Best Trend Micro Mobile Security Alternatives in 2024
Find the top alternatives to Trend Micro Mobile Security currently available. Compare ratings, reviews, pricing, and features of Trend Micro Mobile Security alternatives in 2024. Slashdot lists the best Trend Micro Mobile Security alternatives on the market that offer competing products that are similar to Trend Micro Mobile Security. Sort through Trend Micro Mobile Security alternatives below to make the best choice for your needs
-
1
Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights. Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes. Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7. Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
-
2
ManageEngine Endpoint Central
ManageEngine
1,955 RatingsManageEngine's Endpoint Central, formerly Desktop Central, is a Unified Endpoint Management Solution that manages enterprise mobility management, including all features of mobile app management and mobile device management, as well as client management for a wide range of endpoints such as mobile devices, laptops computers, tablets, servers, and other machines. ManageEngine Endpoint Central allows users to automate their desktop management tasks such as installing software, patching, managing IT assets, imaging, and deploying OS. -
3
Cynet equips MSPs and MSSPs with a fully managed, all-in-one cybersecurity platform that brings together essential security functions in a single, user-friendly solution. By consolidating these capabilities, Cynet simplifies cybersecurity management, reduces complexity, and lowers costs, eliminating the need for multiple vendors and integrations. With multi-layered breach protection, Cynet delivers robust security for endpoints, networks, and SaaS/Cloud environments, ensuring comprehensive defense against evolving threats. Its advanced automation enhances incident response, enabling swift detection, prevention, and resolution. Supported by a 24/7 Security Operations Center (SOC), Cynet’s CyOps team provides continuous monitoring and expert guidance to keep client environments secure. Partnering with Cynet allows you to deliver cutting-edge, proactive cybersecurity services while improving operational efficiency. See how Cynet can redefine your security offerings and empower your clients today.
-
4
Cubed Mobile
Cubed Mobile
FreeIt's easy to get mobile security from start to finish. In just two steps, you can get the protection your business needs. Cubed Mobile eliminates the need for additional devices and/or SIMs from employees while creating a secure separation between personal workspaces and business workspaces. Securely keep sensitive data safe and secure. Secure Wi-Fi networks should only be used by employees. Your team should be empowered to secure the Internet. Protect your network, apps, privilege abuse, advanced attacks, and more A new approach to managing BYOD is easy to set up and can be used to improve security, communication coordination, and management. You can create workspaces with different settings, apps, or access rights based on user parameters. Your admins can invite and remove users, edit personal information, settings, virtual lines, and filter devices. Remote backup, restore, or wipe entire workspaces in an instant. -
5
Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro is the Apple device management tool that empowers IT pros and the users they support by delivering on the promise of unified ecosystem management for Apple devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily.
-
6
Traced Trustd MTD
Traced
£9/device/ year Traced MTD delivers a groundbreaking MTD (mobile threats defense) for businesses that gives you instant visibility and analysis of mobile threat. Every mobile device, whether it belongs to a business or a person, is a gateway for business data. It also provides a way to connect to your network. Traced Protected MTD and Traced App protects mobile devices, while Traced Trusted MTD provides your IT and Security teams with the tools needed to protect your business. Traced protects employees' devices from application-, network- and devicebased threats, including malware, phishing and rogue WiFi. It also protects against unauthorized screen, microphone and camera access, permission abuse, and device exploits. The Traced Deep Learning Engine detects malicious apps, both known and unknown. It provides you with vital information for analysis, investigation and response. WiFi protection alerts the device as well as Traced Trustd when a user connects a compromised or unsecure WiFi network. -
7
Comodo Mobile Device Security
Comodo
FreeThe most advanced mobile security technology for Android and iOS. High-performance malware engine, VPN and ID protection, safe browsing and AppLock features allow you to keep your data and apps safe. Comodo's mobile antivirus app offers complete protection against all types of malware, including trojans and worms, ransomwares, cryptowares, spyware, and adware. Our advanced security app integrates with real-time virus signature to identify new threats and block them immediately to protect your mobile device. To prevent further damage, you will be notified when sensitive data is being circulated on the dark web. This safe Wi-Fi feature can be activated to be notified when your Wi-Fi network is insecure or under attack. Block phishing and malware domains, botnets, malicious sites, botnets and other web-borne attacks. To protect your privacy, mask your IP address and encrypt your mobile connection. -
8
BlackBerry Protect
BlackBerry
AI detects and stops attacks before they can be executed, preventing users opening URLs or visiting spoofing webpages that look like legitimate websites. It detects, prevents, and then remediates advanced malicious threats at both the device and application level. Application sandboxing, code analysis, and app-security testing are used to identify grayware and malware. Before being pushed to the device, or the user who is seeking access, all applications are scanned and validated. BlackBerry UEM protects all mobile endpoints. End users do not need to install, log into or maintain third-party applications or manually configure settings. Select a single-point connectivity solution. Download once and distribute locally. Hybrid deployment allows for security-related communication between cloud and local infrastructure, without exposing your network. -
9
Mobile malware continues to increase exponentially on Android™. Webroot classifies millions of apps each year as malicious or suspicious every year. iOS attacks are also on the rise. Hackers are putting more effort into compromising mobile devices because they have more transactions, banking, browsing, and shopping happening on them. It is crucial to protect them. Secure mobile web browsing protects you against phishing attacks and other social engineering tactics that aim to seize your personal data. Android antivirus automatically scans and checks all updates and applications for threats. It's simple-to-use and powerful internet security for your iPhone®, which won't slow down your browsing speed. Protects personal information from being stolen by malicious websites using Webroot and Safari®. You can browse worry-free with machine learning and Artificial Intelligence backed by 20 years of historical data.
-
10
BETTER Mobile
Better Mobile Security
BETTER Mobile Threat Defense protects your mobile devices against attacks and threats. It is simple, cost-effective, and powerful. Endpoint protection with a lightweight mobile agent. It can be deployed via EMM in just minutes. The simplified admin console provides immediate visibility, intelligence, and control over threats and risks to devices. Although the console offers rich information and simple policy management, our goal is to make it as easy as possible for you to not ever use it. We have created one of the most advanced machine-learning platforms and focused it on mobile threat identification. BETTER MTD is highly accurate in detecting risky apps, abnormal behavior, and threats to networks thanks to our global mobile sensor network. -
11
Certo Mobile Security
Certo Software
FreeCerto Mobile Security is brought you by Certo Software, a leading mobile security company. Our products are backed by years of cyber security experience. They have helped millions of people secure their devices and provide peace of mind. Our all-in-one security software helps you protect your device. It analyzes your device's configuration and scans your WiFi network for threats. Then it guides you through setting up your iOS device to make it more secure. Verifies that your device is running the latest software version. Also, checks whether your device is protected against unauthorized access. This tool will help you stay safe online. It will analyze your network for signs such as unauthorized monitoring, vulnerability to routers, and other threats. This checklist provides actionable security tips to protect your personal data. It also includes a checklist that allows you to keep track all completed actions. Security health check and security & privacy checklist. -
12
Antivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. While antivirus protects your devices and VPN protects your connection by keeping you browsing private, both work together to provide you with security and privacy while you work, share, bank, browse, and bank. Webroot protects usernames, account numbers, and other personal information from online threats. Our cloud-based protection keeps your family and you safe every time you connect. Webroot is the most efficient, lightweight and cost-effective antivirus product on the market. You can stay safe at home and on the move. Access your files on your mobile device securely and easily. Privacy protection and system maintenance tool that erases all past online activity to protect privacy.
-
13
SlashNext
SlashNext
SlashNext anti-phishing solutions and IR solutions prevent threats across mobile, email and web--dramatically reducing risk of data theft, cyber extortion and breaches. A lightweight, cloud-powered agent protects iOS and Android users against mobile-centric phishing threats. Cloud-powered browser extensions are available for all major desktop browsers to protect employees from live phishing sites. Live threat intelligence can be used to transform network security controls into a multi-vector, real-time phishing defense. Automate phishing incident response, threat hunting, and accurate, run-time analysis on-demand of suspicious URLs. -
14
GlobalProtect
Palo Alto Networks
1 RatingModern workers are more mobile than ever. They can access the network from anywhere, on any device, at anytime. Advanced threats can't be stopped by endpoint antivirus and VPN technologies. GlobalProtect subscriptions allow you to extend next-generation firewall capabilities. This will give you greater visibility into all traffic and users, devices, applications, and devices. GlobalProtect allows organizations to extend consistent security policies across all users. It also eliminates remote access blindspots, strengthens security, and can be used to create security policies for all users. GlobalProtect protects your mobile workforce using the capabilities of your Next-Generation Firewall. It inspects all traffic, incoming and outgoing. To ensure transparent access to sensitive data, enable an IPsec/SSL VPN connection between multiple endpoints and operating system. Quarantine compromised devices with immutable properties on internal and externe networks. -
15
Appmobi
Appmobi
Appmobi offers a solution that is serious, automated real-time detection and remediation of threats. IT teams are finding it difficult to keep up with the cyber threats that affect the massive number of devices and apps on the market. There are over 2 million apps available in the App Store and 5 billion mobile devices. Appmobi gives IT the power to monitor and resolve IoT and app threats in real time. Our easy-to use solution tracks usage patterns and notifies IT when a threat is detected. It can even take remedial action to prevent breaches from occurring. Appmobi uses behavioral and environmental data in real-time to monitor usage patterns. It also uses artificial intelligence, a customizable rules engine and other tools to identify suspicious behaviors that could lead to a data breach or application breach. Appmobi can automatically launch protections or recommend a course-of-action when a rule is triggered. -
16
zDefend
ZIMPERIUM
Zimperium’s zDefend enables mobile apps to detect and protect themselves proactively against runtime threats and attacks. With this runtime protection capability, mobile apps can assess device risk posture in real-time and dynamically prevent access or disable high-risk functionality to minimize fraud and theft attempts on end-user devices proactively. The security policy and associated mitigations reside in-app allowing the actions can be taken even in the absence of any network connectivity, making the protections extremely difficult to circumvent. The ability to detect threats and attacks on-device across the install base provides Security Operations (SOC) teams with real-time threat telemetry. Detailed threat forensics help isolate and automate downstream mitigation activities across other enterprise. In-app security policies are set and managed centrally via the console but are communicated in real-time to the entire install base without needing to publish a new version. This practical and scalable approach allows Enterprises to react promptly to new threats and vulnerabilities discovered. Zimperium’s unique approach to runtime defense also protects against advanced on-device compromise and exploitation techniques. -
17
Intercept X Mobile protects users, their mobile devices, and corporate data against known and unknown mobile threats. It leverages our market-leading Intercept X deep-learning engine. All of this is managed seamlessly by Sophos Central. Sophos Intercept X for Mobile continuously monitors the health of your device and alerts you if it is compromised. You can then take remediating action or revoke access for corporate resources. Device security advisors can detect rooting or jailbreaking and inform both the administrator and the user of any operating system updates. Set up a first line defense at the mobile network layer on iOS and Android. In real-time, network connections are checked for suspicious characteristics that could indicate an attack. This helps to reduce the risk of Man-in-the-Middle attacks (MitM). Web filtering and URL testing stop mobile devices from accessing known bad sites.
-
18
Corrata
Corrata
Mobile threat defense is more powerful, more sensitive to employee privacy, and easier to deploy than other solutions. Corrata operates quietly in the background, looking for signs of malware infection and quarantining any compromised devices. Our traffic inspection technology ensures that even the most sophisticated malware cannot hide behind our unique traffic inspection technology. Mobile phishing attacks account for 85% of all phishing attacks. Corrata monitors all incoming messages via SMS, WhatsApp, and other channels and scans them for phishing attempts and blocks malicious links. Corrata constantly checks the configuration of devices. If necessary, Corrata alerts employees to update operating system software or remove harmful applications. Poorly configured tablets and phones are not allowed to access business applications because of conditional access policies. -
19
Proofpoint Mobile Defense
Proofpoint
The threat of malicious Wi-Fi hotspots is increasing, as are the millions of apps that employees have installed on their devices. These apps may contain malware or "riskware", which are apps that do not appear malicious, but display behavior that puts enterprise data in danger. Businesses are facing growing threats from malicious WiFi hotspots, and millions of apps installed on employee-owned mobile devices. These apps may contain malware or "riskware", which are apps that do not appear malicious, but display behavior that puts enterprise data in danger. These threats expose enterprise users' data leakage, credential stealing, and the exfiltration private information which can be used in advanced attacks to target specific employees. Enterprise users access Wi-Fi hotspots casually and grant these riskware apps broad permissions. They don't realize that their corporate and personal data can be sent to remote servers or advertising networks around the world. -
20
Pradeo
Pradeo
The digital transformation has created a mobile-first and cloud-first world. This has greatly increased the amount of mobile data that can be transferred between mobile devices, apps, servers, and other mobile devices. Companies digitalizing their services and frameworks has led to corporate and personal data being easily accessed by mobile devices. This exposes them to a whole new set of threats, including data theft, malware, network exploit, and device manipulation. A mobile fleet is a direct link to an organization's information system, regardless of whether it's made up of corporate devices or BYOD. The proliferation of mobile devices in all industries (government, banking and health) increases the risk of sensitive corporate data being stolen or leaked. IT security departments often refuse to manage personal devices in the corporate environment, but grant them access to corporate mobile services. This is to preserve privacy, financial security, and flexibility. -
21
Harmony Mobile
Check Point
Your business is more vulnerable than ever to data breaches in the new normal. Employees are now able to access corporate data via their smartphones. Harmony Mobile provides complete protection for your mobile workforce. It is easy to deploy, manage, and scale. Protecting corporate data from mobile attacks: apps, networks, and OS. Secure and scalable for all types of mobile workforce. Rapid user adoption with no impact on privacy or user experience. By detecting and blocking malicious apps in real time, employees are protected from malware infiltration. Harmony Mobile extends Check Point's industry-leading network protection technologies to mobile devices. This gives you a wide range of network security capabilities. Devices are protected from compromise by real-time risk assessments that detect vulnerabilities, configuration changes and attacks. Advanced rooting and jailbreaking can also be performed. -
22
Zimperium Mobile Threat Defense (MTD)
Zimperium
Zimperium Mobile Threat Defense (MTD) - formerly known as zIPS - is a privacy-first application that provides comprehensive mobile security for enterprises. Zimperium MTD is designed to protect an employee’s corporate-owned or BYO device from advanced persistent threats without sacrificing privacy or personal data. Once deployed on a mobile device, Zimperium MTD begins protecting the device against all primary attack vectors, even when the device is not connected to a network. Zimperium reduces risk by analyzing risky apps and jailbreaks on the device before giving access to corporate email and apps. Zimperium MTD provides comprehensive protection for mobile devices. It provides the risk intelligence and forensic data necessary for security administrators to raise their mobile security confidence. As the mobile attack surface expands and evolves, so does Zimperium’s on-device, machine learning-powered detection. Zimperium MTD detects across all four threat categories — device compromises, network attacks, phishing and content, and malicious apps. -
23
Webroot Internet Security Plus
Webroot
$35.99 per yearAntivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. Both antivirus protect your devices and VPN protect your connection by keeping you browsing private. They both work together to provide you with security and privacy while you work, bank, share, bank, and browse the internet. Webroot SecureAnywhere®, Internet Security Plus offers cloud-based protection against online threats for all of your devices, keeping you safe no matter where or how you connect. It scans faster and uses less system resources. It protects you in real-time by instantly identifying new threats and blocking them as soon as they occur. -
24
Jamf Executive Threat Protection
Jamf
FreeMobile devices are used by users more than ever. Some of these devices can access sensitive company and personal data. Jamf Executive Threat Protection protects this data from increasingly sophisticated threats. Apple's Lockdown Mode is not enough for users who require the highest level possible of security. They need advanced detection and reaction, which gives them visibility into sophisticated attacks. Jamf achieves this by validating a device's integrity and analyzing any compromise without compromising privacy. Monitor beyond device management and apps to find instant signs of compromise. Provide a rich context for a sophisticated mobile assault. It does not collect any personal information such as passwords, photos/videos or text messages, call data, contacts or browser history. Mobile is the weakest link in the modern workforce. Complete mobile security to detect and respond. -
25
Malwarelytics
Wultra
Protect your app users against mobile malware and other threats to their devices. Find out what malware is currently running on your users' devices and which users have insecure devices. Then, help them to fix the problem configuration as soon as you notice it. Mobile malware and cyber attackers have become extremely sophisticated. They are constantly looking for new ways of hacking your mobile apps and causing damage. They can steal personal data and even money by stealing your users' money or using mobile operating system features to gain an advantage. These are the most serious consequences. Your business reputation is at risk! Malwarelytics®, which prevents the most common threats mobile apps face these days, helps your company stay compliant and safe. Jailbreaking or rooting a device on the mobile operating system disables security features and opens it up to attackers. -
