device, whether it belongs to a business or a person, is a gateway for business data. It also provides a way to connect to your network. Traced Protected MTD and Traced App protects mobile devices, while Traced Trusted MTD provides your IT and Security teams with the tools needed to protect your business. Traced protects employees' devices from application-, network- and devicebased threats, including malware, phishing and rogue WiFi. It also protects against unauthorized screen, microphone and camera access, permission abuse, and device exploits. The Traced Deep Learning Engine detects malicious apps, both known and unknown. It provides you with vital information for analysis, investigation and response. WiFi protection alerts the device as well as Traced Trustd when a user connects a compromised or unsecure WiFi network.
  • 13
    CopperheadOS Reviews
    CopperheadOS is a Secure Android built by a privacy-focused company for encrypted and secure smartphones. Available as privacy-focused and security-focused Google-free Android for the latest Pixel phones. Include a secure phone in your business's mobile security program. CopperheadOS is compatible with the most recent mobile security solutions. CopperheadOS, the most secure Android, is designed to protect against many attack vectors. Mobile devices are easy targets. Copperhead's technical documentation can be viewed. Non-technical, security-oriented user experience. No Google Analytics or tracking analytics. Application isolation and sandboxing. Integrates with the most recent mobile device management software and intrusion detection system mobility software.
  • 14
    Certo Mobile Security Reviews
    Certo Mobile Security is a leading solution developed by Certo Software, a prominent name in the mobile security sector. Drawing from extensive experience in cybersecurity, our offerings have empowered millions to secure their devices and enjoy a sense of safety. The comprehensive security application assists in safeguarding your device by reviewing its settings, scanning your WiFi for potential threats, and providing a step-by-step guide to enhance the security of your iOS device. It also confirms that your device is running the latest software and includes necessary security updates from Apple. Additionally, it assesses your vulnerability to unauthorized access. The app ensures your online safety by scrutinizing your current network for indications of unauthorized surveillance, router weaknesses, and various other risks. It also offers practical security advice for protecting your personal information, complete with a user-friendly checklist to monitor your progress on completed tasks. With features like a security health check and a detailed security and privacy checklist, users can easily stay informed and proactive about their digital safety. This holistic approach to mobile security aims to give users greater control over their personal data and online presence.
  • 15
    V-OS Mobile App Protection Reviews
    The V-OS Mobile App Protection solution is designed to identify and safeguard mobile applications against a wide range of threats, including reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code injection, and debugging among others. Even in an insecure operating system environment where the device may be compromised, applications utilizing V-OS Mobile Application Protection have mechanisms for detecting rooted and jailbroken devices, ensuring that the app can operate effectively while maintaining its integrity and confidentiality, all without jeopardizing its security or exposing sensitive data contained within. Built upon V-Key’s patented V-OS Virtual secure element, this solution provides an additional layer of tamper resistance and security features. The V-OS Mobile App Protection was developed as a flexible option to balance security with user convenience for enterprise users. By integrating a variety of protective techniques, it exemplifies the essence of true cybersecurity, emphasizing the importance of a multifaceted approach to digital safety. Ultimately, the goal is to create a seamless user experience while upholding the highest standards of protection against potential threats.
  • 16
    Cubed Mobile Reviews

