Best IT Security Apps for Android - Page 22

Compare the Top IT Security Apps for Android as of May 2026 - Page 22

  • 1
    Panda Fusion

    Panda Fusion

    WatchGuard Technologies

    Fusion combines our Systems Management and Endpoint Protection Plus solutions to protect, manage and support all of your corporate devices. Our Cloud-delivered solution allows a rapid deployment without needing maintenance or costly investments in server infrastructure. Complete your endpoint security solution with a wide range of IT & endpoint security operations products and modules that will allow you to minimize the attack surface and reduce risk of incidents. Identify and block malicious behaviors or noncompliant activity, manage your vulnerabilities, deploy patches and updates, encrypt your data, and manage your corporate systems and endpoints. Everything you need is included in a single platform from WatchGuard.
  • 2
    eScan

    eScan

    MicroWorld Technologies

    eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection and endpoint detection and response (EDR) solutions as well as anti-spam solutions for email and multi-factor authentication.
    Starting Price: $58.95/one-time/user
  • 3
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
  • 4
    Chetu

    Chetu

    Chetu

    Chetu is a US-based software development company that provides startups, SMBs, and Fortune 5000 companies worldwide with custom technology solutions. With an unparalleled software delivery model suited to the needs of the client, Chetu's one-stop-shop model spans the entire software technology spectrum. Headquartered in Sunrise, Florida, Chetu has sixteen locations throughout the U.S., Europe, and Asia, with over 2,200 software experts worldwide. Chetu is a true and seamless backend technology partner, helping your business accelerate the development of desktop, mobile & web-based apps with on-demand developers that focus on moving your business forward. Most software companies insist on owning their own source codes to prevent their clients from seeking out other vendors or tools. Under our agreement, you are the sole proprietor of the source code and intellectual property.
  • 5
    PeoplePlatform

    PeoplePlatform

    Web Active Directory

    PeoplePlatform allows you to automate and delegate all the common tasks associated with Identity Management. Stop spending time on provisioning, deprovisioning and directory updates, instead empower your organization to handle these tasks through a simple web interface. Built from the ground up to be customizable, create simple web interfaces to handle even the most complex identity management tasks in your organization. Single and Bulk Deprovisioning – remove access of individual users to your organization’s resources. Handle Workflows – Workflow jobs can be set-up to run after an object is provisioned.
  • 6
    Trojan Killer

    Trojan Killer

    Gridinsoft

    GridinSoft Trojan Killer will perform the complete cleanup of your system from viruses. Plus, we will help you restore the ideal performance of your PC. Is a virus removal tool: fast, effective and reliable. For more convenient use we make it portable now – so that it is easy to run it on any computer. Even when internet is blocked! This antimalware solution effective for any cyber threats. We offer all-in-one tool that can assist you in removal of annoying advertisement modules, spyware and other malicious instruments developed by hackers.
    Starting Price: $35.95 per year
  • 7
    ClusterSeven

    ClusterSeven

    Mitratech

    With ClusterSeven Shadow IT Manager, gain control over the hidden spreadsheets and other data assets that put your enterprise at risk. Discover and manage the hidden, sensitive spreadsheets, applications, and data assets that lie outside of IT’s control – and create risk. Now you can easily and efficiently capture and maintain an inventory of the files your organization relies upon and monitor who’s making changes, helping you meet audit and compliance requirements and prevent problems before they impact your enterprise. Classify the risks associated with your newly discovered EUC files and organize them in a centralized database. Once you’ve established the spreadsheets your organization is using, you can carry out a deeper risk analysis on critical files using rules that matter to your business, such as the complexity of a formula or macro, use of sensitive terms in the file like “confidential,” inclusion of unprotected client or personal data, or the presence of hidden worksheets.
  • 8
    Voolsy Lock

    Voolsy Lock

    Voolsy Lock

    Voolsy lock gives you control of your all android devices from single platform. Be it the activities of sales staff or handling devices employed in your dining space, Spare yourself the worry of managing numerous devices and employ Voolsy Lock system to get smoothen work processes. Avoid technical hurdles and control devices from a single location with Voolsy Lock system. Voolsy Lock is the enterprise mobility management solution that secures, manage and monitor corporate owned mobile & tablet devices. Voolsy Lock helps access those apps and files which are necessary. It leads to necessary and limited usage of internet data.
    Starting Price: $12 per device per year
  • 9
    authID.ai

    authID.ai

    authID.ai

    Launch the power of mobile facial biometrics to deliver seamless identity fraud protection across the digital identity lifecycle. Onboard customers with ease. Weed out the bad guys early. Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. Our mobile biometric solutions help you onboard customers and verify their presence with ease while ensuring their accounts cannot be compromised by account takeover or identity fraud. Learn how authID can help you transform identity management.
  • 10
    Primetime DRM
    Adobe Primetime DRM is an UltraViolet approved content protection platform for premium video. Adobe Primetime DRM can protect content and enable flexible business models such as anonymous, subscription, rental, and download-to-own content for desktop (Windows, Mac), iOS, Android, Roku, Xbox and embedded device platforms. Account means a billing account for the customer’s multi-channel and on-demand video delivery service. Active Device means a device that is counted the first time a unique user starts to view customer content via a customer player on a device.
  • 11
    DRM-X

