Best CopperheadOS Alternatives in 2024

Find the top alternatives to CopperheadOS currently available. Compare ratings, reviews, pricing, and features of CopperheadOS alternatives in 2024. Slashdot lists the best CopperheadOS alternatives on the market that offer competing products that are similar to CopperheadOS. Sort through CopperheadOS alternatives below to make the best choice for your needs

  • 1
    IBM Security MaaS360 Reviews
    See Software
    Learn More
    Compare Both
    Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM Security® MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights. Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes. Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7. Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
  • 2
    GrapheneOS Reviews
    GrapheneOS, a non-profit open-source project, is a privacy and security-focused mobile OS with Android app compatibility. It is focused on the development and research of privacy and security technology, including significant improvements to sandboxing and exploit mitigations and the permissions model. GrapheneOS, a privacy- and security-focused mobile OS with Android app compatibility, was developed as a non profit open source project. It is focused on the development and research of privacy and security technology, including significant improvements to sandboxing and exploit mitigations, and the permission model. GrapheneOS also creates apps and services that are focused on security and privacy. Vanadium is a modified version of the Chromium browser, and WebView that was specifically designed for GrapheneOS. GrapheneOS includes our minimally secure PDF Viewer, our hardware-based Auditor App / attestation Service that provides remote and local verification of devices.
  • 3
    Android Reviews
    We're expanding our security measures and finding new ways for you to stay connected this summer. These are the most recent features for your Android phone. You can enjoy new and useful experiences across all devices connected to your Android smartphone. Your one-stop shop for all your favorite entertainment. Everything from movies and TV shows to books and games. Android 11 is optimized to suit your use of your phone. This app will help you manage your conversations. You can also organize your day. You can do more with tools that will help you. Meet Android users who are changing the world through Android. Read stories about creative and driven people who are finding ways to make their world more vibrant and connected. With Android at their side. There are many options for work, gaming and 5G streaming. Android is available on over 24,000 smartphones and tablets. No matter what you are looking for, there is an Android device for you. We are committed to protecting your privacy and security.
  • 4
    Webroot Mobile Security Reviews
    Mobile malware continues to increase exponentially on Android™. Webroot classifies millions of apps each year as malicious or suspicious every year. iOS attacks are also on the rise. Hackers are putting more effort into compromising mobile devices because they have more transactions, banking, browsing, and shopping happening on them. It is crucial to protect them. Secure mobile web browsing protects you against phishing attacks and other social engineering tactics that aim to seize your personal data. Android antivirus automatically scans and checks all updates and applications for threats. It's simple-to-use and powerful internet security for your iPhone®, which won't slow down your browsing speed. Protects personal information from being stolen by malicious websites using Webroot and Safari®. You can browse worry-free with machine learning and Artificial Intelligence backed by 20 years of historical data.
  • 5
    Trellix Mobile Security Reviews
    Trellix Mobile is a cloud-based mobile security solution that relies on traffic tunneling or app sandboxing to protect mobile devices. It sits directly on mobile phones and provides protection regardless of how they are connected, whether via a corporate network, public acces point, cellular carrier or offline. Machine learning algorithms analyze the behavior of mobile devices to identify indicators of compromise and accurately identify advanced network-based, device, and application attacks. You can extend visibility and control over mobile devices from one console, managing OS-based servers, containers, containers and embedded IoT devices. Employees can use their own devices. This allows them to be human and does not compromise the user experience. Trellix Mobile protects Android and iOS devices, such as iPhones and iPads.
  • 6
    AppSuit Reviews
