Best IT Security Apps for Android - Page 22

Compare the Top IT Security Apps for Android as of December 2025 - Page 22

  • 1
    Bolt

    Bolt

    Bolt

    Bolt provides retailers with best-in-class customer conversion through seamless and secure one-click checkout. Leading brands like Revolve, Benefit Cosmetics, and Kendra Scott leverage Bolt's Universal Shopper Network to recognize and access rich, actionable data and insights on shopper behavior from 80M+ US shoppers. Enhancing the buying experience for shoppers by bringing speed, security, and delight to every interaction, Bolt merchants reap the benefits of more engaged, lifetime shoppers. Bolt integrates directly into retailers’ existing technology and payments stack, helping them increase conversion and boost revenue without added third-party-branded buttons or redirects. To learn more, visit bolt.com.
  • 2
    Exigence

    Exigence

    Exigence

    Exigence is providing a command and control center software to manage major incidents. Exigence automates the collaboration among stakeholders within and outside of the organization and structures it around a timeline that records the steps taken to resolve an incident and drives workflows across stakeholders and tools, thus ensuring all stakeholders are working off the same page. The product ties together stakeholders, processes and tools already in use, driving down time to resolution. Customers who have purchased and are using Exigence , have seen a more transparent process, faster onboarding of relevant stakeholders, and a reduced time for the resolution of critical incidents in general. They are using Exigence to address critical incidents, but also for cyber events as well as planned incidents like business continuity testing and software release.
  • 3
    Introviz

    Introviz

    Introviz

    Introviz delivers powerful, patented technology to thwart the growing threat of cybersecurity to the corporate network. The battle of IT security originated, more than several decades ago, at the network entry points – routers, switches, firewall etc. Most companies have smart network engineers combating the hackers and have some consolation that they are attending to this problem – A false sense of security! The Cybersecurity battle has in the last several years has migrated to the “back door entry point” – employees’ browsers! Your employees surf on work, home, and public networks, and will inadvertently bring outside trackers and targeted zero-day malware into your network. Anti-Virus, VPN, Firewalls and Phishing Site protection protects against known phishing sites and viruses – not browser content. The browser has become the new gateway to phishing and malware. And the malware can spread from employee device to your network.
  • 4
    Citadel Team

    Citadel Team

    Thales SIX GTS

    As easy to use as your personal communication apps, Citadel Team is compatible on all your terminals and offers all the standard features of instant communication. Operated by Thales and hosted in France, Citadel Team offers a high level of security and guarantees a model without data resell. Activated when necessary, with the end-to-end encryption option, only your devices can read your conversations. Deploy, control and manage your corporate fleet from the Citadel Team administration console, while guaranteeing the identity of your users via their professional e-mail. Increased team reactivity, centralized conversations and file sharing in private or public personalized spaces for your projects. Boost communication by inviting thousands of members in dedicated chat rooms! Citadel Team also allows you to discuss privately with each of your internal collaborators and invite external partners.
  • 5
    LoginCat

    LoginCat

    TekMonks

    Everybody claims an easy and secure solution, ours is. Solutions should be simple and easy. TekMonks is a Global Software Company headquartered in Washington DC, USA. We are a truly Global company with offices in across countries, including, USA, Canada, Japan, UK, Singapore and India, and 3 continents, North America, Europe and Asia. TekMonks is built on the knowledge and quality of our consultants and we all share an absolute passion for building world-class Enterprise Software and working with clients globally, enhancing and providing leading-edge technical solutions, with low risks and reasonable costs. Our core strengths lie in the domain of Cybersecurity, AI-based products, Enterprise Software Solutions Development, and Innovative Enterprise Mobile Application Development. Developing end-to-end Enterprise software solutions as well as providing software services to budding companies across the web and mobile platforms is our strength.
  • 6
    Nexusguard

