Best IT Security Apps for Android - Page 17

Compare the Top IT Security Apps for Android as of May 2026 - Page 17

  • 1
    Moki Total Control

    Moki Total Control

    Moki Mobility

    Moki creates mobile device management software that enables companies to manage large fleets of single-purpose customer-facing iOS, Android, and BrightSign devices. With our MDM software, mobile devices transform into kiosks, digital signage, and points of sale (POS). Moki MDM is the simplest solution for mobile device management on interactive kiosks, POS stations, and digital signage. Moki’s device deployment can be done in minutes. Once enrolled devices can be managed in bulk with Moki’s simple-to-use UI. Moki’s mobile device management platform helps turn any smartphone or tablets into a single-purpose POS terminal. With Moki these devices can be locked to a single application so you can be sure they are only being utilized as intended. Moki MDM provides the functionality needed to deploy and manage digital kiosks in any scenario. Additionally, when using our Moki Kiosk application users can lock to desired URLs, images, and videos for a consistent end-user experience.
  • 2
    Intuitive Password

    Intuitive Password

    Intuitive Security Systems

    Intuitive Password is a military-grade password manager that simplifies your online experience by remembering your passwords and confidential data for you. With Intuitive Password to manage your logins and passwords, it's easy to have an unique and strong password for every online account and improve your online security. Automatically syncs your data across all devices, so you can easily access your data from anywhere at anytime. Stop filling in the same login details over and over. Intuitive Password can login for you with one-click. Never again forget a username or password. Ever. Forget what it's like to go through tedious password resets.
  • 3
    Vaultize DRM

    Vaultize DRM

    Vaultize Technologies

    Achieve security and governance of files throughout their lifecycles, inside and outside your network. Vaultize enables your team to store, access and share files securely & easily and, you to protect & manage them, with digital rights management (DRM), secure file sharing and continuous data protection. The Vaultize platform is designed to protect enterprise data end-to-end - from external or internal threats, from accidental or intentional data leakage and, exposure. Vaultize offers secure and user-friendly solutions that enable teams to store and share files easily via any kind of device while giving IT and auditors complete visibility and control over those files. DRM protection - give and revoke access rights (view, edit, print, share, copy/paste & more). Powerful sharing controls at admin and user level. Full control of who, where, when, how & more.
    Starting Price: $5,000 one-time payment
  • 4
    Intertrust ExpresssPlay
    Content protection and anti-piracy services for premium and high-value OTT streaming and broadcast delivery. Cloud-based multi-DRM content protection and media monetization service for video streamers and content distributors. Cloud-based broadcast TV security solution, enabling direct-to-TV broadcasting to smart TVs without STBs/CAMs, reducing CAPEX/OPEX. Comprehensive anti-piracy services featuring digital fingerprinting, forensic watermarking, web monitoring and piracy take-down. The emergence of streaming as a crucial component of pay-TV business models has spawned unprecedented online piracy. Reversing this worrisome trend requires a new, innovative approach that goes well beyond legacy security platforms optimized for traditional broadcasting and streaming services. To ensure robust content protection in this new era, Intertrust offers the ExpressPlay Media Security Suite, comprising cloud-based multi-DRM service, anti-piracy and forensic watermarking services, and more.
  • 5
    Ransomware Defender