    AppSuit Premium protects your app from hacking attacks by using anti-tampering and app obfuscation technologies. It has been tested for safety by several Korean financial institutions and other companies. Beta testing of new devices/OSs prior to release. Continuous updates to combat evolving cyber threats. Rapid and accurate technical support and maintenance. After AppSuit plug in (library) installation, gradle configuration in the client’s app development environment, the client application is built (archived). After AppSuit is uploaded/downloaded to the build system, it automatically applies AppSuit to the client APK/IPA. AppSuit must be applied to the client APK/IPA using the web service form. Numerous times deemed the best quality product in the POC/BMT evaluations by large corporations and financial firms.
  • 7
    Comodo Mobile Device Security Reviews
    The most advanced mobile security technology for Android and iOS. High-performance malware engine, VPN and ID protection, safe browsing and AppLock features allow you to keep your data and apps safe. Comodo's mobile antivirus app offers complete protection against all types of malware, including trojans and worms, ransomwares, cryptowares, spyware, and adware. Our advanced security app integrates with real-time virus signature to identify new threats and block them immediately to protect your mobile device. To prevent further damage, you will be notified when sensitive data is being circulated on the dark web. This safe Wi-Fi feature can be activated to be notified when your Wi-Fi network is insecure or under attack. Block phishing and malware domains, botnets, malicious sites, botnets and other web-borne attacks. To protect your privacy, mask your IP address and encrypt your mobile connection.
  • 8
    SlashNext Reviews
    SlashNext anti-phishing solutions and IR solutions prevent threats across mobile, email and web--dramatically reducing risk of data theft, cyber extortion and breaches. A lightweight, cloud-powered agent protects iOS and Android users against mobile-centric phishing threats. Cloud-powered browser extensions are available for all major desktop browsers to protect employees from live phishing sites. Live threat intelligence can be used to transform network security controls into a multi-vector, real-time phishing defense. Automate phishing incident response, threat hunting, and accurate, run-time analysis on-demand of suspicious URLs.
  • 9
    Symantec Endpoint Protection Mobile Reviews
    Threat defense tools that combine vulnerability management, anomaly detection and behavioral profiling to protect mobile devices and their applications from advanced threats. Mobile devices are not just small computers that are connected to the Internet constantly. These devices require new methods to ensure data processing is secure and productive. Symantec created Mobile Threat Defense, a risk-based mobile security strategy, from the ground up to protect against all threats that could expose, steal, or manipulate business data. It also respects users' privacy, productivity, as well as their desire for a great mobile experience. You can detect the most threats using both in-cloud and on-device machine learning elements. Real-time detection and protection at scale.
  • 10
    Trend Micro Mobile Security Reviews
    No matter where you are or what you do, you can be safe. Get advanced security and privacy. Protect your mobile life with powerful protection. Improve performance. Optimize your mobile devices to make them more efficient. Avoid fraud and online scams. Flag malicious phishing emails. Trust experience. Mobile solutions based on almost 30 years of security experience give you peace of mind. To stop threats, you can rely on the cloud-based Smart Protection Network™ or mobile app reputation technology to prevent them from reaching you. You can surf anywhere, and mobile apps will not load dangerous or risky websites. Protects your device from malicious apps, ransomware and unsafe Wi-Fi networks. Optimize your mobile phone for peak performance.
  • 11
    Certo Mobile Security Reviews
    Certo Mobile Security is brought you by Certo Software, a leading mobile security company. Our products are backed by years of cyber security experience. They have helped millions of people secure their devices and provide peace of mind. Our all-in-one security software helps you protect your device. It analyzes your device's configuration and scans your WiFi network for threats. Then it guides you through setting up your iOS device to make it more secure. Verifies that your device is running the latest software version. Also, checks whether your device is protected against unauthorized access. This tool will help you stay safe online. It will analyze your network for signs such as unauthorized monitoring, vulnerability to routers, and other threats. This checklist provides actionable security tips to protect your personal data. It also includes a checklist that allows you to keep track all completed actions. Security health check and security & privacy checklist.
  • 12
    iVerify Reviews