    Nexusguard

    Nexus Guard

    The TAP program provides customized, cost-effective DDoS protection solutions for CSPs, protecting the core infrastructure while meeting customer demand for comprehensive DDoS protection. Most importantly, the program is designed to empower CSPs with the People, Processes and Technology in order for them to build, deliver and profit from DDoS mitigation services, aiding in their transformation into the next-gen CSP. Courses created and delivered by practitioners to equip your staff with real-world, executable skills and knowledge to lead your organization on its part of transformation and towards success. We facilitate carriers to easily deliver managed security services in a multi-tenancy environment through a real-time single pane of glass. We help safeguard the public utilities from DDoS attacks or any cyberthreats to achieve their service stability and ensure their normal operation.
  • 7
    CryptoSmart
    Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices. Available on Samsung Smartphones and Tablets for consumers: intuitive and simple solution for your users. Used by referring customers: solution adopted by the highest French government authorities and large international organizations. With Cryptosmart PC the data flows are secured end-to-end. Cryptosmart PC does not allow any interceptions between your PCs and the gateway (located in your IS) by using the technology for Cryptosmart mobile certified by ANSSI (National Agency for the Security of Information Systems).
  • 8
    ProOpti

    ProOpti

    ProOpti

    Enterprises can optimize their costs, usage and administrative processes, as well as ensure high-quality services, by using Pro as an in-house optimization solution. Pro offers individual enterprises control, awareness and a balance between their technology investments and business demands. Digitally documenting an enterprise’s utilization of IT services also lays the foundation for a smoother process at accounts payable, where costs are booked correctly the first time. Service providers can offer ProOpti’s solution as part of their software delivery to customers. Pro is instrumental for service providers wishing to support their customers in handling technology costs and usage as a centrally-purchased or managed solution, and it can function as a service provider’s own platform for transparent reporting and insights. Service integrators can also maximize their profits by using Pro to make sure that they don’t over-deliver on unused services.
  • 9
    Systancia Access
    Transparent authentication, in all forms, to all your applications, on premise or cloud. Access control solution to make the access of applications simple and secure. Systancia Access, formerly Avencis SSOX, a solution labeled France Cybersecurity, is an access control and single sign-on (SSO) solution that guarantees connection security while improving the user experience. Systancia Identity is particularly easy to use once the basic base has been set up and is therefore quickly adopted by users. In addition, the software is scalable without additional costs. Due to the growing amount of data within companies and organizations, and the fact that these data are sometimes sensitive, it is essential to protect them against any potentially devastating risk of leakage, as we are reminded daily by the press. An audit revealing risks to IS security or proven data leakage is like electroshock for IS security managers.
  • 10
    ZeroFox

    ZeroFox

    ZeroFox

    Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
  • 11
    PlayReady

    PlayReady

    Microsoft

    Microsoft is committed to working with companies across the content delivery spectrum to ensure that consumers can access premium content inside or outside the home regardless of the device or service they choose. CBC-S support in software clients! Run PlayReady Server on Linux with full Async performance boost! Plus, many more improvements. Addresses content owners' full 1080p, 4K and higher resolutions, as well as early window content protection requirements. In an effort to accelerate the adoption of PlayReady and HTML5 EME on devices such as mobile phones, set-top boxes and smart TVs, Microsoft will provide a standard set of tools for integrating PlayReady into next-generation browsers on those devices. These tools will shorten development times and reduce complexity for ecosystem partners while enabling service providers to offer premium video directly through a viewer’s browser without requiring plug-ins.
  • 12
    DERDACK Enterprise Alert
    Derdack’s enterprise alerting software automates alerting processes and enables a fast, reliable and effective response to incidents threatening the continuity of services and operations. This is in particular important for 24/7 operated mission-critical systems and IT. Our critical alerting software combines four pillars to effectively respond to incidents – automated alert notifications, convenient duty scheduling, ad-hoc collaboration and anywhere incident remediation. Enterprise Alert provides automated, and persistent alert notifications by voice, text, push, E-Mail and IM. It tracks the delivery of notifications, acknowledgments and replies and reacts automatically on non-delivery or non-reply by utilizing escalation chains, on-call schedules and presence information. Enterprise Alert enables convenient scheduling of on-call duties by drag & drop in any browser. Based on scheduling information it can then alert the right engineers at the right time.
  • 13
    Ericom Shield

    Ericom Shield

    Ericom Software

    Ericom Software provides businesses with Zero Trust Secure Access to corporate applications, in the cloud and on-premises, from any device or location. Ericom Shield is a clientless enterprise-grade solution that is designed to address the needs of security and IT professionals while providing a transparent Internet experience for end users using Remote Browser Isolation. Ericom Shield can be deployed across organizations of any size, on all devices, using any operating system, or browser and does not require installation of any software or plug-ins on endpoints. Files to be downloaded are scanned and cleansed using a pre-integrated, Content Disarm and Reconstruction (CDR) process, before being released to the user device. When it comes to phishing attacks, user training just isn’t enough. Ericom Shield executes email-embedded URLs away from endpoints, in remote virtual browsers in the cloud or DMZ, so no malware can reach endpoints.
  • 14
    Hush App