    Ransomware Defender

    ShieldApps Software Development

    ShieldApps’ Ransomware Defender deals with known ransomware in a way no other solution can. Specially designed for detecting and blocking ransomware prior to any damage, Ransomware Defender blacklists and stops both common and unique ransomware. Once installed, Ransomware Defender stands guard 24/7 utilizing active protection algorithms enhanced with user-friendly alerts and notifications systems. Ransomware Defender is fully automated, taking care of all threats via an advanced Scan > Detect > Lock Down mechanism that proactively stands guard to detected threats, and works alongside all main antiviruses and anti-malware products! Ransomware Defender also features a scheduled automatic scan, secured file eraser, lifetime updates and support! Detects and removes any known ransomware before it can take action and harm your PC. The program will deep-scan your device and find hidden ransomware in both high and low-level folders.
    Starting Price: $49.99 one-time payment
  • 6
    Comodo Dome Antispam
    Secure Email Gateway is an enterprise anti-spam and threat prevention system that uses a sophisticated array of spam filters, anti-virus scanners and content analysis engines to prevent unsolicited mail from ever entering your network. Security needs differ from employee to employee. You may want to apply different security levels to different employees such as from finance or sales departments. Dome Anti-spam gives you the freedom to define different types of profiles with different security features and restrictions. Containment protects from the newest forms of ransomware, zero-malware, and other advanced threats. The Valkyrie file verdict system analyzes unknown files. Users are free to open, execute and use the attachments with ZERO risk of infection. Comodo's unique containment technology ensures that risks are fully contained before reaching the end point, so there is no risk of infection, even from the newest malware.
    Starting Price: $4.00/one-time/user
  • 7
    CLYD

    CLYD

    Telelogos

    Clyd is an MDM / EMM solution to securely manage your devices. Administer, manage and secure Android and Windows smartphones or tablets with CLYD software. It offers the essential features of app management, device security and remote control. It gives your company a complete solution to manage a fleet of mobile devices, certified by Google and its Android Enterprise program. CLYD is acclaimed by many companies for its simple and intuitive use. Its scalability and reliability enable it to respond fully to the needs of small to large deployments. Use kiosk mode to create and deploy a secure work environment for users on your business devices. Deploy business applications developed in-house or from the Google Play Store; silently update applications. Have information at your fingertips about the general condition of your fleet, connection and deployment statistics, device malfunction alarms. CLYD is approved by Google and is compatible with Android Enterprise Recommended devices.
  • 8
    Mobility DNA

    Mobility DNA

    Zebra Technologies

    Mobility DNA unique software ecosystem transforms Android™, the world’s most popular consumer operating system, into an enterprise-ready force. Now, the pains common to other enterprise mobility platforms disappear — making application management simpler, integration problem-free and operations a powerhouse of productivity. During your mobile devices’ lifecycle, you’ll face different needs at different stages. Our software simplifies device lifecycle management throughout your mobile computers’ hardware journey. Ongoing functionality is continually raised to the latest, highest standards. Make your investment last through Mobility DNA. Maximize mobile user productivity and minimize IT complexities across operations, IT, developers, frontline workers, and more, with our built-in software capabilities. Greater device protection against a world of security threats, reducing your risk and extending the lifespan of your device.
  • 9
    Appvance

    Appvance

    Appvance.ai

    Appvance IQ (AIQ) delivers transformational productivity gains and lower costs in both test creation and execution. For test creation, it offers both AI-driven (fully machine-generated tests) and also 3rd-generation, codeless scripting. It then executes those scripts through data-driven functional, performance, app-pen and API testing — for both web and mobile apps. AIQ’s self-healing technology gives you complete code coverage with just 10% the effort of traditional testing systems. Most importantly, AIQ finds important bugs autonomously, with little effort. No coding, scripting, logs or recording required. AIQ is easy to integrate with your current DevOps tools and processes. Appvance IQ was developed by a pioneering team who envisioned a better way to test. Their innovative vision has been made possible by applying differentiated, patented AI methods to test creation while leveraging today’s high-availability compute resources for massive levels of parallel execution.
  • 10
    HCL BigFix

    HCL BigFix

    HCL Software

    HCL BigFix: Secure Resilient Operations, Powered by AI HCL BigFix is the platform for unified endpoint and infrastructure management, purpose-built to deliver on the Digital+ promise of reducing cost, risk, and complexity. Proven at enterprise scale, BigFix secures and manages 155M+ endpoints across nearly 100 operating systems. It leverages AI-driven automation to deliver continuous compliance and real-time vulnerability remediation with one of the industry’s best first-pass patch success rates (>98%). This is enhanced by AEX, our agentic AI platform, which transforms the digital employee experience through proactive, self-healing support. HCL BigFix is the single solution to secure any endpoint, in any cloud, across any industry.
  • 11
    MobiKEY