    iVerify

    iVerify

    $3 per user per month
    1 Rating
    iVerify is your personal safety toolkit. iVerify allows you to manage your iOS device's security and detect any modifications to your phone. Using iVerify is easy to manage your online security and accounts. It also includes simple instructions. Secure your mobile devices for your team to avoid potential vulnerabilities. Metrics let you see the completion of security guides, the most recent OS, signs and compromises, and much more. {Built by the leaders in security research at Trail of Bits, iVerify helps you keep your devices and online accounts secure from vulnerabilities.|iVerify is a security tool that Trail of Bits has developed to help you protect your online accounts and devices from potential vulnerabilities.} {iVerify detects compromise by monitoring for signs that iOS's security has been degraded by an exploit and by checking for known bad files and folders.|iVerify detects any signs that iOS's security is being compromised by looking for exploits and checking for known bad files or folders.} Although it can detect most cases of compromise, it cannot detect all. {It's still important to limit your exposure to attacks and limit the sensitive data available on your phone and online accounts.|It is important to limit
  • 13
    Cubed Mobile Reviews
    It's easy to get mobile security from start to finish. In just two steps, you can get the protection your business needs. Cubed Mobile eliminates the need for additional devices and/or SIMs from employees while creating a secure separation between personal workspaces and business workspaces. Securely keep sensitive data safe and secure. Secure Wi-Fi networks should only be used by employees. Your team should be empowered to secure the Internet. Protect your network, apps, privilege abuse, advanced attacks, and more A new approach to managing BYOD is easy to set up and can be used to improve security, communication coordination, and management. You can create workspaces with different settings, apps, or access rights based on user parameters. Your admins can invite and remove users, edit personal information, settings, virtual lines, and filter devices. Remote backup, restore, or wipe entire workspaces in an instant.
  • 14
    V-OS Virtual Secure Element Reviews
    V-OS, V-Key's core patent technology, is a virtual secure element. It is a secure sandbox embedded in a native iOS and Android mobile app. It creates a safe operating system where data can safely be stored and cryptographic processes can take place in isolation from the rest. This video introduces and explains V-OS, the core technology of our technology. V-OS is the security foundation for your mobile application. This allows you to create a wide variety of solutions that are customized to your business's needs. Layered tamper detection with response mechanisms. Patented cryptographic virtual computer. FIPS 140-2 Level 1 & Common Criteria EAL3+. Reduces total ownership costs. Easy over-the-air deployment allows for faster market penetration. Flexible and extensible SDK framework. Eliminate costly hardware dependence
  • 15
    Pradeo Reviews
    The digital transformation has created a mobile-first and cloud-first world. This has greatly increased the amount of mobile data that can be transferred between mobile devices, apps, servers, and other mobile devices. Companies digitalizing their services and frameworks has led to corporate and personal data being easily accessed by mobile devices. This exposes them to a whole new set of threats, including data theft, malware, network exploit, and device manipulation. A mobile fleet is a direct link to an organization's information system, regardless of whether it's made up of corporate devices or BYOD. The proliferation of mobile devices in all industries (government, banking and health) increases the risk of sensitive corporate data being stolen or leaked. IT security departments often refuse to manage personal devices in the corporate environment, but grant them access to corporate mobile services. This is to preserve privacy, financial security, and flexibility.
  • 16
    Harmony Mobile Reviews
    Your business is more vulnerable than ever to data breaches in the new normal. Employees are now able to access corporate data via their smartphones. Harmony Mobile provides complete protection for your mobile workforce. It is easy to deploy, manage, and scale. Protecting corporate data from mobile attacks: apps, networks, and OS. Secure and scalable for all types of mobile workforce. Rapid user adoption with no impact on privacy or user experience. By detecting and blocking malicious apps in real time, employees are protected from malware infiltration. Harmony Mobile extends Check Point's industry-leading network protection technologies to mobile devices. This gives you a wide range of network security capabilities. Devices are protected from compromise by real-time risk assessments that detect vulnerabilities, configuration changes and attacks. Advanced rooting and jailbreaking can also be performed.
  • 17
    NowSecure Reviews
    Automate privacy and security testing for mobile apps that you create and use from one portal. You can test pre-prod or published iOS/Android binaries and monitor the apps that power your workforce with NowSecure Platform. Automated security and privacy testing of mobile binaries to scale Agile and DevOps software development. To ensure that your apps are in production, you can build bridges between dev, security and GRC teams. Modern testing processes can be streamlined. The NowSecure Platform was designed to meet the complex needs of modern mobile SDLC. It provides security and privacy testing solutions that are continuous, customizable, accurate, and reliable. Accurate results allow for maximum visibility across all teams.
  • 18
    BlackBerry Protect Reviews
    AI detects and stops attacks before they can be executed, preventing users opening URLs or visiting spoofing webpages that look like legitimate websites. It detects, prevents, and then remediates advanced malicious threats at both the device and application level. Application sandboxing, code analysis, and app-security testing are used to identify grayware and malware. Before being pushed to the device, or the user who is seeking access, all applications are scanned and validated. BlackBerry UEM protects all mobile endpoints. End users do not need to install, log into or maintain third-party applications or manually configure settings. Select a single-point connectivity solution. Download once and distribute locally. Hybrid deployment allows for security-related communication between cloud and local infrastructure, without exposing your network.
  • 19
    Sophos Intercept X for Mobile Reviews
    Intercept X Mobile protects users, their mobile devices, and corporate data against known and unknown mobile threats. It leverages our market-leading Intercept X deep-learning engine. All of this is managed seamlessly by Sophos Central. Sophos Intercept X for Mobile continuously monitors the health of your device and alerts you if it is compromised. You can then take remediating action or revoke access for corporate resources. Device security advisors can detect rooting or jailbreaking and inform both the administrator and the user of any operating system updates. Set up a first line defense at the mobile network layer on iOS and Android. In real-time, network connections are checked for suspicious characteristics that could indicate an attack. This helps to reduce the risk of Man-in-the-Middle attacks (MitM). Web filtering and URL testing stop mobile devices from accessing known bad sites.