26
Workspace ONE
Omnissa
Workspace ONE is an intelligent digital workspace platform that allows you to securely deliver and manage apps on any device. Workspace ONE combines access control, multi-platform endpoint and application management into a single platform. It is available either as a cloud-based service or for on-premises deployment. Enterprises can maximize employee engagement and productivity with a personalized user experience and access to any app, on any device. Adopt a cloud-native, single solution for endpoint management - any device or use case. Eliminate silos, manage all device types and apps faster with fewer solutions and greater capabilities. Secure devices, users and data using conditional access, automated patches and configuration policies. -
27
NovaEMM
Tabnova
$1 per deviceNovaEMM is a powerful mobile management solution, which provides complete control over all devices used at work. This includes BYOD devices and COPE devices. Our EMM solution enables businesses to manage devices from a central console, eliminating threats and vulnerabilities and optimizing device performance. NovaEMM offers comprehensive, turnkey analytics that are based on data, network and location usage. These insights allow organizations to collect and utilize actionable data about the elements that influence their mobile device productivity. A single view provides a consolidated overview, highlighting each device and making it a paramount solution. NovaEMM offers a streamlined way to create and manage a variety lockdown/kiosk profiles on a single platform. Our platform allows you to easily set passwords and other configurations. -
28
OpenText ZENworks Mobile Workspace
OpenText
OpenText™, ZENworks Mobile Workspace, is a secure solution for managing mobile access. It balances mobile security with usability, so you can benefit from BYOD's cost savings and users can stay productive with access to everything they need, wherever they are. Mobile accounts that are containerized and secure. Allow your employees to access corporate accounts on their mobile devices in a secure container. Safeguard corporate data and keep mobile users happy. Manage corporate workspaces on mobile devices centrally. Keystores and encryption eliminate potential vulnerabilities for securing data without having to control the entire device. Offsite access to intranet resources and web applications without exposing them to the internet. Keep corporate data safe in secure containers. Control shared data by enforcing policies for threat detection. Remote workspace wipes prevent data theft from lost devices. Isolate important data and encrypt it. -
29
Whalebone
Whalebone
Whalebone's mission is to bring cybersecurity to 1 billion everyday people. Whalebone therefore provides millions of everyday internet users unyielding protection without the need for them to download anything. We already protect millions of users in real-time with our continuously improving next-gen threat intelligence. Whalebone AI uses massive data from our telco customers and combines it with carefully chosen external sources to deliver game-changing cyber security and stay one step ahead. Since all of our products operate on the network DNS level, we can protect all the connected devices, including the IoT and other devices that are otherwise difficult or impossible to protect. On top of that, all of this happens in the simplest possible way, so that everyone gets a chance to be seamlessly protected. Whalebone is a zero disruption cybersecurity product for telcos, ISPs, and corporations that provides millions of everyday internet users unyielding protection from malware, phishing schemes, ransomware, and other malicious digital attacks without the need for them to download anything. -
30
Trellix Mobile Security
Trellix
Trellix Mobile is a cloud-based mobile security solution that relies on traffic tunneling or app sandboxing to protect mobile devices. It sits directly on mobile phones and provides protection regardless of how they are connected, whether via a corporate network, public acces point, cellular carrier or offline. Machine learning algorithms analyze the behavior of mobile devices to identify indicators of compromise and accurately identify advanced network-based, device, and application attacks. You can extend visibility and control over mobile devices from one console, managing OS-based servers, containers, containers and embedded IoT devices. Employees can use their own devices. This allows them to be human and does not compromise the user experience. Trellix Mobile protects Android and iOS devices, such as iPhones and iPads. -
31
Symantec Endpoint Protection Mobile
Broadcom
Threat defense tools that combine vulnerability management, anomaly detection and behavioral profiling to protect mobile devices and their applications from advanced threats. Mobile devices are not just small computers that are connected to the Internet constantly. These devices require new methods to ensure data processing is secure and productive. Symantec created Mobile Threat Defense, a risk-based mobile security strategy, from the ground up to protect against all threats that could expose, steal, or manipulate business data. It also respects users' privacy, productivity, as well as their desire for a great mobile experience. You can detect the most threats using both in-cloud and on-device machine learning elements. Real-time detection and protection at scale. -
32
OneAPM MI
OneAPM
Master application performance in real-time, and get a real-time impression of the user's physical experience. It is a mobile app performance monitoring tool. Mi displays the interactive performance of mobile apps, collapse rate, HTTP errors rate, core performance metrics such as network error rates, user access trajectory and other behavioral data and active user data. Users can gain a deeper understanding of the overall performance status of the application and promote product upgrade and optimization. The user experience can be evaluated by the three core indicators: user action, network request and collapse. The distribution of users is summarized across multiple dimensions, such as application versions and operating systems. Record the entire access path of each user. -