    Cubed Mobile

    Cubed Mobile

    Free
    Simplifying end-to-end mobile security is now easier than ever. In just two straightforward steps, you can safeguard your expanding business. With Cubed Mobile, employees can eliminate the need for a second device or SIM card while maintaining a secure distinction between personal and professional environments. This ensures sensitive information remains protected and isolated within a secure framework. Additionally, it guarantees that employees connect exclusively to safe Wi-Fi networks, allowing them to browse the Internet securely. The solution defends against various threats, including network vulnerabilities, app misuse, privilege exploitation, and sophisticated attacks. By adopting this innovative approach, you can enhance security, streamline communication, and facilitate the management of BYOD policies, all of which can be set up in just two minutes! Create customized workspaces featuring distinct settings, applications, and access permissions tailored to individual users. Administrators are empowered to invite or remove users, modify personal information, adjust settings, manage virtual lines, and filter associated device lists. You also have the capability to remotely backup, restore, or wipe entire workspaces instantly, ensuring your business remains agile and responsive to any security needs. This comprehensive solution not only fortifies protection but also promotes a more efficient workflow within your organization.
  • 17
    Comodo Mobile Device Security Reviews
    Experience top-tier mobile security solutions designed for both iOS and Android platforms. Our high-performance malware engine, coupled with VPN capabilities, identity protection, safe browsing, and AppLock functionalities, ensures that your applications and personal data remain secure. Comodo’s mobile antivirus software delivers extensive protection against a variety of malware threats, such as trojans, worms, ransomware, cryptoware, spyware, and adware. With our state-of-the-art security application featuring real-time virus signature updates, new threats are swiftly identified and blocked, safeguarding your mobile device. You will receive notifications if your sensitive information is detected on the dark web, allowing you to take preventive measures against potential breaches. By activating the safe Wi-Fi feature, you will be warned when the network you are connected to is insecure or under threat. Additionally, you can block phishing attempts, malicious domains, botnets, command and control callbacks, and various web-based attacks. Enhance your privacy further by concealing your IP address and encrypting your mobile connection, ensuring that your online activities remain confidential and secure at all times. With these robust features, you can navigate the digital landscape with peace of mind, knowing your mobile device is well-protected against emerging threats.
  • 18
    Workspace ONE Reviews
    Efficiently and securely manage and deliver any application across various devices using Workspace ONE, an intelligent digital workspace platform. This comprehensive solution combines access control, application management, and multi-platform endpoint management into a unified platform, available as both a cloud-based service and an on-premises option. It enhances employee engagement and productivity by providing a tailored experience, allowing immediate access to any application on any device from the very first day. Adopt a single, cloud-driven solution for unified endpoint management that caters to every device and use case, promoting a seamless operational flow. By eliminating silos, organizations can streamline the management of all device and application types, resulting in faster processes with fewer individual solutions while expanding capabilities. Additionally, ensure the security of devices, users, and data through conditional access, automated patch management, and configuration policies, all aimed at establishing a robust Zero Trust security framework. This holistic approach not only fortifies security but also enhances organizational efficiency.
  • 19
    AppSuit Reviews
    AppSuit Premium serves as a comprehensive mobile app security solution, employing advanced app obfuscation and anti-tampering technologies to guard against a range of hacking threats. Its effectiveness has earned the trust of numerous financial institutions and other organizations in Korea, where it has received validation for its safety. The service includes beta testing for new devices and operating systems prior to their official release, ensuring that it stays ahead of emerging cyber threats through regular updates. Clients benefit from prompt and precise technical support and maintenance services as well. The client application's build process begins after the AppSuit plug-in is integrated and the gradle settings are configured within the client’s app development environment. Once uploaded into the build system, AppSuit is automatically applied to the client APK/IPA, which operates as a web service. The requirement of this build system ensures seamless application of AppSuit to the client's files. Furthermore, AppSuit has consistently been recognized as a top-tier product in various evaluations, including POC and BMT assessments conducted by financial firms and major corporations, solidifying its reputation in the market. Over time, its proven reliability continues to attract new clients looking for robust app security solutions.
  • 20
    Ivanti Neurons for Mobile Threat Defense Reviews
    Ivanti Neurons for Mobile Threat Defense offers a cloud-based solution that provides real-time protection against zero-day threats for both corporate and personal devices, safeguarding against various types of attacks including those targeting devices, networks, applications, and phishing attempts, while also automating threat remediation. This system effectively detects and blocks harmful URLs at the moment they are clicked, whether through email, SMS, social media, or other platforms, and promptly alerts users about any content that has been blocked. Integrated within Ivanti Neurons for MDM and Endpoint Manager Mobile clients, it requires no action from the end-users to install or activate, which facilitates complete adoption and empowers administrators to enforce compliance measures that prevent any disabling or removal of the service. Utilizing advanced machine learning, it consistently evaluates device traffic, installed applications, and potential zero-day vulnerabilities, yielding threat-assessment scores, comprehensive analytics, and in-depth reports. Moreover, continuous visibility into applications allows administrators to assess, permit, or restrict apps based on various risk indicators such as behavior patterns, certificates, and network interactions, ensuring a robust defense against evolving threats. With its automated processes and in-depth analytics, organizations can maintain a higher level of security and compliance effortlessly.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB