Best IT Security Apps for Android - Page 24

Compare the Top IT Security Apps for Android as of December 2025 - Page 24

  • 1
    BlackBerry Protect
    AI detects and prevents attacks before they can execute, preventing users from opening URLs or visiting spoofing pages mimicking those of legitimate websites. It prevents, detects and remediates advanced malicious threats at the device and application levels. Malware and grayware are identified by application sandboxing and code analysis, plus app-security testing. All applications are scanned and validated before being pushed to the device or the user seeking access. All mobile endpoints BlackBerry UEM manages are protected from zero-day threats without reliance on end users to install, log in or maintain third-party apps or configure settings manually. Choose a single-point connectivity solution. Download once, distribute locally. Hybrid deployment facilitates security-related communication between the cloud and local infrastructure without exposing your network.
  • 2
    Malwarelytics
    Protect your app users from mobile malware and other device-related threats. Learn what malware is currently active on your users' devices, see which specific users have insecure devices, and actively help them fix their smartphone's problematic configuration as soon as it shows up on your radar. Mobile malware and cyber attackers became extremely sophisticated. They are looking for new ways to hack your mobile apps and cause damage. By misusing the mobile operating system features, they can gain an advantage and steal your users’ personal data or even money. Avoid these devastating consequences. After all, your business reputation is at stake! Malwarelytics® prevents the most common threats that mobile apps are facing these days and helps your organization stay safe and compliant. Device rooting or jailbreak disables security features provided by the mobile operating system, which opens the device to the attackers.
  • 3
    uCertify

    uCertify

    uCertify

    uCertify courses can be delivered in self-paced for IT professionals, mentor-guided for competency based educator, and instructor-led mode for schools and colleges. It begins with pre-assessment, interactive lessons, practice tests, lab and finally the post-assessment. Additionally, you can gauge your performance by test history and performance analytics. Our courses and lab are JAWS (Job Access with Speech) compliant. We provide enhanced accessibility to students with features such as option to change the font, size, and color of the course content, text-to-speech, interactive videos and how-to-videos with interactive transcripts and voice-overs. Our courses are highly interactive with virtual lab, simulations, and 50+ interactive items. Over 60 interactive items include true/false, multiple choice single or many option(s) correct, drag and drop, create a list & create and order list, hot spot, fill in the blank, performance-based, essay (manually graded), match lists, etc.
  • 4
    VirusTotal

    VirusTotal

    VirusTotal

    VirusTotal inspects items with over 70 antivirus scanners and URL/domain blocklisting services, in addition to a myriad of tools to extract signals from the studied content. Any user can select a file from their computer using their browser and send it to VirusTotal. VirusTotal offers a number of file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. The web interface has the highest scanning priority among the publicly available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API.
  • 5
    Avira Cloud Sandbox
    The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide.
  • 6
    Joe Sandbox

    Joe Sandbox

    Joe Security

    Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST).
  • 7
    Password Safe

    Password Safe

    Password Safe

    Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work).
  • 8
    VU Security

    VU Security

    VU Security

    We are a cybersecurity company specialized in fraud prevention and identity protection. Our mission is to provide secure digital experiences without friction, both for citizens and businesses, during the digital transformation process. We use different technologies applied for people recognition, based on their physiological or behavioral characteristics. Once the data has been captured, the system extracts a unique pattern for each individual, which will be used to make comparisons in the future. Transactional analysis of user behavior and channels for fraud detection and prevention. Secure, fast-response exchange of sensitive data through references to a vault of encrypted data. We provide a multi-channel fraud prevention solution that uses machine learning to create intelligent profiles and detect potentially fraudulent operations based on user behavior.
  • 9
    Puffin

    Puffin

    CloudMosa

    Popular browsers boast a plethora of features, but often fall short in fully protecting users. With our advanced cloud technology, Puffin provides all the benefits without sacrificing security. Our devices are extremely vulnerable to cyber exploits. With browsing sessions now inside the cloud, your phone, tablet, and computer are safe from hijacking. Designed for users in mind. The internal workload is reduced, resulting in improved processing efficiency.
  • 10
    AuthPass