    Hush App

    Syneidis

    Encryption is easy. Secure file transfers for Android, iOS and Web. Send encrypted files to anyone, even if they don’t have the app. Set up a business account, invite users to the team and manage permissions. HushApp is extremely easy to use whether you send or receive files. We don't have any information about you, your keys, files you store or send. With HushApp you can send encrypted files even to users who don't have the app. We use military-grade AES-256 and RSA-2048 encryption standards to protect your files. We are based in European Union and so are our servers. Do you want to secure business communication or preoccupied about GDPR? Our app helps you to keep all the work-related documents private and safe. HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.
  • 15
    VeriFinger SDK

    VeriFinger SDK

    Neurotechnology

    VeriFinger is a fingerprint identification technology designed for biometric systems developers and integrators. The technology assures system performance with fast, reliable fingerprint matching in 1-to-1 and 1-to-many modes. Available as a software development kit that allows development of stand-alone and network-based solutions on Microsoft Windows, Linux, macOS, iOS and Android platforms. In 1998 Neurotechnology developed VeriFinger, a fingerprint identification technology designed for biometric system integrators. Since that time, Neurotechnology has released more than 10 major and minor versions of the VeriFinger, providing most powerful fingerprint recognition algorithms to date. Numerous awards in competitions and technology evaluations, including NIST MINEX, PFT III and SlapSeg III, have been received by Neurotechnology's fingerprint recognition algorithms. Rolled and flat fingerprint matching that is tolerant to fingerprint translation, rotation and deformation.
  • 16
    Spectra

    Spectra

    Sectona Technologies Pvt Ltd

    Sectona was started with a purpose to engineer simplified, modernly architected cross-platform privileged access technology. Our core focus is to prevent & detect breaches that occur under the cover of insider threats &/or privileged attacks. With our cross-platform & deeply integrated Privileged Access Management (PAM) solution Spectra, Sectona enables enterprises achieve enhanced security by adopting a refreshed PAM approach. Sectona currently works with customers across sectors.
  • 17
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 18
    Gravwell

    Gravwell

    Gravwell

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data. Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate building access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford.
  • 19
    SearchInform FileAuditor
    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages. The system performs: •Classification of vulnerable data Finds files in a document flow that contain critical information, and adds a special mark to each file, indicating the type of info it contains: personal data, trade secret, credit card numbers, etc. •Access rights audit Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Finds confidential files stored in violation of established security rules . •Monitoring and blocking user actions Audits user operations with the file system. •Critical documents archiving Makes shadow copies of critical files.
  • 20
    Anytrust

    Anytrust

    Anytrust AB

    We are experts in identity management implementation and work with Microsoft Identity Manager (MIM) and OneIdentity. With our help, you can migrate to the cloud and get started with Azure AD & Intune. Do you want help with getting control over your company's identity and authorization management? An onboarding project from Smartsmiling gives you more control and insight into the company's assigned permissions and affiliations. With the help of our platform, you can then manage and manage your processes and regulations for identity management. In our projects and introductions of identity management, we work with Microsoft identity Manager and OneIdentity. Your need for platform support is put into focus for which platform we recommend.
  • 21
    PaymentCloud

    PaymentCloud

    PaymentCloud

    Here at PaymentCloud Merchant Services, we provide credit card processing for businesses of all types. From Fortune 100 companies to small, local storefronts, ecommerce or retail, and all levels of risk, we can support each and every business. We have a robust toolset of integrations with nearly any platform, shopping cart, and CRM, unified fraud detection software, and chargeback mitigation tools that allow you to reduce your risk and amplify your reward. Talk with one of our dedicated account managers to get personalized care and a real person every single time. PaymentCloud lays the foundation businesses need to thrive. With 50+ years of combined experience within the payments industry, we look forward to paving the way to your business’ success. Free cost comparison. Seamless setup. Chargeback and fraud prevention. Hundreds of integrations. Low risk and hard to place industries accepted.
  • 22
    Topicus KeyHub
    Topicus KeyHub offers Privileged Access Management for people. Gain easy and secure access to containers, sensitive data and production environments with privileged access management. KeyHub provides just-in-time access and enforces least privilege principles.
  • 23
    Aspida Mail
    Aspida Mail was developed with simplicity in mind. We know it's important for you to be able to continue with business as usual. Aspida Mail's setup is seamless and works with any IMAP enabled device. Aspida is HIPAA compliant encrypted email.
  • 24
    Dataminr