33
Blue Cedar
Blue Cedar
Mobile apps can be easily modified to meet security requirements without the need for developer assistance. Execute streamlined mobile app deployments. Manage zero-trust network access controls (ZTNA), for mobile apps and devices. Workflows that coordinate technologies and reduce lead time, streamline fragmented deployments, and improve cross-team collaboration, can reduce lead times. Our workflow builder, enhancement and deployment services, as well as integrations with other technologies, make it easy to address your unique deployment requirements. To optimize future deployments, visualize the workflow data you have analyzed. Blue Cedar is used by leaders from finance, insurance, healthcare and energy. To learn more about how Blue Cedar can streamline your mobile app deployments, request a demo today. -
34
AppSuit
STEALIEN
AppSuit Premium protects your app from hacking attacks by using anti-tampering and app obfuscation technologies. It has been tested for safety by several Korean financial institutions and other companies. Beta testing of new devices/OSs prior to release. Continuous updates to combat evolving cyber threats. Rapid and accurate technical support and maintenance. After AppSuit plug in (library) installation, gradle configuration in the client’s app development environment, the client application is built (archived). After AppSuit is uploaded/downloaded to the build system, it automatically applies AppSuit to the client APK/IPA. AppSuit must be applied to the client APK/IPA using the web service form. Numerous times deemed the best quality product in the POC/BMT evaluations by large corporations and financial firms. -
35
Check Point Application Control
Check Point
Application Control offers the industry's strongest identity and application security to all organizations. Application Control is integrated into the Check Point Next Generation Firewalls. This allows businesses to create granular policies based upon users or groups to block, limit, or identify the use of applications and widgets. Applications can be classified into different categories based on various criteria, such as their type, security risk level and resource usage. There are also productivity implications. Granular control over social networks, applications, as well as application features, allows you to identify, allow, block or limit usage. The world's largest app library is used to group apps into categories, simplifying policy creation and protecting against malware and threats. Next Generation Firewalls integrates with Next Generation Firewalls to simplify security controls and reduce costs. Only authorized users and devices have access to your protected assets. -
36
ProMDM
ProMDM
ProMDM provides mobile device management solutions that provide end-to-end control over all mobile devices across the IT infrastructure. It uses standard MDM specifications for iOS and Android devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Management of Dynamic Groups based on AD/LDAP group, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automate administrative tasks with the Health check service Administration of the role base SSO with Client Certificate Authentication to Exchange, Sharepoint, and Web Sites iOS SSO with Kerberos Safari and Native Apps (integration with ADFS, websites directly) MAM - Mobile App Management Samsung KNOX support Document management - Managed Media Support Photo sync for Android Tracking and GPS location Android for Work Support (ProMDM is a Google Partner certified) -
37
MYAndroid Protection
MYAndroid
FreeIt is impossible for you to use your personal judgment to determine which apps are malicious or not. Our technology provides malware protection, privacy control and backup & recovery, protection against theft & loss, credit card & identity theft protection. MYAndroid protection combines an intuitive graphical interface with award winning, business-strength technology and preconfigured settings. This makes it easy to get started and keeps your security high. Many apps are infected with malware. These apps can steal your personal information, wipe your data, and increase your bill by calling and texting Premium rate numbers. Spyware apps can track you, read your mail, and more. Check your Android smartphone for malicious software. -
38
CopperheadOS
Copperhead
CopperheadOS is a Secure Android built by a privacy-focused company for encrypted and secure smartphones. Available as privacy-focused and security-focused Google-free Android for the latest Pixel phones. Include a secure phone in your business's mobile security program. CopperheadOS is compatible with the most recent mobile security solutions. CopperheadOS, the most secure Android, is designed to protect against many attack vectors. Mobile devices are easy targets. Copperhead's technical documentation can be viewed. Non-technical, security-oriented user experience. No Google Analytics or tracking analytics. Application isolation and sandboxing. Integrates with the most recent mobile device management software and intrusion detection system mobility software. -
39
V-OS Mobile App Protection can detect and protect mobile apps from threats such as reverse-engineering and hooking, tampering and app integrity checks. It also validates library signatures and code injection. Apps integrated with V-OS Mobile Application Protection can detect and root the phone in an insecure OS environment. This allows the mobile app to function smoothly and without compromising its integrity or confidentiality. It also prevents the app from leaking sensitive information. V-OS Mobile App Protection is built on V-Key's patent V-OS Virtual secure element, which acts as the security foundation. It adds additional security enhancements and tamper protection. V-OS Mobile App Protection was designed to provide both security and convenience for enterprise end-users. True cybersecurity should combine multiple protection methods.