  • 20
    Corrata Reviews
    Mobile threat defense is more powerful, more sensitive to employee privacy, and easier to deploy than other solutions. Corrata operates quietly in the background, looking for signs of malware infection and quarantining any compromised devices. Our traffic inspection technology ensures that even the most sophisticated malware cannot hide behind our unique traffic inspection technology. Mobile phishing attacks account for 85% of all phishing attacks. Corrata monitors all incoming messages via SMS, WhatsApp, and other channels and scans them for phishing attempts and blocks malicious links. Corrata constantly checks the configuration of devices. If necessary, Corrata alerts employees to update operating system software or remove harmful applications. Poorly configured tablets and phones are not allowed to access business applications because of conditional access policies.
  • 21
    Webroot Internet Security Complete Reviews
    Antivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. While antivirus protects your devices and VPN protects your connection by keeping you browsing private, both work together to provide you with security and privacy while you work, share, bank, browse, and bank. Webroot protects usernames, account numbers, and other personal information from online threats. Our cloud-based protection keeps your family and you safe every time you connect. Webroot is the most efficient, lightweight and cost-effective antivirus product on the market. You can stay safe at home and on the move. Access your files on your mobile device securely and easily. Privacy protection and system maintenance tool that erases all past online activity to protect privacy.
  • 22
    Zimperium Mobile Threat Defense (MTD) Reviews
    Zimperium Mobile Threat Defense (MTD) - formerly known as zIPS - is a privacy-first application that provides comprehensive mobile security for enterprises. Zimperium MTD is designed to protect an employee’s corporate-owned or BYO device from advanced persistent threats without sacrificing privacy or personal data. Once deployed on a mobile device, Zimperium MTD begins protecting the device against all primary attack vectors, even when the device is not connected to a network. Zimperium reduces risk by analyzing risky apps and jailbreaks on the device before giving access to corporate email and apps. Zimperium MTD provides comprehensive protection for mobile devices. It provides the risk intelligence and forensic data necessary for security administrators to raise their mobile security confidence. As the mobile attack surface expands and evolves, so does Zimperium’s on-device, machine learning-powered detection. Zimperium MTD detects across all four threat categories — device compromises, network attacks, phishing and content, and malicious apps.
  • 23
    MYAndroid Protection Reviews
    It is impossible for you to use your personal judgment to determine which apps are malicious or not. Our technology provides malware protection, privacy control and backup & recovery, protection against theft & loss, credit card & identity theft protection. MYAndroid protection combines an intuitive graphical interface with award winning, business-strength technology and preconfigured settings. This makes it easy to get started and keeps your security high. Many apps are infected with malware. These apps can steal your personal information, wipe your data, and increase your bill by calling and texting Premium rate numbers. Spyware apps can track you, read your mail, and more. Check your Android smartphone for malicious software.
  • 24
    Promon INSIGHT Reviews
    Monitor and detect mobile threats to take back control of your apps. Promon INSIGHT™, a secure monitoring and detection tool, allows you to quickly respond to unknown and known threats. Data reporting is used to collect reports about the app's environment and any threats to its security. Promon INSIGHT™, allows you to respond quickly to emerging threats. Hackers who are performing targeted attacks will not even know they have been detected by the ability to silently send information back to servers. Know your apps security status and the environment in which they are executed. Promon INSIGHT™, a secure reporting platform, is trusted. Other reporting technologies are easy to manipulate, making them less trustworthy. Promon INSIGHT™, which uses detailed, in-depth monitoring to monitor the app and OS environment, is a way to do things that are impossible with standard APIs. It can detect anomalies that are not covered by other reporting solutions.
  • 25
    Malwarelytics Reviews
    Protect your app users against mobile malware and other threats to their devices. Find out what malware is currently running on your users' devices and which users have insecure devices. Then, help them to fix the problem configuration as soon as you notice it. Mobile malware and cyber attackers have become extremely sophisticated. They are constantly looking for new ways of hacking your mobile apps and causing damage. They can steal personal data and even money by stealing your users' money or using mobile operating system features to gain an advantage. These are the most serious consequences. Your business reputation is at risk! Malwarelytics®, which prevents the most common threats mobile apps face these days, helps your company stay compliant and safe. Jailbreaking or rooting a device on the mobile operating system disables security features and opens it up to attackers.
  • 26
    DexProtector Reviews
    Instant protection for iOS apps and Android apps against static and dynamic attacks With over ten million installations, DexProtector is a global leader in app defense and SDK protection. DexProtector is unique in its approach to protecting your apps. The native engine for Runtime Application Self Protection (RASP), works at the system level within the app. It then interacts directly with OS components. This allows it to control key processes and protect the most sensitive parts your libraries and apps. DexProtector creates layers of protection that stack on top of each other, protecting your code and assets. This protects your apps from real-time attacks and hardens them. One-click integration with your CI/CD. No coding required. Your apps and the communication channel with servers are protected. Secures your app from the operating system. Protects your app from both static and dynamic attacks
  • 27
    Lookout Reviews
    Our mission is to empower productivity in a privacy-focused environment where work and play can occur anywhere. It's vital that cybersecurity is with you everywhere you go. This includes protecting your data from the point of origin to the cloud. As most people now work and manage their lives online, mobility and cloud technology are essential. Lookout solutions are customizable for any industry or company size. They integrate endpoint and cloud security technologies. This platform can be used by individuals, large corporations, and government agencies. Cloud access does not have to be limited to certain services. Security should not interrupt productivity or interfere with the user's experience. We provide visibility and insight into all data, enabling you to secure your data.
  • 28
    Sailfish OS Reviews

