Best OpenText ZENworks Mobile Workspace Alternatives in 2024
Find the top alternatives to OpenText ZENworks Mobile Workspace currently available. Compare ratings, reviews, pricing, and features of OpenText ZENworks Mobile Workspace alternatives in 2024. Slashdot lists the best OpenText ZENworks Mobile Workspace alternatives on the market that offer competing products that are similar to OpenText ZENworks Mobile Workspace. Sort through OpenText ZENworks Mobile Workspace alternatives below to make the best choice for your needs
-
1
Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights. Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes. Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7. Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
-
2
ManageEngine Endpoint Central
ManageEngine
1,955 RatingsManageEngine's Endpoint Central, formerly Desktop Central, is a Unified Endpoint Management Solution that manages enterprise mobility management, including all features of mobile app management and mobile device management, as well as client management for a wide range of endpoints such as mobile devices, laptops computers, tablets, servers, and other machines. ManageEngine Endpoint Central allows users to automate their desktop management tasks such as installing software, patching, managing IT assets, imaging, and deploying OS. -
3
DriveStrike
DriveStrike
2 RatingsDriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected. -
4
Venn
27 RatingsVenn is revolutionizing how businesses enable BYOD workforces, removing the burden of buying and securing laptops or dealing with virtual desktops. Our patented technology provides companies with a new approach to securing remote employees and contractors working on unmanaged computers. With Venn’s Blue Border™ software, work lives in a company-controlled Secure Enclave installed on the user’s computer, enabling IT teams to secure company data while ensuring end-user privacy. Over 700 organizations, including Fidelity, Guardian, and Voya, trust Venn to meet FINRA, SEC, NAIC, and SOC 2 standards. Learn more at venn.com. -
5
Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro is the Apple device management tool that empowers IT pros and the users they support by delivering on the promise of unified ecosystem management for Apple devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily.
-
6
Esper transforms the way companies manage device fleets. Esper's advanced capabilities include remote control and debugging, Pipelines, Esper SDK, APIs, Blueprints, dynamic configuration and Seamless Provisioning. Esper goes beyond traditional MDM and into the modern age of DevOps. Esper was named one of Deloitte Fast500 in 2023. It supports some of the most innovative brands around, including those in retail, hospitality and logistics, healthcare, education and more. The traditional mobile device management solutions (like MDMs and MAMs), as well as mobility solutions like EMMs and UEMs, were not designed for the modern hardware fleets that are growing today. Esper provides a single pane-of-glass for both Android and iOS devices.
-
7
WipeDrive
WipeDrive
$19.95/one-time/ drive WipeDrive is a tool that allows individuals, businesses, and government agencies to securely and permanently erase data off hard drives, removable media, mobile devices, and other storage devices. It's a cost-effective and secure way to recycle and retire computer storage. WipeDrive is the global leader in secure data destruction. -
8
Hexnode UEM
Mitsogo Inc
3 RatingsHexnode UEM is a Unified Endpoint Management solution that manages devices across multiple platforms from a single pane of glass. With a user-centric approach, the management process is streamlined throughout the entire device lifecycle- starting from enrollment up until device retirement. Trusted by SMBs to Fortune 500 companies around the world, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams. These include endpoint management for all types of devices (including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS), an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking and so much more. -
9
Sophos Mobile
Sophos
1 RatingSophos Mobile is a secure Unified Endpoint Management solution (UEM) that allows businesses to spend less time managing and protecting mobile and traditional endpoints. Sophos Mobile is the only UEM solution that integrates with a top next-gen endpoint security system. It supports management of Windows 10, iOS, Android, and MacOS devices. Sophos Mobile allows you to secure any combination personal and corporate-owned devices quickly and easily. The flexible self-service portal allows users to enroll their devices, reset passwords and get help without IT involvement. This makes it easier for users to bring their macOS, Windows 10 or mobile devices to work. Container-only Management allows admins to have full control over corporate content within the Sophos Secure Workspace and Sophos Secure Email apps. This is without the need for management of the mobile device. Protect business data from malware and ensure it doesn't get lost. -
10
Cubed Mobile
Cubed Mobile
