Best IT Security Apps for Android - Page 24

Compare the Top IT Security Apps for Android as of May 2026 - Page 24

  • 1
    IDnow

    IDnow

    IDnow

    It takes customers just a few minutes to conveniently register for your services. You need a quick and easy identity verification solution, available anytime and anywhere, while not comprising on security and usability? A blend of modern AI and machine learning, trained on millions of datasets and backed by the expertise of a network of top identity and fraud specialists, gives you the best of both worlds. KYC identification in just a few minutes. Available anytime, anywhere in 195 countries and 30+ languages. Excellent usability, desktop, tablet, IDnow mobile app or SDK and POS processes. Confirmed by very good user ratings. Modern AI and machine learning technology trained on millions of datasets. All data centers, ident centers and ident specialists are completely located in the European Union to ensure a high level of data protection for our platform. IDnow AutoIdent verifies documents anytime and anywhere.
  • 2
    Verified.Me

    Verified.Me

    Verified.Me

    Verified.Me, by SecureKey Technologies Inc., is the new and secure way to help you verify your digital identity, so you can quickly get access to the services and products you want online, in person and on the phone. Verified.Me offers a secure and convenient way to help Canadians verify their digital identities. Verified.Me is a digital identity verification network offered by SecureKey Technologies Inc. The Verified.Me service was developed in cooperation with seven of Canada’s major financial institutions – BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank and TD. The Verified.Me network continues to evolve, with plans of adding new digital identity providers and service providers to make your life easier. SecureKey’s Verified. Me digital identity verification service is now available in an easy-to-use, browser-based version.
  • 3
    GlobaliD

    GlobaliD

    GlobaliD

    Portable, private, and secure identity. Claim your GlobaliD, get verified, create and join groups, communicate, pay and get paid online. At GlobaliD, we’re building a universal identity solution that is easy to use, ties users to unique names and transcends borders and institutions. We build a self-sovereign identity platform that enables everyday action for people and businesses. GlobaliD's privacy and security solutions help you protect your customers and win their trust, without compromising experience. Our platform delivers a convenient onboarding and single sign-on experience, while empowering users to build digital reputations and to maintain consent-based control over their personal data. Our solutions free our partners from the burden of data storage and security, while providing data integrity and maintaining compliance. From identity management to data security to messaging, GlobaliD’s full-fledged platform does it all.
  • 4
    V-OS Face Biometrics and eKYC
    Optimized face biometric deployment options, at the highest level of security. Remote biometric registration. Detects and evaluates face and facial features in real time. Detects head poses, closed eyes, eye gaze, open mouth and spectacles. National identity tokenization. V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app, and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. V-OS App Protection solution can detect and protect the mobile app from threats, such as reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code-injection, debugging and more. In an insecure OS environment when the phone is compromised, apps integrated with V-OS Application Protection have rooted and jailbreak detection mechanisms that allows a mobile app to run smoothly.
  • 5
    ImageWare Authenticate

    ImageWare Authenticate

    ImageWare Systems

    Increase the fidelity of user access management with biometrics. Simple to use and easy to deploy, Authenticate provides true user assurance across your enterprise applications and end customer base. Add your existing environments and its self-enrollment feature to quickly get users up and running. For simple passwordless login, the users can choose the most convenient option from the enabled modalities. When a more secure authentication is needed, you can enforce use of two or more modalities to reach a higher level of security. Facial Authentication: using a mobile phone or laptop webcam, users look at the camera similar to taking a selfie. Highest level of authentication, particularly when combined with the NIST compliant Biointellic Anti-Spoofing technology. Voice Recognition: users speak a randomized phrase, typically using a mobile phone.
  • 6
    BioID

    BioID

    BioID

    BioID Web Service (BWS) is a cloud-based online service providing powerful multimodal biometric technology. User presence is verified through highly accurate face, eye and voice recognition, strongly secured by liveness detection. Our biometric authentication is as intuitive and user-friendly as taking a selfie and as trustworthy as a face-to-face transaction. Implemented as ‘Biometrics as a Service’ it can enhance the security of existing infrastructures in an easy way, avoiding costly redesign and reimplementation. BWS enables advanced, enterprise-grade biometric recognition available to everyone, on any device, anytime, anywhere, with dynamic scaling for reliable performance and availability.
  • 7
    SolidPass