    DRM-X

    Haihaisoft

    DRM-X 4.0 content protection platform, with new security architecture and more advanced security features. You can securely distribute protected Audio/Video, PDF, Web pages, Images and Javascript to Windows, Mac, iPhone/iPad and Android. With DRM-X 4.0 protection, you can get rid of the problem that you cannot effectively deliver and sell these contents due to piracy. DRM-X, Haihaisoft's digital rights management platform. Haihaisoft provides DRM as a service. The copy protection platform includes: File Encryption, Audio/Video Encryption, PDF Encryption, and Web Page (HTML DRM Encryption), all of them with DRM-X 4.0 advanced DRM features, and you can manage users, groups, rights and license profiles online in your DRM-X account. DRM-X 4.0 is a new generation DRM software platform based-on Xvast browser. It with new security architecture, support online/offline playback, improved user experience. DRM-X provides dynamic watermarking capabilities on protected digital content.
  • 12
    PeakMobile

    PeakMobile

    My PeakMobile

    Deploying and managing hundreds of corporately issued mobile devices robs you of precious time. Our solution gives you back that time while lowering your bill! It’s not about what we say but what we have done. Peak Mobile Software and Service converts what you used to hate into something that gives your more of what you want, time & money. We are a full-service managed mobility company with nearly 20 years of experience in the cellular industry. We are based in beautiful Salt Lake City, Utah. Our roots started in the early 2000s when smartphones were just entering the scene. We have seen the innovation of cellular technology change the landscape of how companies conduct business and how our world has become mobile. With the innovation of 5G networks becoming mainstream, companies are more reliant than ever before on their mobile services.
    Starting Price: $2 per month
  • 13
    NCP

    NCP

    NCP engineering

    For individual workstations, freelancers or smaller installations, NCP Entry Clients offer a wide range of technical features and offer much more than a standard VPN. Our Solution Finder will help you find the right NCP product for your organization. No matter what hardware you use, whether you are looking for a solution for use in your own company or as a partner for your customers, for a few employees or large installations, we will guide you to the right product in just a few steps. With 30 years of experience in remote access environments, NCP is an excellent choice for a complete VPN solution that meets the needs of users, IT administrators and management. NCP’s remote access solutions are fully-automated, highly secure and cost efficient covering important benefits.
  • 14
    Virtual Badge

    Virtual Badge

    Disaster Solutions

    If you need a simpler way to issue and use ID cards, look no further than Virtual Badge. Where plastic badges can be annoying & hard to manage, Virtual Badge is easy. If you need a simpler way to issue and use ID cards, look no further than Virtual Badge. Where plastic badges can be annoying & hard to manage, Virtual Badge is easy. Virtual Badge is a quick and easy ID Card solution for events, conferences, meetings, and more. Your people download the Virtual Badge app, request a badge and then you approve it - it’s that easy!
    Starting Price: $5.00/month/user
  • 15
    Bolt

    Bolt

    Bolt Financial

    Bolt is a next-generation checkout platform designed to make online purchases faster, safer, and more intuitive. It uses an intelligent shopper network to recognize customers instantly and enable one-click, passwordless checkout. Bolt adapts in real time based on shopper behavior, preferences, and purchase history. The platform helps businesses reduce cart abandonment and increase repeat purchases. Bolt integrates seamlessly into existing ecommerce stacks without disrupting current workflows. Its identity-driven checkout builds trust and improves conversion rates across sites. Trusted by leading brands, Bolt turns checkout into a competitive advantage.
  • 16
    Exigence

    Exigence

    Exigence

    Exigence is providing a command and control center software to manage major incidents. Exigence automates the collaboration among stakeholders within and outside of the organization and structures it around a timeline that records the steps taken to resolve an incident and drives workflows across stakeholders and tools, thus ensuring all stakeholders are working off the same page. The product ties together stakeholders, processes and tools already in use, driving down time to resolution. Customers who have purchased and are using Exigence , have seen a more transparent process, faster onboarding of relevant stakeholders, and a reduced time for the resolution of critical incidents in general. They are using Exigence to address critical incidents, but also for cyber events as well as planned incidents like business continuity testing and software release.
  • 17
    Introviz

