Best IT Security Apps for Android - Page 28

Compare the Top IT Security Apps for Android as of May 2026 - Page 28

  • 1
    Yoti

    Yoti

    Yoti

    We’ve partnered with Post Office to provide accessible and inclusive identity services across the UK. The Yoti app is your secure digital ID. It’s the safe place to store your personal details, encrypted so only you can access them. When you need to prove your age, identity or other details about yourself, you can securely share just the details required without revealing everything about yourself. Give your customers a safe way to prove who they are with your business. Our verification solutions can be integrated into your website, app, terminal or managed through our custom platforms. Our systems are built in a way that means we cannot mine or sell data to third parties. Once we’ve completed our security checks, we can’t access any user details. We’re trusted by regulators for adhering to the highest standards of security. Yoti was founded on a strong set of principles that we uphold to ensure we continue to only build tech for good.
  • 2
    DOOT

    DOOT

    DOOT

    Instantly share verified official documents with “Authorized-to-know personnel”. Create contactless payment zones using our proprietary technology. Onboard customers using auto-fill forms and automated image capture technology. Human presence assurance using geo-location and time-stamp. Online MFA using secure digital identity via DOOT 1iD. DOOT harnesses the power of proprietary & patented technologies that you can trust, enabling each citizen to easily manage and share their digital identities from their personal mobile devices. Perfect for use-cases with high footfall and queues such as airports, banks, museums & cinemas. Your clients can now validate official iD’s, ticket stubs and much more without the need for pairing or expensive data networks. Each transaction is automated, logging accurate geo-location and time-stamp for the most seamless and secure customer experience.
  • 3
    Cuckoo Sandbox
    You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment. Malware is the swiss-army knife of cybercriminals and any other adversary to your corporation or organization. In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments.
  • 4
    Chimpa

    Chimpa

    Chimpa

    It takes just a few minutes to activate Chimpa and its ease of use makes it suitable even for inexperienced users. Chimpa supports iOS, iPadOS, tvOS and Android operating systems. The MDM is generally a distribution of a combination of applications and configurations on the device, company policies and certificates and back-end infrastructure, in order to simplify and improve the IT management of end-user devices. In modern corporate IT environments, the number and variety of managed devices (and user behavior) is the basis of MDM solutions that allow the management of devices and users in a coherent and scalable way. The general role of MDM is to increase the user-friendliness, security and functionality, while maintaining a certain flexibility for the user. Kiosk mode, security functions, blocking, remote initialization. Collection of analytical data on the use of the App and the network.
  • 5
    maat.ai

    maat.ai

    MAAT.ai

    Protecting our digital identity is of vital importance, especially in an era like ours, in which every step we take on the internet leaves a record that makes us vulnerable to theft and fraud. That is why maat.ai was born. A platform that uses blockchain, advanced cryptography and high security servers, it allows people to identify themselves and manage their information with confidence and security. By using the maat.ai Business platform, you can share information, in addition to requesting official documents from your employees, customers, suppliers and users in a practical and safe way. We verify the identity of your clients using biometrics and Facial Maatch, as well as the validity of their official documents through Maat Verify. For our team, your safety is the most important thing. All your files are encrypted and stored on maximum security servers; all transactions are confidential, and they are recorded on the blockchain.
  • 6
    CounterMail

    CounterMail

    CounterMail

    CounterMail is a secure and easy to use online email service, designed to provide maximum security and privacy without any unnecessary complexity. You can access your email account at any time, from anywhere in the world. Your account will always be encrypted and anonymous. CounterMail's encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail's secure email! We are using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
  • 7
    Samsung Pass
    Say goodbye to forgotten passwords. Get past security with just a glance or touch. Just use your biometrics to log in to your apps and websites quickly and securely. Samsung Pass is an ’identity management as-a-service’, enabling secure access through biometric authentication. Simply authenticate through biometrics without ID & Password input. No need to input an ID & Password to log in to websites anymore. Samsung Pass provides an enhanced user experience by integrating advanced biometrics. Your biometric template will be encrypted and secured by Samsung Knox. Samsung Pass adopts FIDO (Fast Identity Online) technology to ensure valid authentications and provide simple and secure biometric authentication services.
  • 8
    Secuve Q Authentication
    SECUVE Q Authentication is a unique and simple mobile authentication technology that can be applied to a wide range of applications including identification services, Fintech, online banking, etc. Authenticates users with secure authentication code generated by the combined operation of both one-time secure random value transmitted over the additional secure channel, and 'QR code'. Easy-to-use authentication by letting users touch or scan the QR code enclosing secure authentication code, or enter the numeric secure authentication code in SMS.
  • 9
    Silent Circle