    Sailfish OS

    Jolla

    €29.90 one-time payment
    1 Rating
    Sailfish OS, a European alternative to dominant mobile operating systems is the only mobile OS that offers a unique licensing model for local implementations. Sailfish OS has been on the market since 2013, and is now in its fourth generation. It offers a secure platform to trust mobile solutions. Sailfish OS can run Android™, as well as other apps, with our dedicated App Support solution. Sailfish OS is a mobile operating system that is secure and can be used on smartphones and tablets. It can also be easily adapted to various embedded devices and use cases. Sailfish 4, the fourth generation, offers a wide range of new enablers that can be used to support different ecosystem projects. Sailfish OS offers a variety of security functions that are specifically designed for government and corporate environments. Sailfish 4 users data is encrypted and apps protected by Firejail Sandboxing
  • 29
    BETTER Mobile Reviews

    BETTER Mobile

    Better Mobile Security

    BETTER Mobile Threat Defense protects your mobile devices against attacks and threats. It is simple, cost-effective, and powerful. Endpoint protection with a lightweight mobile agent. It can be deployed via EMM in just minutes. The simplified admin console provides immediate visibility, intelligence, and control over threats and risks to devices. Although the console offers rich information and simple policy management, our goal is to make it as easy as possible for you to not ever use it. We have created one of the most advanced machine-learning platforms and focused it on mobile threat identification. BETTER MTD is highly accurate in detecting risky apps, abnormal behavior, and threats to networks thanks to our global mobile sensor network.
  • 30
    Webroot Internet Security Plus Reviews
    Antivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. Both antivirus protect your devices and VPN protect your connection by keeping you browsing private. They both work together to provide you with security and privacy while you work, bank, share, bank, and browse the internet. Webroot SecureAnywhere®, Internet Security Plus offers cloud-based protection against online threats for all of your devices, keeping you safe no matter where or how you connect. It scans faster and uses less system resources. It protects you in real-time by instantly identifying new threats and blocking them as soon as they occur.
  • 31
    LineageOS Reviews
    LineageOS is a global open-source community that extends the functionality of mobile devices made by more than 20 manufacturers. Your data, your rules. Privacy Guard is a powerful tool that allows you to control what your apps can do whenever and wherever you want. We take security very seriously. That's why we send security updates every month for all supported devices. To make your device even more secure, you can lock it behind an enhanced lock screen. Our open-source apps will help you get through your day. Android developers can turn any device into the ideal device for app development with enhanced tools and exclusive APIs. LineageOS is an open-source Android distribution that is available for many devices. More are being added daily thanks to the largest, yet most active, Android open-source community.
  • 32
    Traced Control Reviews