    Introviz

    Introviz

    Introviz delivers powerful, patented technology to thwart the growing threat of cybersecurity to the corporate network. The battle of IT security originated, more than several decades ago, at the network entry points – routers, switches, firewall etc. Most companies have smart network engineers combating the hackers and have some consolation that they are attending to this problem – A false sense of security! The Cybersecurity battle has in the last several years has migrated to the “back door entry point” – employees’ browsers! Your employees surf on work, home, and public networks, and will inadvertently bring outside trackers and targeted zero-day malware into your network. Anti-Virus, VPN, Firewalls and Phishing Site protection protects against known phishing sites and viruses – not browser content. The browser has become the new gateway to phishing and malware. And the malware can spread from employee device to your network.
  • 18
    Citadel Team

    Citadel Team

    Thales SIX GTS

    As easy to use as your personal communication apps, Citadel Team is compatible on all your terminals and offers all the standard features of instant communication. Operated by Thales and hosted in France, Citadel Team offers a high level of security and guarantees a model without data resell. Activated when necessary, with the end-to-end encryption option, only your devices can read your conversations. Deploy, control and manage your corporate fleet from the Citadel Team administration console, while guaranteeing the identity of your users via their professional e-mail. Increased team reactivity, centralized conversations and file sharing in private or public personalized spaces for your projects. Boost communication by inviting thousands of members in dedicated chat rooms! Citadel Team also allows you to discuss privately with each of your internal collaborators and invite external partners.
  • 19
    LoginCat

    LoginCat

    TekMonks

    Everybody claims an easy and secure solution, ours is. Solutions should be simple and easy. TekMonks is a Global Software Company headquartered in Washington DC, USA. We are a truly Global company with offices in across countries, including, USA, Canada, Japan, UK, Singapore and India, and 3 continents, North America, Europe and Asia. TekMonks is built on the knowledge and quality of our consultants and we all share an absolute passion for building world-class Enterprise Software and working with clients globally, enhancing and providing leading-edge technical solutions, with low risks and reasonable costs. Our core strengths lie in the domain of Cybersecurity, AI-based products, Enterprise Software Solutions Development, and Innovative Enterprise Mobile Application Development. Developing end-to-end Enterprise software solutions as well as providing software services to budding companies across the web and mobile platforms is our strength.
  • 20
    Nexusguard

    Nexusguard

    Nexus Guard

    The TAP program provides customized, cost-effective DDoS protection solutions for CSPs, protecting the core infrastructure while meeting customer demand for comprehensive DDoS protection. Most importantly, the program is designed to empower CSPs with the People, Processes and Technology in order for them to build, deliver and profit from DDoS mitigation services, aiding in their transformation into the next-gen CSP. Courses created and delivered by practitioners to equip your staff with real-world, executable skills and knowledge to lead your organization on its part of transformation and towards success. We facilitate carriers to easily deliver managed security services in a multi-tenancy environment through a real-time single pane of glass. We help safeguard the public utilities from DDoS attacks or any cyberthreats to achieve their service stability and ensure their normal operation.
  • 21
    CryptoSmart
    Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices. Available on Samsung Smartphones and Tablets for consumers: intuitive and simple solution for your users. Used by referring customers: solution adopted by the highest French government authorities and large international organizations. With Cryptosmart PC the data flows are secured end-to-end. Cryptosmart PC does not allow any interceptions between your PCs and the gateway (located in your IS) by using the technology for Cryptosmart mobile certified by ANSSI (National Agency for the Security of Information Systems).
  • 22
    ProOpti

    ProOpti

    ProOpti

    Enterprises can optimize their costs, usage and administrative processes, as well as ensure high-quality services, by using Pro as an in-house optimization solution. Pro offers individual enterprises control, awareness and a balance between their technology investments and business demands. Digitally documenting an enterprise’s utilization of IT services also lays the foundation for a smoother process at accounts payable, where costs are booked correctly the first time. Service providers can offer ProOpti’s solution as part of their software delivery to customers. Pro is instrumental for service providers wishing to support their customers in handling technology costs and usage as a centrally-purchased or managed solution, and it can function as a service provider’s own platform for transparent reporting and insights. Service integrators can also maximize their profits by using Pro to make sure that they don’t over-deliver on unused services.
  • 23
    Systancia Access
    Transparent authentication, in all forms, to all your applications, on premise or cloud. Access control solution to make the access of applications simple and secure. Systancia Access, formerly Avencis SSOX, a solution labeled France Cybersecurity, is an access control and single sign-on (SSO) solution that guarantees connection security while improving the user experience. Systancia Identity is particularly easy to use once the basic base has been set up and is therefore quickly adopted by users. In addition, the software is scalable without additional costs. Due to the growing amount of data within companies and organizations, and the fact that these data are sometimes sensitive, it is essential to protect them against any potentially devastating risk of leakage, as we are reminded daily by the press. An audit revealing risks to IS security or proven data leakage is like electroshock for IS security managers.
  • 24
    ZeroFox