    MobiKEY

    Route1

    Generate exceptional outcomes for your organization with real-time secure delivery of actionable intelligence—whether in a manufacturing plant, in-theater, or in a university parking lot. With the right analysis, your performance potential is limitless. We can put the appropriate technology in place to help you find key insights and remove your limitations, all while assuring military-grade data security. Route1 help organizations of all kinds use the data they have—and data they didn’t even know they had—to make better decisions and gain tremendous advantages…with no compromise in data security. Secure data with patented technologies. Understand data with real-time acquisition and analytics. Visualize data with industrial-grade rugged devices. Leverage data with advanced technologies and services. We can help you leverage the data you have and the data you didn’t know you had to make better decisions, gain tremendous advantages and generate exceptional outcomes.
  • 12
    CyberEasy
    A Powerhouse Threat Detection Solution for People and Organizations. Your IT and Information security team are under enormous pressure to protect the Network from external attack and prevent your data from being stolen because of internal/staff errors. CyberEasy puts the power in your hands to be in control of your environment and reduce the cost. We want to democratize Cyber Security by making it simple to use and affordable for literally any budget.
    Starting Price: $7 per user per month
  • 13
    VdoCipher

    VdoCipher

    VdoCipher Media Solutions

    Videos streamed through VdoCipher player can't be downloaded using any internet plugins or software. VdoCipher is the complete video hosting solution for e-learning, media and marketing businesses. No downloader, plugin or hack can download or share the videos streamed through us. Hollywood certified DRM to stop piracy. Ip address, user id, email id, phone no, logo, text overlay. Custom size, color, speed to discourage screen capture. Amazon AWS for Servers + CDN. Transcoding, Analytics, API, Dashboard, Plugins, Custom workflows. Customizable player with subtitles, speed change, forward rewind options. Option for viewer to download secure in android app and play offline. DRM encrypted video streaming technology ensures that no downloader, plugin can grab your content. Highest security from video piracy with Widevine DRM. Viewer specific moving/static watermark with email, user id, IP, time stamp. Customize color, speed, transparency, size for watermark.
    Starting Price: $129 per user, per year
  • 14
    idgard

    idgard

    Uniscon

    Efficient collaboration done at the highest level of data protection. Idgard cloud saas: ultra-secure file transfer and data rooms. More than 1,200 companies around the world have already put their trust in idgard. This web service secures digital communication and collaboration with partners and customers at the highest level, and simplifies them as well. With the help of idgard, data rooms for projects can be set up in no time. They turn file sharing into an efficient and highly secure process. Users on the go have protected access to their data via app or browser. No one else has access to them. The internationally patented sealed cloud technology ensures this protection. It also automates key management. Instead of getting bogged down in technical questions, users can focus on their jobs. The following features make idgard unique: Over 1.200 Businesses trust idgard. Over 70.000 Users trust idgard The simple and secure storage and exchange of data online.
    Starting Price: $49.90 per month
  • 15
    Knowee

    Knowee

    Knowee

    Digital business cards. Knowee transforms your business card into a sustainable communication channel. 2,400 Trees cut every day to make business cards. 60 million Business cards printed every day. 746,594 tons of CO2 emitted to the atmosphere annually. Environmental impact and carbon footprint of your business cards. The way we work has changed when we stay at home Knowee - the new way to introduce yourself. Individual use. Paperless digital card. Enriched content with video. New communication channel in your email signature. and for business. Corporate identity with customizable templates. Centralised management. Usage KPIs. Corporate cardholder, CRM. Domain URL masking. Anti - Phishing. SSO - Single Sign-On. IT integrations. Traditional way 88% of all cards are lost in this process. Functional cards on any device. No sign up, no previous knowledge of the tool required. Share via email, WhatsApp, text, Bluetooth, NFC, AirDrop. Inmediate. Remote. Contactless
    Starting Price: $5 per user per month
  • 16
    Libraesva Email Security
    Protect your business from disruption, financial loss and reputational damage. Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides exceptional email security by integrating cloud email and a secure email gateway with Libraesva’s unique Adaptive Trust Engine that uses AI to learn the usual patterns of behavior for organizations and individuals, continuously assessing the strength of business-to-business trust and proactively holding anomalous traffic. Libraesva Email Security scans and filters all inbound and outbound emails for advanced malware, phishing, business email compromise, spam and more. Proprietary sandboxing technology removes dangerous payloads and active content from attachments, and you can protect users from visiting unsafe sites with active URL analysis that checks every link.
  • 17
    Super Gluu
    Super Gluu is a push-notification two-factor authentication (2FA) mobile app built to work with the Gluu Server. Super Gluu uses public-key encryption as specified in the FIDO U2F authentication standard. Upon device enrollment, Super Gluu registers its public key against the Gluu Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. Better identity access management for customers, citizens, and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network.
  • 18
    GoSecure