    Traced Control

    Traced

    £9/device/year
    Traced Control is a mobile threat defense system that provides you with a real-time view and analysis of mobile threats. Every mobile device, whether personal or business-owned, is a gateway to your network and a route to business data. The Traced app provides protection for your mobile devices, and the Control MTD gives IT and security teams the tools to protect your business. Traced protects employees' devices from network- and application-based threats, including malware, phishing and unauthorised screen, microphone, camera, and microphone access, as well as permissions abuse, and exploits. The Traced Deep Learning engine can detect both known and unknown malicious applications and provide you with critical information for your analysis, investigation, and response. WiFi protection alerts both in Control and the device when a user connects with a compromised or unsecure WiFi network.
  • 33
    AdaptiveMobile Security Reviews
    Security and business intelligence services are enabled by continuous supervised machine learning and security expertise that provides managed threat detection, response and analysis. Monitoring and assessment of suspicious activity in our global deployments on every continent, 24 hours per day, every day. Our security and mobile skills are the foundation of our capabilities. They ensure the security of mobile services in the future. Continuous real-time security enforcement using distributed artificial intelligence (DAI) and machine learning policy decision engines. All subscribers can enjoy frictionless security against attack. Industry-first collaboration and research has enabled advanced threat detection and mitigation methods. First to market in the telecoms sector for innovative security defenses, threat detection and managed cyber & telecommunication security offerings.
  • 34
    SEAP Reviews