    Dataminr

    Dataminr

    Dataminr’s AI platform detects high-impact events and potential risks as they unfold, sending real-time alerts to your global teams. Know critical information first, respond with confidence, and manage crises more effectively across your enterprise. Dataminr Pulse gives you the earliest indications of high-impact events—plus rich visual context and tools that help you collaborate and act faster—so you can better protect your people, your brand and your physical and digital assets. Dataminr Pulse streamlines your team’s collaboration, response protocols and critical information flows—enabling real-time command and control as physical and cyber risks emerge and high-impact events unfold.
  • 25
    ContentProtect

    ContentProtect

    Content Watch

    ContentProtect helps increase productivity by blocking inappropriate or time wasting web content. With the powerful cloud-based administration tools you can make changes and see reports anywhere and anytime. ContentProtect Professional is the perfect solution for managing the Internet use of your employees, both in and out of the office, with a powerful and real-time content analysis engine to categorize web content in real-time. This engine can accurately filter out the content and websites you don’t want your employees viewing. ContentProtect Professional makes managing the settings for all your users easy and accessible anywhere. The web based administration console “in the cloud” allows Administrators to view reports, manage, and make changes to Internet policies, and permit or terminate Internet access, anywhere and at any time. Administrators have actionable data via the web based administration console.
    Starting Price: $39.99
  • 26
    TozID

    TozID

    Tozny

    An SSO and Customer Identity Management platform with privacy and end-to-end encryption built in. Centralize Access Control without centralizing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it – secure your customer’s accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you expect – including SAML & OIDC support along with push-based MFA and more. Here are a few key features we think you’ll love! Administrators have the keys to the kingdom. Moving to zero-trust means protecting admin accounts from hacks and malicious insiders. Tozny's Privileged Access Manager (PAM) is built directly into our single sign-on solution. Get advanced protection for any endpoint and any 3rd party with Tozny PAM.
  • 27
    Netspark

    Netspark

    Netspark

    Web filtering solutions that let you create an internet you want to use. Netspark’s unique approach to filtering provides access to more content, without increased risk of exposure. Multiple filtering levels as well as Custom Mode empowers users to define the Internet they want access to. We offer solutions for both network-side and on‑the‑go protection. Choose from a complete range of flexible and affordable deployment options. Netspark’s filtering solution was born from the understanding that what users really need is a content filtering tool focused on enabling access to content, not just blocking it. Our unique algorithms and machine learning engines work together to contextually understand web content and the value it offers our users, prior to filtering out any inappropriate elements.
  • 28
    Incognia

    Incognia

    Incognia

    Location Behavioral Biometrics. Using the location behavioral pattern unique to each user, we create a dynamic location fingerprint that is very difficult for fraudsters to mimic or forge. Incognia location-based fraud solutions help financial institutions and retailers prevent new account fraud and account takeover. Using network signals and on-device sensor data our precise location technology creates unique behavioral patterns to identify and authenticate users. Our solution requires no PII and works in the background to deliver a secure and frictionless experience. Validate addresses anywhere in the world with real-time location data. Detect location spoofing techniques used to execute identity fraud and ATO. Recognize anomalies to block fraudulent accounts, logins, transactions and fraud farms. Guide your identity decisions with real-time location data.
  • 29
    Oversecured

    Oversecured

    Oversecured

    Enterprise vulnerability scanner for Android and iOS apps. It offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development process.
  • 30
    WatchWave

    WatchWave

    ScanWave CTS

    WatchWave Security operations center provides a complete view of all the relevant data from the organization's systems, devices, and their interactions with real-time security insights for immediate action that scales the resources and reduces exposure to risk. WatchWave provides security professionals with comprehensive capabilities that accelerate threat detection, investigation, and response — modernizing security operations and strengthening cyber defenses. WatchWave Security operations center uses a universal agent, which is a small program installed on the enterprise customer systems to be monitored. The agent provides the necessary monitoring and response capabilities, while the WatchWave server provides the security intelligence and performs data analysis. In addition, WatchWave also uses an agentless approach for systems that an agent cannot be installed on (firewalls, routers and even Unix systems etc.).