    Silent Circle

    Silent Circle

    Joining Silent Circle puts your organization in an exclusive network – the SCircle. You’ll be joining the many other like-minded businesses, NGOs, and governments who have committed to preserving their secrets, their reputation, their intellectual property, and the privacy of their users. Using Silent Phone, your team’s users can contact others in the SCircle with complete peace of mind that your communications are secure. Once your team has joined Silent Circle, other organizations in the SCircle can contact your team’s users if they know your usernames. To make it possible for others to find your users by searching by name, you can make your users public in the SCircle Directory. When your team’s users are managed by Silent Manager, they are never searchable by name in the SCircle Directory. However, these users can contact and be contacted by users in other organizations by knowing each other’s username.
  • 10
    Safenet MobilePASS
    Evolve your authentication infrastructure to include One Time Password (OTP) solution, as well as advanced security applications. With a Mobile Pass permits a user to use one set of login credentials to access multiple applications. Automated processes, over-the air activation and installation for software tokens, and intuitive self-service tools ensure extensive support for end users and lower Helpdesk costs. Our Authentication Suite is filled with every tool you will need to manage the security of your business from Two-Factor Authentication (2FA) to Single Sign-On (SSO) and much, much more. The success of your organization depends on your ability to give authorized customers, partners and employees access to online applications, corporate networks, and business portals from anywhere.
  • 11
    GBS iQ.Suite
    The use of collaboration tools and meeting platforms from vendors such as Microsoft and CISCO is constantly increasing, and with it the security measures that need to be taken. As more and more channels, more complex IT infrastructures and a large part of the platforms run entirely in the cloud, new gateways and attack vectors are emerging. While most organizations are constantly increasing their email security measurements, they often tend to overlook protection against malicious files, that enter the company via SharePoint or messenger, for example. The security capabilities currently available are often limited and ineffective. The platforms helps companies respond promptly to the dynamic and ever-changing threat landscape with a centralized cloud solution that fits both enterprises and small companies.
  • 12
    CubiLock

    CubiLock

    CubiLock

    CubiLock is a pre-eminent and client-trusted Enterprise Mobility Management Solution that simplifies mobility challenges for your business with easy deployment, security and app distribution. With affordable pricing, CubiLock helps streamline your fleet of Android Devices with top-notch device management capabilities, real-time updates, and enable single or multi-app KIOSK mode. CubiLock offers simple and remote Android Device Management with zero-touch enrollment. It enables to deploy and scale very fast. It assists to improve device-led operations for productive administration and business as a whole with an easy-to-use and effortless Cloud-Based Dashboard interface.
  • 13
    Deepware

    Deepware

    Deepware

    Deepfakes are going to be the first real punch from AI to humanity. The cybersecurity industry has a very short time to get ahead of deepfakes before they undermine the public’s trust in reality. Cybersecurity faces an emerging threat generally known as deepfakes. Malicious uses of AI-generated synthetic media, the most powerful cyber-weapon in history is just around the corner. We expect destructive use of deepfakes, particularly as phishing attacks, to materialize very soon. The main limitation is the lack of legitimate voice-swapping techniques, which is a much greater danger than face/head-swapping.
  • 14
    Facia

    Facia

    Facia.ai

    Founded in 2022, Facia specializes in biometric authentication and facial recognition technology. We leverage advanced AI and ML algorithms to deliver secure solutions for businesses. Our 3D liveness detection technology offers rapid responses in under a second, achieving a 0% False Acceptance Rate (FAR) with an FRR below 1% to prevent unauthorized access. Our services include 1:1 Photo ID Verification, 1:N Face Search, and Age Verification. We offer customizable API and SDK integration options for seamless compatibility. Our system provides real-time 3D face verification, ensuring speed and precision without compromising security. We protect against print and mask-based spoofing. Facia is dedicated to advancing biometric authentication, providing secure identity verification solutions for businesses.
  • 15
    Peer Mountain