FreeIt's easy to get mobile security from start to finish. In just two steps, you can get the protection your business needs. Cubed Mobile eliminates the need for additional devices and/or SIMs from employees while creating a secure separation between personal workspaces and business workspaces. Securely keep sensitive data safe and secure. Secure Wi-Fi networks should only be used by employees. Your team should be empowered to secure the Internet. Protect your network, apps, privilege abuse, advanced attacks, and more A new approach to managing BYOD is easy to set up and can be used to improve security, communication coordination, and management. You can create workspaces with different settings, apps, or access rights based on user parameters. Your admins can invite and remove users, edit personal information, settings, virtual lines, and filter devices. Remote backup, restore, or wipe entire workspaces in an instant. -
11
SureMDM
42Gears Mobility Systems
$3.49 per monthSecure, Monitor, Manage, and Manage employee-owned devices. You can avoid security risks and resolve maintenance issues throughout the device's lifecycle. 42Gears SureMDM is an intuitive and powerful MDM software and app for Android, iOS/iPadOS and Windows. It can also be used on iOS/iPadOS and Windows. You can manage, secure, monitor and manage company-owned devices. Employee-owned devices can also be used to access company data (BYOD). SureMDM integrates all aspects enterprise mobility through unified endpoint administration, including Mobile Application Management and Mobile Device Management. SureLock is available for kiosk lockdown, SureFox is a secure browser for lockdown, and SureVideo is a secure digital signage solution. -
12
BlackBerry Enterprise BRIDGE
BlackBerry
BlackBerry® Enterprise BRIDGE is a highly-secure option for using native Microsoft mobile applications on iOS and Android. Microsoft Office mobile apps are now easier to use and more secure. BlackBerry Dynamics apps, such as BlackBerry Work, can now provide users with the full native experience of Microsoft PowerPoint, Word and Excel. Some employees may use their personal Office 365 accounts in order to access corporate files due to the rapid adoption of Office 365 among business and consumer users. The collaboration between BlackBerry and Microsoft means that users will no longer have to use this workaround. The secure bridge ensures data encryption and document integrity are preserved during the document sharing process, and that common data leakage policy is applied. BlackBerry Enterprise BRIDGE enables users to view, edit and annotate Office documents on their mobile devices of choice within a secure managed app. -
13
Workspace ONE
Omnissa
Workspace ONE is an intelligent digital workspace platform that allows you to securely deliver and manage apps on any device. Workspace ONE combines access control, multi-platform endpoint and application management into a single platform. It is available either as a cloud-based service or for on-premises deployment. Enterprises can maximize employee engagement and productivity with a personalized user experience and access to any app, on any device. Adopt a cloud-native, single solution for endpoint management - any device or use case. Eliminate silos, manage all device types and apps faster with fewer solutions and greater capabilities. Secure devices, users and data using conditional access, automated patches and configuration policies. -
14
Trend Micro Mobile Security
Trend Micro
FreeNo matter where you are or what you do, you can be safe. Get advanced security and privacy. Protect your mobile life with powerful protection. Improve performance. Optimize your mobile devices to make them more efficient. Avoid fraud and online scams. Flag malicious phishing emails. Trust experience. Mobile solutions based on almost 30 years of security experience give you peace of mind. To stop threats, you can rely on the cloud-based Smart Protection Network™ or mobile app reputation technology to prevent them from reaching you. You can surf anywhere, and mobile apps will not load dangerous or risky websites. Protects your device from malicious apps, ransomware and unsafe Wi-Fi networks. Optimize your mobile phone for peak performance. -
15
Relution
Relution
$2 per monthManage iOS, Android, Windows 10/11 devices. You can secure your devices with configurations and restrictions. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Manage and inventory native and public Apple, Android, Windows and Windows mobile apps. Apps for mobile devices can be reviewed, approved, and published. Allow employees, partners, or other stakeholders to access enterprise apps via your corporate app store. You can manage your Apple iOS and Android tablets securely and deploy the appropriate apps in your school. Relution's Mobile Device and App Management is a benefit for all sizes of companies, authorities and teams. Relution is used by IT Retailers, Educational Institutions, and Resellers to provide this service to their customers. Relution is a leading IT application in the digital education sector. Relution has been the leading mobile device management solution that is privacy-compliant and cross platform for over ten years. -
16
Digital.ai App Management
Digital.ai