    SEAP

    XTN Cognitive Security

    SEAP®, for Mobile is an SDK that is integrated into the customer’s app and does not require any special permission. SEAP®, for Web, is JavaScript-based and executed in the web browser environment. It does not require any agent installation. SEAP®, detects malware activity in both web and mobile apps. Some examples of the malware threats monitored include man-in-the-browser and man-in-the-app-attacks, RAT, web injections, overlay attacks, SMS grabbing, memory tampering, and Injection attacks. SEAP®, which detects and reports technological threats to the device, such as jailbreaking, rooting, reverse engineering, binary tampering and repacking. The dedicated RASP APIs can be used to activate countermeasures for some of these conditions. SEAP®, which relies on behavioral biometrics and device identity authentication, detects fraudulent activity that attempts to take control of user accounts.
  • 35
    V-OS Mobile App Protection Reviews
    V-OS Mobile App Protection can detect and protect mobile apps from threats such as reverse-engineering and hooking, tampering and app integrity checks. It also validates library signatures and code injection. Apps integrated with V-OS Mobile Application Protection can detect and root the phone in an insecure OS environment. This allows the mobile app to function smoothly and without compromising its integrity or confidentiality. It also prevents the app from leaking sensitive information. V-OS Mobile App Protection is built on V-Key's patent V-OS Virtual secure element, which acts as the security foundation. It adds additional security enhancements and tamper protection. V-OS Mobile App Protection was designed to provide both security and convenience for enterprise end-users. True cybersecurity should combine multiple protection methods.
  • 36
    zDefend Reviews
    Zimperium’s zDefend enables mobile apps to detect and protect themselves proactively against runtime threats and attacks. With this runtime protection capability, mobile apps can assess device risk posture in real-time and dynamically prevent access or disable high-risk functionality to minimize fraud and theft attempts on end-user devices proactively. The security policy and associated mitigations reside in-app allowing the actions can be taken even in the absence of any network connectivity, making the protections extremely difficult to circumvent. The ability to detect threats and attacks on-device across the install base provides Security Operations (SOC) teams with real-time threat telemetry. Detailed threat forensics help isolate and automate downstream mitigation activities across other enterprise. In-app security policies are set and managed centrally via the console but are communicated in real-time to the entire install base without needing to publish a new version. This practical and scalable approach allows Enterprises to react promptly to new threats and vulnerabilities discovered. Zimperium’s unique approach to runtime defense also protects against advanced on-device compromise and exploitation techniques.
  • 37
    GlobalProtect Reviews
    Modern workers are more mobile than ever. They can access the network from anywhere, on any device, at anytime. Advanced threats can't be stopped by endpoint antivirus and VPN technologies. GlobalProtect subscriptions allow you to extend next-generation firewall capabilities. This will give you greater visibility into all traffic and users, devices, applications, and devices. GlobalProtect allows organizations to extend consistent security policies across all users. It also eliminates remote access blindspots, strengthens security, and can be used to create security policies for all users. GlobalProtect protects your mobile workforce using the capabilities of your Next-Generation Firewall. It inspects all traffic, incoming and outgoing. To ensure transparent access to sensitive data, enable an IPsec/SSL VPN connection between multiple endpoints and operating system. Quarantine compromised devices with immutable properties on internal and externe networks.
  • 38
    PilarOS Reviews
    Secure, managed and enhanced Android Mobile OS. PilarOS, AKA TRDROIDTM is ARDIC’s industrial Android distro. It has an extended security and manageability framework, over 1800 new API’s, and was built on AndroidTM Open Source. AFEX provides OS management. Additional layers provide data security, device, application, connection, and data security. From the kernel to the cloud for secure, manageable and scaleable industrial-grade services. It will not allow any monkey business on your device. Secures connection, applications and USB ports. You can define the configuration you need and then push it to all of your devices. Install/uninstall/disable/force applications on your devices remotely. You can access all your devices from one admin panel. You can monitor, manage and control them all or just one at a time. PilarOS is more than just for smart phones. It can also be used for all purpose smart devices, IoT devices, and industrial IoT devices.
  • 39
    ClearOS Mobile Reviews
    ClearOS Mobile gives individuals control over their digital identity, privacy and security, while also giving them access to the Android apps they need. ClearOS Mobile will eventually work on all major cell phone manufacturers, cellular operators, providers, and operators.
  • 40
    Parrot OS Reviews
    Parrot is a global community of security specialists and developers that works together to create a common framework of tools to make their jobs easier, more reliable, and more secure. Parrot OS, Parrot Security's flagship product, is a GNU/Linux distribution that is based on Debian and designed with Security and Privacy as its primary focus. It provides a portable lab for all types of cyber security operations. This includes reverse engineering, pentesting, digital forensics, and reverse engineering. However, it also contains everything you need to create your own software. It is constantly updated and has many sandboxing and hardening options. You have complete control over everything. You can download the system, share it with anyone, and even read the source code. You can also make any changes you wish. This system was created to respect your freedom and will continue to be so.
  • 41
    Havoc-OS Reviews
    Havoc-OS, an after-market firmware that is based on Android Open Source Project and inspired by Google Pixel, has a refined Material Design user interface. We offer a stable and smooth experience for your device, with a selection of amazing features to provide an exceptional experience. Our ROM is compatible with over 150+ devices from 20+ OEMs. Generic System Images are available to try our ROMs even if the device you're using is not currently supported. Our device list is constantly growing, with more devices being added each month.
  • 42
    fydeOS Reviews