    GoSecure

    GoSecure

    GoSecure, a recognized cybersecurity leader and innovator, combines more than 20+ years of market-leading security technology with highly skilled professionals who become an extension of in-house security team to mitigate threats before they can compromise business operations. GoSecure Titan® Managed Security Services pioneers the integration of endpoint, network, and email threat detection into a single Managed Extended Detection & Response (MXDR) service. Our GoSecure Titan® Platform offers superior visibility and protection, detecting more threats and reducing security costs with faster threat mitigation. GoSecure Professional Security Services provides a full portfolio of testing and assessment services to evaluate cybersecurity maturity, identify risks and gaps. We define a roadmap tailored to your situation, needs, and budget, improving security posture. Our Professional Services find issues, our Managed Services fix them, helping you thrive.
  • 19
    Azure Front Door
    Scalable and secure entry point for fast delivery of your global applications. Easily join your distributed microservice architectures into a single global application using HTTP load balancing and path-based routing rules. Automate turning up new regions and scale-out with API-driven global actions, and independent fault-tolerance to your back end microservices in Azure—or anywhere. Deliver and protect your global application close to your end users with a "battle-tested" service built on world-class Microsoft Global Network infrastructure. Always keep your traffic on the best path to your app, improve your service scale, reduce latency, and increase throughput for your global users with edge load balancing and application acceleration. Easily manage domain mapping and traffic to your microservice backends using one central, global dashboard.
  • 20
    BooleBox

    BooleBox

    Boole Server

    BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. With boolebox solutions, we protect your data wherever it is, at work, in the cloud, in transit via e-mail, in shared projects, and in the most commonly used platforms, such as Windows, Outlook, Gmail, OneDrive, and SharePoint. We understand your potential digital vulnerabilities, and we protect them like no one else can because our protection is the bodyguard of your data. It never abandons it and follows it everywhere! We protect large amounts of data in different types of business sectors. We have been doing this every day since 2011.
  • 21
    RevBits Email Security
    RevBits Email Security is a next-generation email security solution that aims to close major gaps in the current marketplace. Leveraging sophisticated and unique algorithms such as a patented page impersonation detection methodology, Revbits Email Security achieves the deepest level of email analysis. For every email, RevBits Email Security displays a composite, probabilistic score of each email's risk level paired with full details for continuing user education. RevBits Email Security enhances Email Security Architecture RevBits Email Security enhances email security by detecting and blocking sophisticated malicious emails that get past the outer layers of an organization's email security stack. With RevBits Email Security, organizations can protect the last point of email interaction – the employee endpoint.
  • 22
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 23
    Cryptomator

    Cryptomator

    Skymatic GmbH

    Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all.
  • 24
    LifeLock

    LifeLock

    NortonLifeLock

    Criminals can open new accounts, get payday loans, and even file tax returns in your name. There's a victim every 3 seconds, so don't wait to get identity theft protection. Lock your TransUnion credit file in one click with Identity Lock. Help keep ID thieves from moving in on your biggest asset with Home Title Monitoring. Available when you choose Ultimate Plus. Scan common people-search sites with Privacy Monitor, find your info, and opt-out. It only takes a few minutes to enroll and install. If we detect a potential threat to your identity, we alert you by text, email, phone†† , or mobile app. We help block hackers from stealing personal information on your devices, and our VPN helps keep your online activity private. If you become a victim of identity theft, one of our U.S.-based agents will work to fix it. We’ll reimburse funds stolen due to identity theft up to the limit of your plan.
    Starting Price: $8.29 per month
  • 25
    DoubleClue

