Best IT Security Apps for Android - Page 16

Compare the Top IT Security Apps for Android as of May 2026 - Page 16

  • 1
    AssureID

    AssureID

    Acuant

    Real Time Multi-Factor Identity Verification Software AssureID offers fast multi-factor authentication to improve customer experiences, increase conversion rates and mitigate fraud. Patented technology authenticates IDs by applying 50+ forensic and biometric tests, in seconds, utilizing the industry's largest document library. Acuant's library is powered by human-assisted machine learning for the highest accuracy. AssureID eliminates manual errors, speeds up the document inspection process, and significantly reduces employee training. Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 2
    BETTER Mobile

    BETTER Mobile

    Better Mobile Security

    BETTER Mobile Threat Defense protects mobile devices from attacks and threats. It’s simple, affordable, and powerful. Lightweight mobile agent that provides endpoint protection. Deploy it in minutes via EMM. Streamlined admin console gives immediate visibility, intelligence and control over device risks and threats. The console provides rich information and easy policy management, but our goal is to keep you from ever needing to use it. We have built one of the most advanced machine learning platforms and focused it on mobile threat detection. With our global mobile sensor network feeding rich intelligence into Deep Thinker, a cloud-based AI engine, BETTER MTD provides highly accurate detection of risky apps, anomalous behavior, and network threats. The detection engine provides comprehensive around-the-clock protection for your company data and resources. Runs in the background only consuming 5% battery and 1% CPU.
  • 3
    KITEWIRE Mobility
    Mobile device management (MDM) is a balancing act. You need to protect your company’s most valuable asset—proprietary data—from theft and misuse. But your employees need the freedom to use mobile devices that aren’t hampered by security software. Every organization should be free to use the right devices and technology to meet it’s mission. If you’re like many CIO’s, you might be trying to strike a balance between giving your employees the freedom to use the right devices and the necessity to protect your company’s proprietary information on those devices. Your IT administrator can have this intuitive, user-friendly tool up and running in six minutes. You don’t even have to schedule time with our team to walk you through it (but we’re here if you need us).
    Starting Price: $1 per device per month
  • 4
    Comodo Endpoint Security Manager
    Comodo Advanced Endpoint Protection provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks while offering advanced, real-time management and control over critical system resources. Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivaled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. The full Comodo Endpoint Security suite brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) to the point of impact - the desktop environment. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000 limited warranty against infection.
    Starting Price: $4.00/one-time/user
  • 5
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. Bit4id has extensive knowledge and experience in the development of software and tools for security and digital identity management based on Public Key Infrastructure (PKI). Providing solutions for managing more than 10 million digital identities, and processing more than 50 million digital signatures a year, Bit4id is a company leading in innovation for the PKI and digital identity market in Europe and Latin America.
  • 6
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 7
    VIPole

    VIPole

    VIPole

    Message editing and deleting, auto-delete messages, chat window clearing and complete history wiping. Disconnecting devices remotely, fake secret phrase, auto lock and auto logout on inactivity. Hidden and blacklist contacts, individual visibility settings for contacts, configurable contact authorization. Assign tasks to yourself and colleagues, track the progress. Store and organize passwords, securely share them with contacts. Foster collaboration by setting goals for the team and monitoring the solved issues.
    Starting Price: $5.99 per month
  • 8
    Password Reset PRO
    Self service password reset software (SSPR) and identity management for Active Directory 2012, 2016, 2019 domain users. Secure for password self service outside of the domain by remote users. Easy to install. Perfect for Office 365, OWA, VPN, Azure, Mobile, BYOD users. Rapid deploy – No Databases – Use it free for a month! Server 2003 through 2019 supported. Password Reset PRO is the only enterprise-class web based self service software designed specifically for secure external (public) access by end users, allowing them to quickly change or reset their domain password and unlock their account without IT intervention. It is very easy to install, test and deploy, no databases required or changes to the domain, no disturbing users.
    Starting Price: $598.00/one-time/user
  • 9
    Array APV Series

    Array APV Series

    Array Networks

    Array APV Series application delivery controllers provide the availability, scalability, performance, security and control essential to keeping applications and servers running in their power band. Integrated local and global server load balancing, as well as link load balancing, ensure the highest levels of resiliency for your applications, while connection multiplexing, SSL offload, caching and compression work together to deliver the fastest end-user experience possible. What’s more, by terminating connections on APV Series ADCs, applications are protected behind Array’s WebWall® application security suite. Available as physical or virtual appliances, or on popular public clouds, Array ADCs are designed to meet technical requirements while remaining simple enough for any size IT team and affordable enough for any size business.
  • 10
    IDM365

    IDM365

    ITMC Soft

    The scenario in this video represents a problem that plagues many organizations on multiple levels. But it doesn't have to. See how a proper identity and access management solution can help. Effeciency is achieved through a workflow which automatically provides matching account access for the new hire. Our user-centric interface makes it possible for business to control and own the process allowing IT to focus on what they do best. Support for policies such as Segregation of Duties (SoD) protects your business against collusion and fraud. Powerful reporting tools provide instant access to audit trails, turning audits into your chance to shine. An organization or business may have a number of systems in use such as Active Directory, Exchange, Oracle and SharePoint, and they may have hundreds or even thousands of users who need to access them. Managing all of these users’ accounts and the access allowed for each one is generally known as identity and access management, or IAM.
    Starting Price: $5 per user per month
  • 11
    CodeMeter

    CodeMeter

    Wibu-Systems

    CodeMeter is the award-winning protection, licensing, and security system that gives software publishers and ISVs as well as intelligent device makers a complete arsenal to protect IP and fight cyber-threats while harnessing the power of smart licensing to monetize and grow their business. CodeMeter includes a complete lineup of license containers - hardware-, software-, or cloud-based - to store secret license keys safely, a set of stealthy encryption modules, and a versatile array of backend and frontend tools for license management, augmented by professional services. CodeMeter License Central is the versatile gateway to license creation, delivery, management, and monitoring across the complete license lifecycle. The integral CodeMeter Protection Suite comprises a suite of tools that automatically encrypt the compiled code to protect software from piracy, counterfeiting, reverse engineering, and tampering.
  • 12
    Matrix42 EgoSecure Data Protection
    Everything runs as before, but securely. All-round protection for all your devices, applications and sensitive company data. Your data remains secure. While digital networking and device diversity offer more flexibility, they also increase the risk of malware, data loss, and theft. Traditional firewall and antivirus protection is no longer enough to close security gaps. With just a mouse-click you get a graphically prepared overview of all data flows in the network and automatically trigger appropriate protective measures. Insight Analysis – determines the overall situation of your company network with regard to data security so that you can derive the optimum protective measures. The analysis results are available to you as a clearly structured dashboard. Conclusions about the activities of individual users are not possible. The reports can be generated automatically and sent by e-mail.
  • 13
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 14
    Core Access Insight
    Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business. With Access Insight, your governance system does more than just manage access. It provides access intelligence to analyze the identity and access data in your organization, using advanced analytics tools. This enables you to perform data mining, statistical analysis, and data visualization—drawing on specific governance policies, rules, and risk indicators to provide intelligence and valuable information for administrators, analysts, compliance officers, and incident responders.
  • 15
    Net Monitor for Employees
    Employee monitoring software has become an essential tool for tracking your employee activity to increase productivity in offices. It happens many times that many team members spare their time in watching unnecessary content on the Internet or using your resources for their personal use or just spending time in web browsing. Employee monitoring is an established method used by many companies to help prevent and detect data breaches that can cost their business a fortune. It is an effective way to boost workers' engagement and optimize working processes. Computer monitoring gives companies an overall picture of how work is done in and out of the office. By using computer surveillance software an organization can lower risk and become more profitable. Gathered data can be used for analyzing bottlenecks, unusual patterns, and other potential issues.
    Starting Price: $99.95 one-time payment
  • 16
    Mvine

    Mvine

    Mvine

    Providing your client with a highly personalized and secure mobile app requires integration with on premise and in-cloud systems. To be successful you must overcome the challenges of single-sign on, federated user profile management, automated context provisioning and Seamless multiple API integration - all happening in near-real time. Mvine has both the technology and expertise to build mobile applications that integrate with a range of directory services, location services and systems of record to create highly personalized customer experiences. The highly sophisticated context provisioning engine operates in near-real time, allowing for experiences based on where customers are, what is known about them and what they are doing.
  • 17
    FortKnoxster