    SolidPass

    SolidPass

    SolidPass is a leader in next-generation strong authentication, and protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software. Solidpass converts mobile phones, internet browsers, and desktop applications into robust security tokens. By eliminating the need for hardware tokens, SolidPass brings the highest levels of security at a fraction of the cost, and without the hassle of traditional, physical two-factor authentication tokens. SolidPass has bridged the traditional trade-off between usability and stronger security, and makes Challenge-Response (CR) and Transaction Data Signing (TDS) simple to use by incorporating advancements such as barcode scanning. Barcode scanning-based authentication can be used for Challenge-Response (CR) and Transaction Data Signing (TDS). Barcode scanning adds usability and convenience.
  • 8
    UnifyID

    UnifyID

    UnifyID

    Use UnifyID's authentication platform to remove passwords and one-time passcodes (OTP) from your user experience while improving security and consumer convenience. UnifyID offers Multi-Factor Authentication services that combine deterministic, behavioral biometric and environmental attributes using machine learning to uniquely identify users. Applies advanced machine learning to behavioral biometrics and environmental factors to create a secure digital fingerprint of the user. Passive authentication eliminates painful user experiences, causing poor adoption for Multi-Factor Authentication programs. Say goodbye to annoying passcodes, security questions or even passwords altogether. Our patent-pending technology leverages dynamic user attributes, such as motion and environment, which are neither known by the user nor remotely observable by an attacker; eliminating phishing and bot threats. We designed our solution with developers in mind.
  • 9
    NuDetect

    NuDetect

    NuData Security

    Our solution combines the power of our four integrated layers of security to verify users based on their inherent behavior. Used by major global brands, this solution protects online environments from login to logout. Don’t miss anything during a session. NuDetect is placed at different points across the environment to monitor users from the moment they enter your website until they leave. Find anomalous activity before it results in fraud. With our real-time solution, threats get blocked as they try to access your environment. Protect your customers passively. By looking at behavioral and device-based information, protect your users while they seamlessly enjoy your environment. No friction added. Evolve without lifting a finger. As we gather billions of data points, NuDetect for Continuous Validation learns to recognize your trusted customers, even as their online habits change. Machine learning capabilities adapt to user changes for higher recognition accuracy.
  • 10
    Blokada

    Blokada

    Blokada

    Blokada is the popular ad blocker and privacy app for Android and iOS. It's being supported and actively developed by the amazing open source community. If you want to efficiently block ads, trackers, malware, save on your data plan, speed up your device and protect your privacy with just one application, then Blokada is for you. It is free, secure and open source. For ultimate privacy protection, upgrade to Blokada Plus and connect through our VPN. We use WireGuard®, the most advanced VPN protocol, to encrypt your network activity and hide your IP address. Blokada Slim is a lightweight version of the app, and it only contains features allowed by the Google Play policy. Blokada is not only the privacy app. It is also the community of people who care about their digital privacy and wellbeing. You will find us on our forum, where you can ask any questions you may have. We are also present on other social media and chats.
  • 11
    Whalebone

    Whalebone

    Whalebone

    Whalebone is a zero disruption cybersecurity product for telcos, ISPs, and corporations that provides millions of everyday internet users unyielding protection from malware, phishing schemes, ransomware, and other malicious digital attacks without the need for them to download anything. Whalebone’s mission is to bring cybersecurity to 1 billion everyday people. Whalebone has repeatedly proven its potential by enabling important CEE telcos to properly protect their customers, while significantly raising their revenue. At this point, Whalebone has 200+ customers in telecommunications and corporate sectors around the globe.
  • 12
    Trellix Mobile Security
    Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, Trellix Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier, and even offline. Machine learning algorithms analyze device behavior deviations to uncover indicators of compromise and accurately identify advanced device, application, and network-based attacks. Extend visibility and control of mobile devices from the same console managing OS-based endpoints, servers, containers, and embedded IoT devices. Leave employees to their own devices and accommodate the human factor, without compromising the user experience or violating privacy. Trellix Mobile secures Android and iOS devices, including iPhones and iPads.
  • 13
    Symantec Endpoint Protection Mobile
    Threat defense tools that use a mix of vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling and transport security technologies to help defend mobile devices and applications from advanced threats. Mobile devices are more than just small computers in continuous use with perpetual connections to the Internet. The operating paradigm of these devices calls for new approaches to help ensure the data processed by them remains secure while maintaining productivity. Symantec designed the risk-based mobile security approach in Mobile Threat Defense from the ground up to defend against all detected threats that put business data at risk of exposure, theft, and manipulation while respecting users’ need for privacy, productivity, and a great mobile experience. Detect the most threats with on-device and in-cloud machine learning elements. Benefit from real-time processing, detection, and protection–at scale.
  • 14
    BlackBerry Protect
    AI detects and prevents attacks before they can execute, preventing users from opening URLs or visiting spoofing pages mimicking those of legitimate websites. It prevents, detects and remediates advanced malicious threats at the device and application levels. Malware and grayware are identified by application sandboxing and code analysis, plus app-security testing. All applications are scanned and validated before being pushed to the device or the user seeking access. All mobile endpoints BlackBerry UEM manages are protected from zero-day threats without reliance on end users to install, log in or maintain third-party apps or configure settings manually. Choose a single-point connectivity solution. Download once, distribute locally. Hybrid deployment facilitates security-related communication between the cloud and local infrastructure without exposing your network.
  • 15
    Malwarelytics
    Protect your app users from mobile malware and other device-related threats. Learn what malware is currently active on your users' devices, see which specific users have insecure devices, and actively help them fix their smartphone's problematic configuration as soon as it shows up on your radar. Mobile malware and cyber attackers became extremely sophisticated. They are looking for new ways to hack your mobile apps and cause damage. By misusing the mobile operating system features, they can gain an advantage and steal your users’ personal data or even money. Avoid these devastating consequences. After all, your business reputation is at stake! Malwarelytics® prevents the most common threats that mobile apps are facing these days and helps your organization stay safe and compliant. Device rooting or jailbreak disables security features provided by the mobile operating system, which opens the device to the attackers.
  • 16
    uCertify