    Peer Mountain

    Peer Mountain

    Peer Mountain goes beyond providing users with ownership and control over their cryptographically secure identities. It is an end-to-end application ecosystem that facilitates secure commerce and exchange of digital and physical services. Gain assurance of reliable and secure independent audits and claim verification. Only share and validate encrypted data according to transaction requirements. Segment services across Peer Mountain deployments securely and transparently. Control your data in a distributed system that makes hacking unfeasible. Peer Mountain serves consumers who want self-sovereign identity, service providers who need continuous, reliable compliance, and trust providers offering validation services who need trust interoperability and portability.
  • 16
    ESET Small Business Security
    ESET Small Business Security is a digital security solution designed specifically for small and home offices managing between 5 and 25 devices. It delivers strong, AI-powered protection against online threats, scams, ransomware, and human error across multiple platforms. The solution supports Windows, macOS, Android, iOS, and Windows Server, making it suitable for mixed-device environments. ESET includes essential features such as anti-phishing, secure online banking, ransomware remediation, and data encryption. An unlimited VPN and VPN for routers help secure internet connections and protect business networks from tracking. The platform is easy to install and manage through ESET HOME, requiring no advanced IT expertise. Overall, ESET Small Business Security offers a set-and-protect approach for businesses that want reliable cybersecurity with minimal complexity.
  • 17
    FortressBA

    FortressBA

    Fortress Identity

    Strengthen security and eliminate passwords with a mobile and web biometric user authentication solution. Fortress Identity is simplifying everything about secure authentication by introducing a biometric API into the equation. Implement voice authentication directly in the browser and expand to include the user’s smart phone for true multi-factor authentication. Secure account access and transaction authentication. Secure account access and transaction authentication. Strengthen security to corporate intranets and extranets. Reduce IT overhead cost for password reset. Create an omni-channel unified authentication platform. Protect access to medical records and patient data. Control door access to restricted areas and venues. Use a single API call for authentication and a single API call for enrollment. Use RESTful API to request user authentication (Voice, face, fingerprint).
  • 18
    Security Framework

    Security Framework

    PrimeSoft Solutions

    An enterprise security solution to proactively shield enterprise assets by creating an e-fence that uses software based security constructs to replace physical appliances with logical components that operate under the control of the application owner. Entire solution is developed to be up and running on Docker containers. Single agent download on user side to access all the assets (which are hybrid in nature).
  • 19
    Oomnitza

    Oomnitza

    Oomnitza

    Oomnitza offers a versatile Enterprise Technology Management solution for asset lifecycle management and IT process automation. Our agentless, SaaS platform transforms multi-source data from your existing IT, security and business systems into a comprehensive, accurate and actionable asset inventory for better technology data hygiene and audit readiness. We enable organizations to confidently automate their technology workflows using standardized applications and low-code workflows to reduce manual tasks, service tickets, security risks and redundant technology spend.
  • 20
    LiveEnsure

    LiveEnsure

    LiveEnsure

    LiveEnsure® security authenticates users in real time via their smart device. It goes beyond tokens, certs, PINs, OTPs, push or passwords. LiveEnsure® is strong, seamless multi-factor verification of devices, location, knowledge, time, biometrics and behavior in context with an elegant user experience and individual privacy. Instead of crafting home-grown solutions or relying on vendors who infiltrate your identity stack, LiveEnsure® is simple trust API that gives you the power to verify your users across multiple factors with a single call. Developers can offer their users strong but private authentication by simply mashing up a few lines of code with their site or embed our mobile libraries for iOS and Android in your own app. Get rid of traditional passwords, 2FA and captcha altogether with a single API. There are no confusing tokens, certs or push messages. Just a simple call, present and poll API to our cloud authentication service.
  • 21
    OpaqueVEIL
    CKM® Runtime Environment, the core of TecSec’s Constructive Key Management® (CKM®) system, has an updated name! In an every changing market that is becoming more knowledgeable about security solutions, standards and products, TecSec has made a name change for our core technology in order to avoid any confusion between CKM the standard and CKM®, the product. CKM® Runtime Environment (RTE) is now known as OpaqueVEIL® and is the core of the VEIL® suite of products. The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
  • 22
    CyStack Platform

    CyStack Platform

    CyStack Security

    WS provides the ability to scan web apps from outside the firewall, giving you an attacker's perspective; helps detect OWASP Top 10 and known vulnerabilities and constantly monitoring your IPs for other security threats. The team of CyStack pen-testers conducts hypothetical attacks on a customer's applications to discover security weaknesses that could expose applications to cyberattack. As a result, the technical team can fix those vulnerabilities before hackers find and exploit them. Crowdsourced Pen-test is the combination of certified experts and community of researchers. CyStack deploys, operates, and manages the Bug Bounty program on behalf of enterprises to attract a community of experts to find vulnerabilities in technology products such as Web, Mobile, Desktop applications, APIs or IoT devices. This service is a perfect solution for companies that are interested in the Bug Bounty model.
  • 23
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while providing higher levels of identity assertion for organizations. Veridium provide an end-to-end authentication platform for all your WFH needs and any VPN solution, delivering strong, multi-factor, passwordless workforce authentication.
  • 24
    CzechIDM