Enterprise mobile app management (MAM), enables IT to balance unique needs of remote users and IT. Connect with our MAM BYOD mobile security experts to hear an in-depth discussion about the mobile security landscape, and see a product demo. Get guidance on the capabilities of enterprise app stores and the value of internal app-store tests. MAM, in conjunction with existing MDM solutions, allows you to manage and update any application. You can also complete the security management of app data right down to the mobile device. Distribute apps with policy-enabled through existing app stores and support the secure management and distribution of any app by using MAM central policy management, App Store or Google Play. By collecting user feedback and data, developers can improve the overall quality of their apps, improve 'time to market' metrics, and continually innovate on features. Securely manage and distribute applications to trusted internal or external employees. -
17
Perscale
Perscale
$6 per monthPerscale allows you to access all of your files, apps, and data. All you need to do is connect to wifi and use Photoshop on your phone, Chromebook, or desktop. Your hardware will never be obsolete again. All your files, documents, photos, and videos will remain in the cloud. Perscale offers online storage to ensure your files are always current. Perscale integrates seamlessly with all your applications and offers file sync, free storage, and sharing. Our integration with Dropbox allows you to save your files directly from your app to any online storage provider. You can say goodbye to viruses. Your apps are protected in the cloud so viruses, Trojans and other malware can't get to them. Perscale protects your files with two-step verification and 256-bit AES encryption. All of your files and apps are available no matter what happens to your device. Perscale allows you to access your apps wherever you are with Perscale. -
18
Blue Cedar
Blue Cedar
Mobile apps can be easily modified to meet security requirements without the need for developer assistance. Execute streamlined mobile app deployments. Manage zero-trust network access controls (ZTNA), for mobile apps and devices. Workflows that coordinate technologies and reduce lead time, streamline fragmented deployments, and improve cross-team collaboration, can reduce lead times. Our workflow builder, enhancement and deployment services, as well as integrations with other technologies, make it easy to address your unique deployment requirements. To optimize future deployments, visualize the workflow data you have analyzed. Blue Cedar is used by leaders from finance, insurance, healthcare and energy. To learn more about how Blue Cedar can streamline your mobile app deployments, request a demo today. -
19
Appaloosa
Appaloosa
$1.49 per monthWe provide a secure and enjoyable experience for personal devices that are used at work. We simplify the configuration of corporate devices for security, network, and apps. Appaloosa is scalable to your needs, whether you need to distribute one app to a few beta testers or deploy to thousands. We offer a variety of enterprise mobility management packages that will meet your specific needs. Everything you need to send your private apps within minutes. You can quickly deploy and manage apps without the hassles of large MDM systems. You can configure, update and remove apps silently. This is the most comprehensive solution and best suited to large organizations. Install apps, enroll devices, and manage them all. Trusted by the most demanding production environments. Get your free trial today. Last year, we were down for 12 minutes. -
20
NovaEMM
Tabnova
$1 per deviceNovaEMM is a powerful mobile management solution, which provides complete control over all devices used at work. This includes BYOD devices and COPE devices. Our EMM solution enables businesses to manage devices from a central console, eliminating threats and vulnerabilities and optimizing device performance. NovaEMM offers comprehensive, turnkey analytics that are based on data, network and location usage. These insights allow organizations to collect and utilize actionable data about the elements that influence their mobile device productivity. A single view provides a consolidated overview, highlighting each device and making it a paramount solution. NovaEMM offers a streamlined way to create and manage a variety lockdown/kiosk profiles on a single platform. Our platform allows you to easily set passwords and other configurations. -
21
OneAPM MI
OneAPM
Master application performance in real-time, and get a real-time impression of the user's physical experience. It is a mobile app performance monitoring tool. Mi displays the interactive performance of mobile apps, collapse rate, HTTP errors rate, core performance metrics such as network error rates, user access trajectory and other behavioral data and active user data. Users can gain a deeper understanding of the overall performance status of the application and promote product upgrade and optimization. The user experience can be evaluated by the three core indicators: user action, network request and collapse. The distribution of users is summarized across multiple dimensions, such as application versions and operating systems. Record the entire access path of each user. -
22
AirDroid Business, an enterprise-grade Mobile Device Management(MDM) solution, is designed to help businesses manage and control Android devices fleets from a central dashboard. With AirDroid Business, businesses can easily monitor device usage, deploy apps and updates, and remotely troubleshoot issues. It offers features such as kiosk mode, security policy, alerts & notifications, location tracking, file transfer in bulk, and more. It aims to simplify the device management process, increase productivity and efficiency, and reduce management costs.