-
40
Appaloosa
Appaloosa
$1.49 per monthWe provide a secure and enjoyable experience for personal devices that are used at work. We simplify the configuration of corporate devices for security, network, and apps. Appaloosa is scalable to your needs, whether you need to distribute one app to a few beta testers or deploy to thousands. We offer a variety of enterprise mobility management packages that will meet your specific needs. Everything you need to send your private apps within minutes. You can quickly deploy and manage apps without the hassles of large MDM systems. You can configure, update and remove apps silently. This is the most comprehensive solution and best suited to large organizations. Install apps, enroll devices, and manage them all. Trusted by the most demanding production environments. Get your free trial today. Last year, we were down for 12 minutes. -
41
SEAP
XTN Cognitive Security
SEAP®, for Mobile is an SDK that is integrated into the customer’s app and does not require any special permission. SEAP®, for Web, is JavaScript-based and executed in the web browser environment. It does not require any agent installation. SEAP®, detects malware activity in both web and mobile apps. Some examples of the malware threats monitored include man-in-the-browser and man-in-the-app-attacks, RAT, web injections, overlay attacks, SMS grabbing, memory tampering, and Injection attacks. SEAP®, which detects and reports technological threats to the device, such as jailbreaking, rooting, reverse engineering, binary tampering and repacking. The dedicated RASP APIs can be used to activate countermeasures for some of these conditions. SEAP®, which relies on behavioral biometrics and device identity authentication, detects fraudulent activity that attempts to take control of user accounts. -
42
Gamban offers a range of tools that will help you stop online gambling. It may seem difficult to avoid online gambling. Gamban is a safe, effective and affordable tool to help you fight temptation. Gamban uses a multi-layered strategy to block tens thousands of gambling apps and websites worldwide. It's important to start your recovery journey, but you should also keep track of how far you have come. Your Gamban app will now track your gambling-free time and money savings. Claim your 7-day Gamban free trial today and take the first step in fighting addiction. Gamban offers the award-winning global blocking of gambling, along with a host of new features. Protect all your devices with a single license. Gamban is compatible with all major platforms.