    uCertify

    uCertify

    uCertify courses can be delivered in self-paced for IT professionals, mentor-guided for competency based educator, and instructor-led mode for schools and colleges. It begins with pre-assessment, interactive lessons, practice tests, lab and finally the post-assessment. Additionally, you can gauge your performance by test history and performance analytics. Our courses and lab are JAWS (Job Access with Speech) compliant. We provide enhanced accessibility to students with features such as option to change the font, size, and color of the course content, text-to-speech, interactive videos and how-to-videos with interactive transcripts and voice-overs. Our courses are highly interactive with virtual lab, simulations, and 50+ interactive items. Over 60 interactive items include true/false, multiple choice single or many option(s) correct, drag and drop, create a list & create and order list, hot spot, fill in the blank, performance-based, essay (manually graded), match lists, etc.
  • 17
    VirusTotal

    VirusTotal

    VirusTotal

    VirusTotal inspects items with over 70 antivirus scanners and URL/domain blocklisting services, in addition to a myriad of tools to extract signals from the studied content. Any user can select a file from their computer using their browser and send it to VirusTotal. VirusTotal offers a number of file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. The web interface has the highest scanning priority among the publicly available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API.
  • 18
    Avira Cloud Sandbox
    The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide.
  • 19
    Joe Sandbox

    Joe Sandbox

    Joe Security

    Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST).
  • 20
    Password Safe

    Password Safe

    Password Safe

    Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work).
  • 21
    VU Security

    VU Security

    VU Security

    We are a cybersecurity company specialized in fraud prevention and identity protection. Our mission is to provide secure digital experiences without friction, both for citizens and businesses, during the digital transformation process. We use different technologies applied for people recognition, based on their physiological or behavioral characteristics. Once the data has been captured, the system extracts a unique pattern for each individual, which will be used to make comparisons in the future. Transactional analysis of user behavior and channels for fraud detection and prevention. Secure, fast-response exchange of sensitive data through references to a vault of encrypted data. We provide a multi-channel fraud prevention solution that uses machine learning to create intelligent profiles and detect potentially fraudulent operations based on user behavior.
  • 22
    Puffin

    Puffin

    CloudMosa

    Popular browsers boast a plethora of features, but often fall short in fully protecting users. With our advanced cloud technology, Puffin provides all the benefits without sacrificing security. Our devices are extremely vulnerable to cyber exploits. With browsing sessions now inside the cloud, your phone, tablet, and computer are safe from hijacking. Designed for users in mind. The internal workload is reduced, resulting in improved processing efficiency.
  • 23
    AuthPass

    AuthPass

    CodeUX.design

    AuthPass is an open source password manager with support for the popular and proven Keepass (kdbx 3.x AND kdbx 4.x 🎉️) format. Store your passwords, share across all your devices and easily find them whenever you need to login. 🗄 All your passwords in one place. 🧬 Generate secure random passwords for each of your accounts. 🔐 Quick Unlock secured with biometric lock. 🔍 Keep track of your accounts across the web. 🖥 App available for Mac, iPhone, iPad, Android Phones and Tablets, Linux, Windows and on the Web. 📂 Open multiple password files at the same time (e.g. one for work, one for personal - or even share your password files with coworkers) ✍ Autofill your passwords (Android 9+, Support in browser only since Android 10+)
  • 24
    FacePhi