-
23
ManageEngine Mobile Device Manager Plus
ManageEngine
$2.00/month ManageEngine Mobile Device Manager Plus (MDM) is designed to empower enterprises with mobility. ManageEngine MDM, a leading enterprise mobile device management software, is capable of managing multiple mobile platforms using a single interface. It supports iOS, Android, and Windows devices. The solution is available both on-premise or in the cloud and includes features such as mobile device management, app management, and device containerization. -
24
Appmobi
Appmobi
Appmobi offers a solution that is serious, automated real-time detection and remediation of threats. IT teams are finding it difficult to keep up with the cyber threats that affect the massive number of devices and apps on the market. There are over 2 million apps available in the App Store and 5 billion mobile devices. Appmobi gives IT the power to monitor and resolve IoT and app threats in real time. Our easy-to use solution tracks usage patterns and notifies IT when a threat is detected. It can even take remedial action to prevent breaches from occurring. Appmobi uses behavioral and environmental data in real-time to monitor usage patterns. It also uses artificial intelligence, a customizable rules engine and other tools to identify suspicious behaviors that could lead to a data breach or application breach. Appmobi can automatically launch protections or recommend a course-of-action when a rule is triggered. -
25
Applivery
Applivery
€2/device Applivery's Unified Endpoint Management platform (UEM) is the most powerful UEM platform, which allows you to manage Android, Windows and Apple devices. Cloud-based Mobile Device Management solution allows for efficient remote management and top-notch security. It integrates seamlessly into organizations of any size, and only takes a few moments to set up. -
26
ProMDM
ProMDM
ProMDM provides mobile device management solutions that provide end-to-end control over all mobile devices across the IT infrastructure. It uses standard MDM specifications for iOS and Android devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Management of Dynamic Groups based on AD/LDAP group, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automate administrative tasks with the Health check service Administration of the role base SSO with Client Certificate Authentication to Exchange, Sharepoint, and Web Sites iOS SSO with Kerberos Safari and Native Apps (integration with ADFS, websites directly) MAM - Mobile App Management Samsung KNOX support Document management - Managed Media Support Photo sync for Android Tracking and GPS location Android for Work Support (ProMDM is a Google Partner certified) -
27
Mosyle
Mosyle
Five separate solutions are no longer required: Enhanced MDM (MDM with Endpoint Security), Internet Privacy & Security (IP&S), Identity Management and Application Management. Mosyle is the first solution to fully integrate five different applications onto a single Apple platform. This allows businesses and schools easily and automatically deploy, protect and manage all Apple devices. -
28
Check Point Application Control
Check Point
Application Control offers the industry's strongest identity and application security to all organizations. Application Control is integrated into the Check Point Next Generation Firewalls. This allows businesses to create granular policies based upon users or groups to block, limit, or identify the use of applications and widgets. Applications can be classified into different categories based on various criteria, such as their type, security risk level and resource usage. There are also productivity implications. Granular control over social networks, applications, as well as application features, allows you to identify, allow, block or limit usage. The world's largest app library is used to group apps into categories, simplifying policy creation and protecting against malware and threats. Next Generation Firewalls integrates with Next Generation Firewalls to simplify security controls and reduce costs. Only authorized users and devices have access to your protected assets. -
29
PolicyPak
Netwrix
Organizations with different security and management requirements can choose the right edition through the PolicyPak Platform. Users can access their desktops from anywhere: at work, at home, on the road, via a kiosk or virtually. These environments present a challenge in managing and securing them. Not all management systems are designed for modern management scenarios. PolicyPak offers solutions that modernize your existing infrastructure and extend its power. PolicyPak can be used with Active Directory to simplify the management and security of Active Directory-connected computers. Microsoft Group Policy is a powerful technology that you can rely on every day. It needs to be re-engineered to meet the modern enterprise's reporting, security, and automation requirements. -
30
WizyEMM
WizyEMM
$2/month/ device WizyEMM, a Cloud SaaS platform built on Android Enterprise management APIs and Google Cloud Platform, is WizyEMM. We can use Android API's to access the full Android Enterprise Security Stack and the Google Play Store functionalities for Public or Private Apps. This solution was initially developed for an European Express Courier company that had 30.000 Android devices. Delivery drivers used the fleet. -
31
Applicaster
Applicaster
The only platform that allows you to create, launch and manage streaming apps across multiple technology stacks. App independence; developers optional. You can create and modify custom experiences with the built-in tools, connect your preferred integrations, and launch directly to the app store. You can scale and expand your streaming business with budget predictability and full control over time & resources. Your business's growing needs can be met in the most efficient operational manner. To ensure the best user experience and desired business outcomes, you must continue to experiment, personalize, and optimize your app experience. Non-developers can build and compile apps and manage releases. There are hundreds of integrations that can power client apps. Our APIs allow you to expand your capabilities. Features available OOTB, you configure your backend. Measurement, data source and UI across platforms. Continuously collect user data, rollout changes quickly. -
32
Gamban offers a range of tools that will help you stop online gambling. It may seem difficult to avoid online gambling. Gamban is a safe, effective and affordable tool to help you fight temptation. Gamban uses a multi-layered strategy to block tens thousands of gambling apps and websites worldwide. It's important to start your recovery journey, but you should also keep track of how far you have come. Your Gamban app will now track your gambling-free time and money savings. Claim your 7-day Gamban free trial today and take the first step in fighting addiction. Gamban offers the award-winning global blocking of gambling, along with a host of new features. Protect all your devices with a single license. Gamban is compatible with all major platforms.