    DoubleClue

    DoubleClue

    DoubleClue is an Identity and Access Management platform from HWS Group in Bavaria to manage identities, rights and access. It secures company networks with modern multi factor authentication from cyberattacks targeted on digital identities / the "human factor". Plus, the platform offers an integrated password management and secure cloud storage for confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On premises or in the cloud. DoubleClue protects the component of your business that is not covered by firewalls and virus scanners – the human factor, the most vulnerable part in any IT security. All digital accesses and applications, passwords and confidential data protected by a strong all-in-one platform. In the digital working world, employees demand maximum flexibility. Enable them to work from anywhere with any device without compromising their IT security.
  • 26
    Avast Small Office Protection
    Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all their business devices. Run your business online safely and with confidence. Our solution will keep hackers away so you can focus on growing your operations. Effortless, layered next-gen endpoint protection that is easy to install and requires no management or configuration. No experience or IT staff required! Advanced endpoint security for employees in the office or on the go. Covers up to 10 devices, including PCs, Mac computers, iPads, iPhone, and Android mobile devices. 24/5 fast and friendly support from our highly trained technical engineers, who can assist you via email, chat, or phone. We’re here for you. Small Office Protection works effortlessly with your business’ existing hardware and devices. It’s a cost-effective solution that boosts productivity while delivering robust next-gen endpoint security.
    Starting Price: $11.67 per month
  • 27
    AVG AntiVirus Free

    AVG AntiVirus Free

    AVG Technologies

    Our free antivirus software just got even better. It now includes real-time security updates, scans for malware, ransomware, and performance issues, and even catches malicious downloads before they reach your PC. You also get an all-new, refreshingly simple design that shows you exactly how you’re protected. All of this, and it still won’t slow you down. Whether you choose free or full protection, you've got impressive security that even updates itself automatically. And with a cutting-edge virus scanner that blocks and removes viruses, you can be reassured that you and your family are protected from the latest threats. Stop viruses, spyware, ransomware & other malware, secure personal folders with an extra layer of ransomware protection, block unsafe links, downloads, & email attachments, scan for PC performance problems.
  • 28
    BlackBerry Access
    Enable access to your corporate network from personal or non-corporate managed devices, protecting enterprise data with full containerization to reduce the risk of data leakage. BlackBerry® Access provides a secure, intuitive user experience for intranet browsing. Employees get access to corporate intranets and apps on their personal or non-corporate managed devices. Simplify your bring your own computer program with desktop offerings from BlackBerry, giving you modern alternatives to traditional VPN and VDI solutions. BlackBerry® Desktop enables users to securely access corporate on-premises or cloud content and resources on their personally owned or non-corporate managed Windows 10 and macOS devices. It includes BlackBerry Access as well as BlackBerry® Work. BlackBerry Access is a secure browser that allows your organization to confidently enable mobile access to your corporate network. It supports iOS, Android, Windows, and macOS.
  • 29
    Blue Hexagon

    Blue Hexagon

    Blue Hexagon

    We’ve designed our real-time deep learning platform to deliver speed of detection, efficacy and coverage that sets a new standard for cyber defense. We train our neural networks with global threat data that we’ve curated carefully via threat repositories, dark web, our deployments and from partners. Just like layers of neural networks can recognize your image in photos, our proprietary architecture of neural networks can identify threats in both payloads and headers. Every day, Blue Hexagon Labs validates the accuracy of our models with new threats in the wild. Our neural networks can identify a wide range of threats — file and fileless malware, exploits, C2 communications, malicious domains across Windows, Android, Linux platforms. Deep learning is a subset of machine learning that uses multi-layered artificial neural networks to learn data representation.
  • 30
    Azure Information Protection
    Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it’s shared with. Configure policies to classify, label, and protect data based on its sensitivity. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation. Add classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. Track activities on shared data and revoke access if necessary. Your IT team can use powerful logging and reporting to monitor, analyze, and reason over data. Share data safely with coworkers as well as your customers and partners. Define who can access data and what they can do with it.
MongoDB Logo MongoDB