    FacePhi

    FacePhi Biometria

    The most complete solution for digital onboarding, authentication and security formed by different biometrics and antifraud systems of FacePhi, offered with the best user experience in the market. A combination of biometric and other security systems that creates a complete digital onboarding and identity authentication solution that allows to access, verify and operate different services and products in mobile and web applications. A framework with an easy integration that allows our client to choose which components to activate providing a better and seamless experience for the end user. Face recognition allows us to determine the identity of a person by analyzing the face. Unlike other types of biometry like iris or fingerprint, face recognition is non-intrusive; it does not require cooperation from the user. It just needs to capture the face of the person with a web cam.
  • 25
    oneSafe

    oneSafe

    oneSafe

    oneSafe provides advanced security for your passwords and confidential data. oneSafe is available from the App Store (oneSafe & oneSafe+), the Mac App Store and Google Play Store. Looking for a secure vault for your secret pictures and private videos? get oneSafe Pix. Forgot your PIN? Can’t remember your frequent flyer number? Struggling to memorize an ever-increasing number of passwords? With oneSafe, your problem’s solved! oneSafe lets you store all your personal information in one place with complete security. You’ll never get stressed about remembering passwords again. You’ll have them all at your fingertips with oneSafe! Plus, its well-organized system of categories, favorites and search features lets you find your stored information quickly and easily. We believe in security for everyone. Not only for big corporations or governments. But for you, all. And you will use oneSafe every day, so we made it simple and beautiful.
  • 26
    CTemplar

    CTemplar

    CTemplar

    We support anonymous usage and do not stockpile your personal data. Therefore, nothing can be made to reveal it. We use strong encryption and state-of-the-art technologies. This ensures the confidentiality of your messages. Iceland has among the strongest privacy laws that allow anonymous usage and instantly deleting your data. CTemplar’s exclusive 4-Wall Protection guarantees complete wall-to-wall protection of your data. Set a phrase that will be shown in your account. This will alert you to any phishing attempt. We allow anonymous payments using Monero. We are still building the monero payment processor so XMR payments are completed by contacting support. Automatic payments can be made with Bitcoin and card. Our server location in Iceland provides nearly unlimited natural energy resources and it's proudly run 100% by green energy, specifically geothermal and hydropower.
    Starting Price: $8 per month
  • 27
    MobileID.io

    MobileID.io

    ARIADNEXT

    Digital identity is defined as the identity of an entity on the web. It is the technological link between a real entity (a person, a company, an organization) and virtual entities, i.e. its digital representations. The digital identity thus allows the identification of an individual online, as well as his or her connection to services offered on the web. Gone are the lists of identifiers and passwords to remember to authenticate oneself online, from now on digital identity makes it possible to prove that the user is indeed the person he or she claims to be and thus to identify oneself to online services in a secure manner. These digital identities enable governments, public services, private companies and regulated activities (banks, Fintech, online games, etc.) to protect themselves against the risks of fraud and to comply with increasingly restrictive regulations while remaining accessible to the greatest number of people.
  • 28
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 29
    WithSecure Elements Infinite
    WithSecure Elements Infinite provides a comprehensive suite of security tools and capabilities as a continuous Managed Detection and Response (MDR) service that includes responding 24/7 to cyber security incidents and improving customers security posture through Continuous Threat Exposure Management (CTEM). Elements Infinite’s proprietary Endpoint Detection & Response (EDR) agent and log collectors feed data into our XDR detection platform, offering exceptional visibility into user, endpoint, cloud, and network activities. The primary service components cover the environments external attack surface(s), identity management systems (Entra ID), physical endpoints, corporate networks and cloud environments (AWS, Azure). WithSecure is a premier European cyber security company dedicated to helping our customers achieve compliance and effectiveness the European way.
  • 30
    Provision

    Provision

    Provision

    Today, management is aggressively adopting new technologies to drive growth. However, with technological advancement, an organization needs to identify and address risks. Digital risk is an essential part of business management. It’s focused on the threats and risks for enterprise information and the underlying IT systems processing them as they are implementing the full set of business processes. Today, organizations around the world are looking to embrace the latest technologies so that they can remain competitive in the global economy. Consequentially, these organizations are exposing themselves to more digital risk. We are offering end-to-end management and security tools for cybersecurity risk, third-party risk, business continuity risk, data privacy risk and other forms of digital risk add to the uncertainty of achieving business objectives. We’ll assess your current infrastructure and will recommend suitable solutions that can fill in those gaps.
MongoDB Logo MongoDB