-
33
SyncDog
SyncDog
Your mobile security solution cannot address the latest, more advanced threats to jailbreak/root your device. The problem is that almost every solution on the market fails in preventing these advanced threats. True mobile security needs to incorporate a containerization-based solution that isolates and encrypts the data being accessed and stored on the device and doesn't rely on the Keystore for storing its crypto. Before you commit to any solution, challenge any vendor to prove that they have met the mobile security requirements. Full encryption of data on the device, as well as encryption of data sent or received from it using AES256-bit encryption at a minimum. All work-related files, emails, and apps are protected from personal use by a containerized and encrypted isolation. Secure data transfer between apps on the device. Zero use of KeyStore to store crypto keys. -
34
SquareStack
SquareStack
All your business data and apps in one simple dashboard. SquareStack brings all your business apps and data into one platform. Make sense of everything in one place. Make smart decisions and leave your mark. Managing your business can be difficult enough. Even more difficult is managing your subscriptions for business apps. SquareStack offers SMB owners a dashboard that allows them to access and organize all their apps, allowing them to make confident decisions. All your app subscriptions can be viewed in one place. Instantly see how much you're paying from your bank or credit card. SquareStack offers thousands of apps, both free and paid, that you can add, replace or review all in one place. One dashboard provides you with the high-level overview you need to make informed business decisions. Once you've mastered your apps, you can focus on leading your team and sharing what you know with the world. Find your next power tool and boost the ROI of apps you already have. -
35
Heimdal Application Control
Heimdal®
Heimdal Application Control offers a new approach to integrative app management and user rights curation. App Control is modular and easy to set-up. It allows the system administrator to create all encompassing rule-based frameworks and streamline auto-dismissal and auto-approval flows. It also enforces individual rights per Active Directory group. The uniqueness of the tool comes from its ability, in perfect coordination with a (PAM), Privileged Access Management solution. This allows for the user to have granular oversight over software inventories and hardware assets. -
36
@Hand
IgniteTech
Welcome to hand.com. IgniteTech's Services arm. We are here to help you maximize the value of your IgniteTech partnership. You can identify and immediately execute savings on AWS, Azure, and Google Cloud. Start immediately to save up to 10x on your annual IgniteTech subscription This offering saved a company over $400 million. IgniteTech's Platinum support is the best option for demanding customers. It offers the most services and highest priority for solving critical issues. IgniteTech Platinum customers have access to unlimited consulting and programmatic services from our highly-skilled Consulting Services teams. IgniteTech consulting teams use our proven methodology to ensure projects are executed flawlessly and are in line with your business goals. -
37
Retain Mobile Archiving
OpenText
Retain Mobile Archiving provides secure, encrypted messaging for iOS and Android devices. Generate and consume data to meet regulatory and compliance requirements--regardless of who owns the device. Retain Mobile allows for carrier-level archiving and retrieval of text messages. This allows you to monitor mobile communication data on your iOS, Android, or other mobile devices connected to the mobile carrier network. This solution is ideal in environments that have corporate-owned devices, BYOD or a combination of both. Retain Mobile ensures that you don't lose any valuable information and that your organization remains compliant. Your organization keeps your sensitive data safe. Administrators, human resources, compliance officers and eDiscovery lawyers can review and audit smartphone user data. Administrators and other users can search and access their personal archives. Users can also search and access archived messages for all users. -
38
OpenText ZENworks full disk encryption allows you to centrally enforce policies that encrypt entire hard drives on Windows 7, Windows 8 and Windows 10 machines within your organization. You can manage them with the same web-based interface and adaptive agent you use for other ZENworks Products. Encrypting your entire hard drive is a proven way to protect company data. Ensure that devices encrypted across the enterprise are easy to manage. You can remotely unlock devices protected by full disk-encryption and keep users productive when they work remotely. You must comply with government regulations and industry guidelines to protect patient and customer data. Use your experience with ZENworks in order to reduce the costs of implementing Full Disk Encryption.