    CzechIDM

    BCV solutions

    IT department is typically snowed under with routine requests having to do with account management: manual account creation, password resetting, auditing work, long-inactive accounts. Often, there is no accounting for who has got access and where. We help our customers to automate their routine processes, centralize information systems, delegate account management to business owners, and keep transparent evidence of granted permissions. Identity Management (IdM) is all about centralizing identity and access management within IT systems. It enables the right persons to gain access to the right kind of data sources, at the right time, for the right reasons, and most importantly, with reliable evidencing records on hand. We help companies to improve Identity and Access Management. Our aim is to make companies safer and more efficient by simplifying user management across companies’ systems.
  • 25
    DexGuard

    DexGuard

    Guardsquare

    Protecting Android applications and SDKs against reverse engineering and hacking. Android applications and SDKs are easy to decompile using readily available tools. This opens the way for various forms of abuse, including intellectual property theft, credential harvesting, tampering and cloning. DexGuard protects native Android and cross-platform apps and SDKs against reverse engineering and hacking. It hardens apps' code and enables them to defend themselves at runtime. DexGuard is a command-line tool that processes, optimizes and protects Android applications and libraries. It enables you to fully protect your application or SDK without requiring you to share or alter the source code. DexGuard offers built-in support for both native Android (Java, Kotlin) and cross-platform applications (Cordova, Ionic, React Native, Unity). DexGuard’s functionality can be extended with the NDK add-on to process and protect native libraries.
  • 26
    ThreatCast

    ThreatCast

    Guardsquare

    After an Android or iOS app is released, security teams and developers often lack visibility into the most common attack vectors and vulnerable parts of their code...until it’s too late. ThreatCast lets DexGuard and iXGuard customers monitor threats in real time, adapt their security configurations and protect apps against suspicious activity and malicious users. Use easy-to-navigate dashboards and custom alerts to detect threat events as they happen. Analyze threat data to respond immediately to attacks or block suspicious users. Prioritize mobile security within the development process, without sacrificing speed-to-market.
  • 27
    K7 Ultimate Security
    K7 Ultimate Security provides both computer security and mobile security to keep you cybersafe whether you are playing video games on your PC or making payments on your phone. Since 1991 till today, K7 has stayed true to its roots. It's the only Antivirus company in the world to be led by a coder. Complete multi-layer Endpoint Protection and Unified Threat Management for businesses of all sizes - simple to use, easy to manage, on-premises or in the cloud. Comprehensive, multi-layered Endpoint Security and Network Security for businesses that are not limited by time or location. K7's enterprise cybersecurity solutions are quick to deploy, simple to use, easy to manage, and support businesses of all sizes.
  • 28
     M2SYS eGov

    M2SYS eGov

    M2SYS Technology

    M2SYS eGov is a no-code platform that system integrators can configure for any government digitization project globally. It connects all biometric and third-party systems with easily customized applications to create complete end-to-end solutions and works with popular biometric hardware and matching engines.
  • 29
    FCI Cyber

    FCI Cyber

    FCI Cyber

    FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to CISOs and security personnel of organizations with prescriptive cybersecurity regulatory requirements. FCI blends best-of-breed technologies, cybersecurity best practices, expertise, and innovation to deliver cloud-based Managed Endpoint and Network Protection as well as Safeguard Scanning & Evidencing. FCI’s Next Generation Endpoint Security Audit and Compliance (ESAC) system is specifically designed for financial services organizations. This innovative solution is set to replace outdated legacy systems that have fallen short of user expectations in performance and support. As the first layer of the FCI SOAR (Security, Orchestration, Automation, and Response) platform, it sets the foundation for comprehensive security and compliance management.
  • 30
    VIPRE Android Security

    VIPRE Android Security

    VIPRE Security Group

    VIPRE Android Security is a mobile security app designed to protect Android devices from a wide range of digital threats, including malware, spyware, and ransomware. Built with a user-friendly interface, it provides real-time scanning to identify and block harmful apps, unsafe links, and malicious downloads. VIPRE Android Security also includes features like anti-theft tools, allowing users to remotely locate, lock, or wipe their device if it's lost or stolen, safeguarding personal information. Additionally, it offers privacy protection, scanning apps for potential security risks and permissions misuse. Lightweight yet powerful, VIPRE Android Security ensures that users stay protected while browsing, downloading, or using apps on their mobile devices.
MongoDB Logo MongoDB