    FortKnoxster

    FortKnoxster

    One-stop E2E encrypted platform made by cybersecurity experts. Crypto Suite™ is all you need in the jungle of crypto apps. The safest app available for all your crypto needs. All your valuable and private stuff in one secure place. Communications, cryptocurrencies and private files. End-to-end encryption and blockchain integration to ensure that only you are in control. We make it easy to handle your crypto. FortKnoxster is a true one-stop secure platform. Easy to share crypto and easy to invite your friends and contacts. The wallet in FortKnoxster is entirely non-custodial – only you have access to your funds. We don't have access - or anybody else. Only you hold the private encryption keys to your funds. Store all your coins and tokens in a single, secure mobile wallet. We support multiple blockchains and thousands of assets. BTC, ETH, FKX, ERC20, BEP20, NFT collectibles and other assets totally on your terms.
  • 18
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 19
    Spendgo

    Spendgo

    Spendgo

    Spendgo is an integrated loyalty and marketing platform that allows businesses of all sizes to automate and manage campaigns, creating a unified customer experience for its 12 million users by connecting point of sale and e-commerce platforms with third-party solutions. Spendgo provides behavioral data, as well as customer profiles and purchases history, empowering businesses to more effectively engage with their customers. With Spendgo you can reach your customers in-store, online or via mobile.
    Starting Price: $10 per month
  • 20
    WikiLocks

    WikiLocks

    WikiLocks

    WikiLocks works the way you do, within your most common applications. Simply select the data you wish to protect, assign access to individuals or groups, and distribute the newly protected document. The protection follows your document throughout its lifecycle, no matter how it is accessed, copied, pasted and attached.
    Starting Price: $40
  • 21
    Bravura Pass

    Bravura Pass

    Bravura Security

    Bravura Pass is an integrated solution for managing credentials across systems and applications. It simplifies the management of passwords, tokens, smart cards, security questions and biometrics. Bravura Pass lowers IT support cost and improves the security of login processes. Bravura Pass includes password synchronization, self-service password and PIN reset, strong authentication, federated access, enrollment of security questions and biometrics and self-service unlock of encrypted drives. Users may also have smart cards or tokens that users unlock with a PIN (which they will occasionally forget). They may also use security questions in some contexts or a password to unlock an encrypted drive on their PC. Some users use biometrics, such as finger prints, voice prints or face recognition to sign into systems or applications. Users may experience login problems with any of these credentials.
  • 22
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 23
    Cortado

    Cortado

    Cortado Mobile Solutions

    Set up and secure smartphones and tablets in no time at all. Regardless of whether it’s an organization’s own or a private device – with Cortado MDM, you’re ready to go right away and can manage mobile devices easily and securely via your central MDM console. Just sign up and you’re ready to start. Templates for BYOD, COPE, kiosk mode and other deployment methods help you to set up mobile device management within minutes. Share apps from public app stores or self-developed apps. Simply make your curated apps available in your own app store or push apps to devices with a few clicks. Help keep sensitive data secure. If devices are used for business and private purposes, Cortado MDM ensures the strict separation of both data sets. Make configurations for email, Wi-Fi and VPN settings in one central place and transfer the profiles and updates to the devices at the touch of a button.
    Starting Price: $5.40 per device per month
  • 24
    Intellock LMS

    Intellock LMS

    Intellock

    Intellock is a Digital Rights Management solution targeted and customized for several segments of content owners specifically targeting the pain points they face in sales and distribution management. Any content (whether it’s in analog or digital form) that is created is prone to duplication and redistribution and it’s fairly easy to do it. While analog media loses quality with each copy generation, and often even during normal use, digital media files may be copied an unlimited number of times without degradation in the quality of subsequent copies. Further, the abundance of digital devices such as laptops, mobile phone and/or tabs combined with the Internet and popular file sharing tools, have made unauthorized sharing of digital files (a/k/a digital piracy) common, possible and profitable. Over the years, various techniques have evolved to manage access control of digital content.
  • 25
    SecurePIM