-
39
BlackBerry Access
BlackBerry
Access your corporate network from personal devices or not-corporate managed devices. Enterprise data is protected with full containerization to reduce data leakage. BlackBerry® Access offers a secure and intuitive user experience for intranet browsing. Employees have access to corporate intranets on their personal devices or those of the company. BlackBerry desktop offerings allow you to simplify your bring your computer program. They offer modern alternatives to traditional VPNs and VDI solutions. BlackBerry® Desktop allows users to securely access corporate content and resources from their own Windows 10 or macOS devices. It also includes BlackBerry Access and BlackBerry® work. BlackBerry Access is a secure browser that allows you to enable mobile access for your company network. It supports iOS, Android and Windows. -
40
Switch Secure Workspace
Egress Software Technologies
Secure Workspace allows users to securely upload, control, share, and collaborate with colleagues and other partners. Secure Workspace offers enterprise-grade access permissions with the click of one button. Our mobile app and productivity toolkit allow teams to collaborate seamlessly from any location. You can demonstrate compliance and avoid losing your reputation and paying regulatory fines. Secure Workspace allows you to securely and easily share your most sensitive data with your supply chain and internal staff. Zones are secure containers that allow you to organize your content in folders and protect sensitive information from unauthorized access. Your team can keep their confidential documents safe and secure while sharing them with external partners and internal staff. -
41
Bitwarden
Bitwarden
$4 per month 11 RatingsWith an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment. -
42
Samsung Blockchain Wallet
Samsung
Samsung Blockchain keeps your valuables safe with its security features. Wallet and Samsung Blockchain Keystore provide additional protection to your virtual assets. Private Share makes it possible to share your personal data and information without exposing your identity. Samsung Blockchain Wallet allows secure virtual asset management on mobile. Regular updates are made to support major and minor virtual assets. This includes favorites like Bitcoin, Ethereum and ERC20, Tron, and many more. Blockchain tech is the future of data security. Samsung Blockchain stores your private key in one secure location and encrypts your data files using this private key. Your virtual assets are protected by Samsung Knox and Trusted Execution environment (TEE). Files can be shared securely with private sharing. -
43
Zimperium Mobile Threat Defense (MTD)
Zimperium
Zimperium Mobile Threat Defense (MTD) - formerly known as zIPS - is a privacy-first application that provides comprehensive mobile security for enterprises. Zimperium MTD is designed to protect an employee’s corporate-owned or BYO device from advanced persistent threats without sacrificing privacy or personal data. Once deployed on a mobile device, Zimperium MTD begins protecting the device against all primary attack vectors, even when the device is not connected to a network. Zimperium reduces risk by analyzing risky apps and jailbreaks on the device before giving access to corporate email and apps. Zimperium MTD provides comprehensive protection for mobile devices. It provides the risk intelligence and forensic data necessary for security administrators to raise their mobile security confidence. As the mobile attack surface expands and evolves, so does Zimperium’s on-device, machine learning-powered detection. Zimperium MTD detects across all four threat categories — device compromises, network attacks, phishing and content, and malicious apps. -
44
Cachatto
Maddox
Cachatto makes it easy to access, manage, connect, and secure all of your corporate databases on-premise or on the cloud. You can access them from any device at any time with Cachatto. Secure data protection with no data storage Protects against security breaches in the event of theft. Mobile security is possible while you're on the move. You can use one virtual server to reduce the cost of hardware and have a simple configuration. You can work anywhere, anytime. Data leakage is prevented and computer security is assured. There are no major changes to the corporate system. No need to make any changes to firewall settings. -
45
Turbo
Turbo.net
$19 per monthTurbo allows you to publish and manage all your enterprise applications from one point, on every platform and device. Turbo is available for demonstration. You can deploy custom containerized applications on desktops and on-premises servers. The student digital workspace allows students to access applications on any campus or personal device. You can distribute applications anywhere from one, configurable container environment. You can easily migrate between platforms and devices using rich APIs and connectors. No installation required to deploy managed or BYOD PCs. Turbo Application Server allows you to stream to HTML5, Mac, or mobile. Publish to Citrix and VMware VDI environments. Dynamically image applications onto non persistent WVD instances. Canvas, Blackboard, or other major LMS systems can be used to bring course applications into Canvas, Blackboard, or other major LMS systems. You can create your own containerized applications or components by using the authoring environment. -