-
43
Wandera
Wandera
Unified real-time security that protects remote users from threats, regardless of where they are or how they connect. One security solution that covers all remote users. It includes everything from threat protection to content filtering, zero trust network access, and even zero trust network access. It also covers tablets, smartphones, and laptops. One policy engine and analytics that you can configure once and use everywhere. Your users have moved beyond the perimeter and your data has moved into the cloud. Wandera's cloud first approach ensures that remote users have a consistent, seamless security experience. It also doesn't face the challenges of adapting legacy architectures to today’s new way of working. -
44
Trend Micro Antivirus for Mac
Trend Micro
$29.95 per yearProtect yourself from ransomware, and other online threats. Prevent malicious applications and files from infecting Mac. Prohibit the unauthorized use of camera and microphone. Mark malicious phishing email and scam websites. Block websites that steal personal information. Trend Micro blocks malware, viruses, and spyware so you can live your digital life in peace. Trend Micro protects against the latest types of attacks including ransomware which can encrypt data until you pay the bad guys. Stop cyber criminals taking you hostage. Security doesn't need to be complicated. Trend Micro offers simple, intuitive settings as well as clear and easy-to understand status reports. Trend Micro, the global leader in cybersecurity, is committed to making digital information exchanges safe. Our cybersecurity platform is backed by decades of expertise in security, global threat research and continuous innovation. It protects more than 500,000 organizations and 250+ millions individuals. -
45
Trend Micro Antivirus+ Security
Trend Micro
$19.95 per year 2 RatingsProtect yourself from ransomware and other online threats. Stop dangerous websites that could steal personal data. Report malicious phishing emails. Protect your computer from malicious files and programs. Trend Micro Antivirus Plus is fully compatible with Windows 11. This allows you to shop, play, and socialize online with confidence knowing that your computer and devices are protected against malware, fraud, and other malicious programs. Protect yourself against the latest types of attacks, such as ransomware which can encrypt all your data until you pay the bad guys. Security without complexity. Security is easy with intuitive settings and clear status reports. Stop cyber criminals taking your data hostage. Protect your connected world. Avoid online fraud and scams. -
46
ManageEngine Mobile Device Manager Plus
ManageEngine
$2.00/month ManageEngine Mobile Device Manager Plus (MDM) is designed to empower enterprises with mobility. ManageEngine MDM, a leading enterprise mobile device management software, is capable of managing multiple mobile platforms using a single interface. It supports iOS, Android, and Windows devices. The solution is available both on-premise or in the cloud and includes features such as mobile device management, app management, and device containerization. -
47
Trend Micro Internet Security
Trend Micro
$39.95 per yearProtect yourself against ransomware, and other online threats. You can quickly fix common problems and get things running at peak speed. Keep scams out your inbox. Allow children to use the internet safely with time and content restrictions. You should block dangerous websites that may steal your personal data. Report malicious phishing emails. Award-winning protection for your digital world. Trend Micro Internet Security is compatible with Windows 11. This allows you to shop, play, and socialize online with confidence knowing that your devices and data are protected against fraud, malware, and other threats. Protect your computer with round-the-clock protection from ransomware, privacy invasions, and online scams. You won't be hampered by this strong protection. To get to the top, enjoy a minimal performance impact and common problems fixed. -
48
Relution
Relution
$2 per monthManage iOS, Android, Windows 10/11 devices. You can secure your devices with configurations and restrictions. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Manage and inventory native and public Apple, Android, Windows and Windows mobile apps. Apps for mobile devices can be reviewed, approved, and published. Allow employees, partners, or other stakeholders to access enterprise apps via your corporate app store. You can manage your Apple iOS and Android tablets securely and deploy the appropriate apps in your school. Relution's Mobile Device and App Management is a benefit for all sizes of companies, authorities and teams. Relution is used by IT Retailers, Educational Institutions, and Resellers to provide this service to their customers. Relution is a leading IT application in the digital education sector. Relution has been the leading mobile device management solution that is privacy-compliant and cross platform for over ten years. -
49
SureMDM
42Gears Mobility Systems
$3.49 per monthSecure, Monitor, Manage, and Manage employee-owned devices. You can avoid security risks and resolve maintenance issues throughout the device's lifecycle. 42Gears SureMDM is an intuitive and powerful MDM software and app for Android, iOS/iPadOS and Windows. It can also be used on iOS/iPadOS and Windows. You can manage, secure, monitor and manage company-owned devices. Employee-owned devices can also be used to access company data (BYOD). SureMDM integrates all aspects enterprise mobility through unified endpoint administration, including Mobile Application Management and Mobile Device Management. SureLock is available for kiosk lockdown, SureFox is a secure browser for lockdown, and SureVideo is a secure digital signage solution. -
50
Sophos Mobile
Sophos
1 RatingSophos Mobile is a secure Unified Endpoint Management solution (UEM) that allows businesses to spend less time managing and protecting mobile and traditional endpoints. Sophos Mobile is the only UEM solution that integrates with a top next-gen endpoint security system. It supports management of Windows 10, iOS, Android, and MacOS devices. Sophos Mobile allows you to secure any combination personal and corporate-owned devices quickly and easily. The flexible self-service portal allows users to enroll their devices, reset passwords and get help without IT involvement. This makes it easier for users to bring their macOS, Windows 10 or mobile devices to work. Container-only Management allows admins to have full control over corporate content within the Sophos Secure Workspace and Sophos Secure Email apps. This is without the need for management of the mobile device. Protect business data from malware and ensure it doesn't get lost.