    FydeOS, a lightweight operating system that uses a Linux kernel + browser platform + a container technology driver, is very similar to Google Chrome OS. FydeOS runs smoothly on all mainstream hardware. FydeOS-compatible hardware devices can support the latest web applications standards. They are compatible with Android programs and Linux environments. FydeOS can also be used in China's network environments without any restrictions, giving users a Google Chromebook-like experience. FydeOS is built on the second version of The Chromium Projects. We modified and optimized the kernel to make it more compatible with the most popular browser platform. We also added more localization enhancements to better suit the needs of Chinese users and improve the user experience. The cloud technology operating system is fully compatible with the Internet age. After years of technology accumulation, we are able to make FydeOS work on more hardware devices and provide an overall solution for FydeOS.
  • 43
    Vampire OS Reviews
    Vampire OS is an alternative to Windows and macOS that makes your computer more powerful, faster, safer, and more privacy-respecting. Privacy is a fundamental human rights. Vampire OS does not collect personal data so that advertisers and governments cannot spy on your activities. Vampire OS is Open Source. Anyone can inspect its source code to verify its privacy. You can use RAM or hard disk to experience amazing animations at lightspeed. Vampire OS comes with more than five advanced security tools. Users can also adjust their security level using vampire tools, from low secure mode to high secure. Vampire Connect integrates into Vampire OS desktop to combine the experience between your computer, Android device, and the Vampire OS desktop. It works over an encrypted connection on the local network so that your data remains private and never reaches cloud.
  • 44
    Wear OS Reviews
    You can check your calendar, see your next meeting, get directions and even pay using your watch. Smart ways to text, email, and see who's calling you, allow you to stay in the present. You can exercise without your phone. Google Fit and other health apps make a great way to stay motivated, stay balanced, and track your health all from your wrist. You can stream or download your favorite music from your wrist, so you can stay motivated right down to the last mile. Wear OS by Google allows you to be you in hundreds of styles, from fashion to fitness to fun - all from your favorite brands. Wear OS by Google is compatible with the latest Android version (except Go edition and phones that do not have Google Play Store). Compatibility may change between countries and platforms.
  • 45
    PixelExperience Reviews
    PixelExperience ROM is based on AOSP and includes all Google apps, as well as all Pixel goodies, including launcher, wallpapers (including Google's own), icons, fonts and bootanimation. Our mission is to provide the maximum stability and security along with essential features and useful functions for the proper operation of the device.
  • 46
    Fire OS Reviews
    Fire OS is Amazon's operating system for tablets and Fire TV. Fire OS is a fork Android. This means that if your app runs on Android it will most likely also run on Amazon Fire devices. The App Testing Service allows you to quickly test your app's compatibility for Amazon. You don't have to modify your Android code to publish your app to Amazon's platform as a developer.
  • 47
    Amazon Linux 2 Reviews
    Use high-performance Linux to run all your cloud-based and enterprise applications. Amazon Linux 2 is an operating system for Linux from Amazon Web Services. It provides a stable, high-performance, security-focused execution environment for developing and running cloud applications. Amazon Linux 2 comes at no extra cost. AWS provides Amazon Linux 2 with ongoing security and maintenance updates. Amazon Linux 2 is optimized for performance and includes support for the latest Amazon EC2 capabilities. It includes packages to ease integration with AWS Services. Amazon Linux 2 provides long-term support. Developers, IT administrators and ISVs can enjoy the predictability and stability that comes with a Long-Term Support (LTS), but still have access to the most recent versions of popular software.
  • 48
    ChromeOS Flex Reviews
    ChromeOS for Macs and PCs is fast, secure, and cloud-first. ChromeOS Flex is a cost-effective and sustainable way to upgrade devices you already have. It's easy for you to deploy it across your fleet. Or, simply test it to see what a cloud first OS has to offer. ChromeOS Flex can be installed on your Macs and PCs to ensure that they are secure, fast, stable, and up-to-date in the background. It can also be managed from the cloud. Devices are able to boot quickly, do not slow down, and can update in the background. This reduces device downtime. Access VDI and web applications quickly and easily with a clutter-free, intuitive, and reliable experience. You can deploy ChromeOS Flex across your fleet using USB or network deployment. Users' settings and policies will sync to the device almost immediately. Remotely manage updates and set device policies using the Google Admin console. Antivirus software is unnecessary if blocked executables are disabled and sandboxing technology is enabled.
  • 49
    Proofpoint Mobile Defense Reviews
    The threat of malicious Wi-Fi hotspots is increasing, as are the millions of apps that employees have installed on their devices. These apps may contain malware or "riskware", which are apps that do not appear malicious, but display behavior that puts enterprise data in danger. Businesses are facing growing threats from malicious WiFi hotspots, and millions of apps installed on employee-owned mobile devices. These apps may contain malware or "riskware", which are apps that do not appear malicious, but display behavior that puts enterprise data in danger. These threats expose enterprise users' data leakage, credential stealing, and the exfiltration private information which can be used in advanced attacks to target specific employees. Enterprise users access Wi-Fi hotspots casually and grant these riskware apps broad permissions. They don't realize that their corporate and personal data can be sent to remote servers or advertising networks around the world.
  • 50
    MidnightBSD Reviews
    It includes all the software that you would expect to use for daily tasks, such as email, web browsing and word processing. MidnightBSD is a small group of dedicated developers who strive to make an operating system that everyone can use freely. Available for x86 and AMD64 as well as Virtual Machines. Although the FreeBSD project has created a reliable server operating system, it is often not usable or performant on the desktop. Desktop users should be able to customize scheduling, allocation of resources and security settings. Many of the BSD projects can be used on older hardware or servers. Some distributions of FreeBSD have a nice graphical user interface but suffer from a server-centric design underneath the hood. We didn't fork FreeBSD out of spite, but rather to provide a good starting point.