46
Check Point Harmony Endpoint
Check Point Software Technologies
1 RatingCheck Point Harmony is the first industry-leading unified security solution that protects users, devices, and access. The solution protects devices, internet connections from the most sophisticated attackers while ensuring zero-trust access to corporate applications. To protect today's hyper-distributed workspace, there are endless security functions that must be applied across all devices, applications, and networks. But, putting together point solutions can leave security gaps and create a cumbersome infrastructure that is difficult and costly to manage. Harmony is a better alternative that reduces overhead and increases security. Harmony combines 6 cloud-based security products to ensure your safety. No matter where you connect, no matter what you connect to, no matter how you connect, Harmony protects your home, your devices and your organization data from any cyber threat. -
47
Estimote
Estimote
Wearables increase workplace safety The contact tracing dashboard alerts all team members who are exposed and protects your entire workforce. The team members use small, wireless devices that remind them to keep their distance and report direct contact exposure. Companies can quickly locate any other team members at risk in the event of a symptomatic employee. Wirelessly charged with a programmable buzzer, buzzer, and vibration. All interactions are saved anonymously. The list of exposed employees can only be generated when symptoms are reported. Employees can report their health status immediately to speed up escalation or quarantine procedures. Anonymized data can be used to measure the effectiveness of social distance behavior in the workplace. Interpersonal interactions between co-workers are safe and can be stored in a secure container in an existing data-center. For all types of employees, wearable, self-contained devices can be distributed and used out of the box. -
48
Harmony Mobile
Check Point
Your business is more vulnerable than ever to data breaches in the new normal. Employees are now able to access corporate data via their smartphones. Harmony Mobile provides complete protection for your mobile workforce. It is easy to deploy, manage, and scale. Protecting corporate data from mobile attacks: apps, networks, and OS. Secure and scalable for all types of mobile workforce. Rapid user adoption with no impact on privacy or user experience. By detecting and blocking malicious apps in real time, employees are protected from malware infiltration. Harmony Mobile extends Check Point's industry-leading network protection technologies to mobile devices. This gives you a wide range of network security capabilities. Devices are protected from compromise by real-time risk assessments that detect vulnerabilities, configuration changes and attacks. Advanced rooting and jailbreaking can also be performed. -
49
Axis Security
Axis Security
You should ensure that the least-privilege users have access to certain business resources. This is done without allowing excessive access to your corporate network or exposing applications to Internet. Avoid deploying agents on BYOD and third-party devices, and all the friction that goes with it. Access to web apps, SSH and RDP, Git, without the need for a client, is supported. Analyze user interaction with business applications to detect anomalies and flag potential issues. Also, ensure that networking is aware of any changes in security controls. Key tech integrations can automatically verify and adjust access rights based upon changes in context. This will protect data and ensure that the least-privilege access is maintained. Private apps can be hidden from the Internet to keep users off the network and provide a safer connection to SaaS applications. -
50
Q-Scout
Quokka.io
Q-Scout helps IT Teams prioritize BYOD and privacy concerns in order to secure business-related apps on corporate and personal devices, while maintaining the data privacy of their employees. IT administrators can define enterprise-wide data isolation policies and manage the managed apps while maintaining personal privacy. This allows for the fast validation of thousands devices using minimal resources on a personal device. Creates a virtual device model for employee devices without allowing access to personal data like photos, contacts or texts. This solution provides app-based security policies that ensure secure access to company files and data on devices with Q Scout installed. Q-Scout creates a level-playing field for employees who use personal devices to perform work-related tasks by allowing them to install business applications on their devices.