    ZeroFox

    ZeroFox

    Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
  • 25
    PlayReady

    PlayReady

    Microsoft

    Microsoft is committed to working with companies across the content delivery spectrum to ensure that consumers can access premium content inside or outside the home regardless of the device or service they choose. CBC-S support in software clients! Run PlayReady Server on Linux with full Async performance boost! Plus, many more improvements. Addresses content owners' full 1080p, 4K and higher resolutions, as well as early window content protection requirements. In an effort to accelerate the adoption of PlayReady and HTML5 EME on devices such as mobile phones, set-top boxes and smart TVs, Microsoft will provide a standard set of tools for integrating PlayReady into next-generation browsers on those devices. These tools will shorten development times and reduce complexity for ecosystem partners while enabling service providers to offer premium video directly through a viewer’s browser without requiring plug-ins.
  • 26
    DERDACK Enterprise Alert
    Derdack’s enterprise alerting software automates alerting processes and enables a fast, reliable and effective response to incidents threatening the continuity of services and operations. This is in particular important for 24/7 operated mission-critical systems and IT. Our critical alerting software combines four pillars to effectively respond to incidents – automated alert notifications, convenient duty scheduling, ad-hoc collaboration and anywhere incident remediation. Enterprise Alert provides automated, and persistent alert notifications by voice, text, push, E-Mail and IM. It tracks the delivery of notifications, acknowledgments and replies and reacts automatically on non-delivery or non-reply by utilizing escalation chains, on-call schedules and presence information. Enterprise Alert enables convenient scheduling of on-call duties by drag & drop in any browser. Based on scheduling information it can then alert the right engineers at the right time.
  • 27
    Ericom Shield

    Ericom Shield

    Ericom Software

    Ericom Software provides businesses with Zero Trust Secure Access to corporate applications, in the cloud and on-premises, from any device or location. Ericom Shield is a clientless enterprise-grade solution that is designed to address the needs of security and IT professionals while providing a transparent Internet experience for end users using Remote Browser Isolation. Ericom Shield can be deployed across organizations of any size, on all devices, using any operating system, or browser and does not require installation of any software or plug-ins on endpoints. Files to be downloaded are scanned and cleansed using a pre-integrated, Content Disarm and Reconstruction (CDR) process, before being released to the user device. When it comes to phishing attacks, user training just isn’t enough. Ericom Shield executes email-embedded URLs away from endpoints, in remote virtual browsers in the cloud or DMZ, so no malware can reach endpoints.
  • 28
    Hush App

    Hush App

    Syneidis

    Encryption is easy. Secure file transfers for Android, iOS and Web. Send encrypted files to anyone, even if they don’t have the app. Set up a business account, invite users to the team and manage permissions. HushApp is extremely easy to use whether you send or receive files. We don't have any information about you, your keys, files you store or send. With HushApp you can send encrypted files even to users who don't have the app. We use military-grade AES-256 and RSA-2048 encryption standards to protect your files. We are based in European Union and so are our servers. Do you want to secure business communication or preoccupied about GDPR? Our app helps you to keep all the work-related documents private and safe. HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.
  • 29
    VeriFinger SDK

    VeriFinger SDK

    Neurotechnology

    VeriFinger is a fingerprint identification technology designed for biometric systems developers and integrators. The technology assures system performance with fast, reliable fingerprint matching in 1-to-1 and 1-to-many modes. Available as a software development kit that allows development of stand-alone and network-based solutions on Microsoft Windows, Linux, macOS, iOS and Android platforms. In 1998 Neurotechnology developed VeriFinger, a fingerprint identification technology designed for biometric system integrators. Since that time, Neurotechnology has released more than 10 major and minor versions of the VeriFinger, providing most powerful fingerprint recognition algorithms to date. Numerous awards in competitions and technology evaluations, including NIST MINEX, PFT III and SlapSeg III, have been received by Neurotechnology's fingerprint recognition algorithms. Rolled and flat fingerprint matching that is tolerant to fingerprint translation, rotation and deformation.
  • 30
    Spectra

    Spectra

    Sectona Technologies Pvt Ltd

    Sectona was started with a purpose to engineer simplified, modernly architected cross-platform privileged access technology. Our core focus is to prevent & detect breaches that occur under the cover of insider threats &/or privileged attacks. With our cross-platform & deeply integrated Privileged Access Management (PAM) solution Spectra, Sectona enables enterprises achieve enhanced security by adopting a refreshed PAM approach. Sectona currently works with customers across sectors.
MongoDB Logo MongoDB