    SecurePIM

    Virtual Solution

    Smartphones and tablets are becoming increasingly important for day-to-day work in government agencies and companies. SecurePIM for iOS and Android combines all important functions, such as e-mail, messenger and telephony, calendar, documents and much more, in a single application. The container technology ensures the highest security standards with encrypted data and true end-to-end encryption. Protects the personal data of citizens, customers and employees and avoids the risk of high fines for GDPR violations. Provides a quick start and low training and administration effort for employees and administrators. Saves hardware costs & increases employee satisfaction. Allows the use of private devices for business communication (BYOD). Less operational effort and greater flexibility Cross-platform and device-independent available for iOS and Android.
  • 26
    Delinea Privilege Manager
    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. You can prevent malware from exploiting applications by removing local administrative rights from endpoints and implementing policy-based application controls. Privilege Manager prevents malware attacks without causing any end user friction that slows productivity. Available both on-premises and in the cloud, enterprises and fast-growing teams can manage hundreds of thousands of machines through Privilege Manager. With built-in application control, real-time threat intelligence, and actionable reporting, it is easier than ever to manage endpoints and demonstrate compliance with least privilege policies to executives and auditors.
  • 27
    inDefend

    inDefend

    Data Resolve Technologies Private Limited

    inDefend helps you monitor every employee of the organization, regardless of the organizational size. Gain industry compliance suiting your company's needs and protect the company's data from being compromised. Better control over employee's on notice period and complete transparency over their activities. Generate full-fidelity profiles of all the employees and track their productivity and behavior on digital assets. Worry less about the productivity of remote employees, roaming workforce or employees working from home. Manage access permissions for huge groups of scattered employees with a cleverly orchestrated policy through our unique data flow analysis. Maintain screenshots of specific employee crimes who are responsible for damaging the company's reputation.
  • 28
    SecureCircle

    SecureCircle

    SecureCircle

    SecureCircle's Zero Trust data protection eliminates data breaches and insider threats by protecting all data outside of SaaS applications. SecureCircle's Data Access Security Broker (DASB) protects and monitors data, including data egressing from enterprise cloud services and managed repositories to enforce access controls on data regardless of location, including cloud and endpoint devices. SecureCircle protects data transparently and persistently at scale delivering the world's only Zero Trust data protection. Most modern SaaS applications allow end users to pull data out of the browser onto the device. More often than not, end users leverage these features for productive reasons. The challenge most businesses face with modern SaaS applications is identifying the difference between productive activity and a security threat. With SecureCircle, all data is kept secure as it comes out of SaaS applications, which allows users to leverage data that comes out of these applications.
  • 29
    MobileWare

    MobileWare

    MobileWare

    When it comes to IoT connectivity, you need stable, blazing-fast connections you can trust. MobileWare inspires forward-thinking customer connectivity with simple-to-deploy and easily managed mobile solutions. At MobileWare, we provide advanced end-to-end connectivity and IoT solutions for enterprises. We use industry-leading IoT connectivity technologies to support your business’ mobility, wireline, IoT, and security. Our unique MobileWare Single SIM™ simply and securely connects all endpoints between your customers around the world. When it comes to global IoT connectivity, you need a network that keeps your business connected in the wildest of weather or the most remote locations. And this is why MobileWare exists—to give your business a truly global IoT network connectivity that covers different parts of the earth. Bring your products and services to the market faster, using our secure, scalable mobile IoT connectivity.
  • 30
    GoGuardian

    GoGuardian

    GoGuardian

    Unify your filtering, classroom management, and school mental health tools into a single suite. GoGuardian’s suite of tools helps you maximize the learning potential of your 1:1 school technology program. Seamlessly integrate multiple device types and platforms into your 1:1 deployment. From Chromebooks and Apple devices to Windows and BYOD, GoGuardian’s suite of tools can help keep your students safe on any device. As the world of digital learning accelerates, we believe it is critical to study and understand the impact of the digital learning experience on student outcomes. Our dedicated impact research team is working tirelessly to understand this impact, and how digital learning can be improved. With an average response time of 30 seconds, our world-class support team is here to help you solve virtually any problem. We even provide direct support for your teachers. And our dedicated implementation team ensures you’re set up for success from the moment you deploy GoGuardian.
MongoDB Logo MongoDB