    AuthPass

    CodeUX.design

    AuthPass is an open source password manager with support for the popular and proven Keepass (kdbx 3.x AND kdbx 4.x 🎉️) format. Store your passwords, share across all your devices and easily find them whenever you need to login. 🗄 All your passwords in one place. 🧬 Generate secure random passwords for each of your accounts. 🔐 Quick Unlock secured with biometric lock. 🔍 Keep track of your accounts across the web. 🖥 App available for Mac, iPhone, iPad, Android Phones and Tablets, Linux, Windows and on the Web. 📂 Open multiple password files at the same time (e.g. one for work, one for personal - or even share your password files with coworkers) ✍ Autofill your passwords (Android 9+, Support in browser only since Android 10+)
  • 11
    FacePhi

    FacePhi

    FacePhi Biometria

    The most complete solution for digital onboarding, authentication and security formed by different biometrics and antifraud systems of FacePhi, offered with the best user experience in the market. A combination of biometric and other security systems that creates a complete digital onboarding and identity authentication solution that allows to access, verify and operate different services and products in mobile and web applications. A framework with an easy integration that allows our client to choose which components to activate providing a better and seamless experience for the end user. Face recognition allows us to determine the identity of a person by analyzing the face. Unlike other types of biometry like iris or fingerprint, face recognition is non-intrusive; it does not require cooperation from the user. It just needs to capture the face of the person with a web cam.
  • 12
     Yokoy

    Yokoy

    Yokoy

    Based on all your receipts, vendor invoices and actions, the Yokoy tool learns and is able to automatically fill out expense forms and invoices including VAT for you. Yokoy finds outliers, rule violations and potential fraudulent cases and sends them for manual review. The rest - from submission to exporting to your accounting system - is fully automated. Yokoy is the only expense management tool that allows you to map your individual company-specific process flow without a team of developers to code and maintain it for you. Robust integrations are key to automating the data flow between different tools. Yokoy integrates with all major third-party tools and also provides the free "OpenAPI" platform to all partners and customers.
  • 13
    oneSafe

    oneSafe

    oneSafe

    oneSafe provides advanced security for your passwords and confidential data. oneSafe is available from the App Store (oneSafe & oneSafe+), the Mac App Store and Google Play Store. Looking for a secure vault for your secret pictures and private videos? get oneSafe Pix. Forgot your PIN? Can’t remember your frequent flyer number? Struggling to memorize an ever-increasing number of passwords? With oneSafe, your problem’s solved! oneSafe lets you store all your personal information in one place with complete security. You’ll never get stressed about remembering passwords again. You’ll have them all at your fingertips with oneSafe! Plus, its well-organized system of categories, favorites and search features lets you find your stored information quickly and easily. We believe in security for everyone. Not only for big corporations or governments. But for you, all. And you will use oneSafe every day, so we made it simple and beautiful.
  • 14
    CTemplar

    CTemplar

    CTemplar

    We support anonymous usage and do not stockpile your personal data. Therefore, nothing can be made to reveal it. We use strong encryption and state-of-the-art technologies. This ensures the confidentiality of your messages. Iceland has among the strongest privacy laws that allow anonymous usage and instantly deleting your data. CTemplar’s exclusive 4-Wall Protection guarantees complete wall-to-wall protection of your data. Set a phrase that will be shown in your account. This will alert you to any phishing attempt. We allow anonymous payments using Monero. We are still building the monero payment processor so XMR payments are completed by contacting support. Automatic payments can be made with Bitcoin and card. Our server location in Iceland provides nearly unlimited natural energy resources and it's proudly run 100% by green energy, specifically geothermal and hydropower.
    Starting Price: $8 per month
  • 15
    MobileID.io

    MobileID.io

    ARIADNEXT

    Digital identity is defined as the identity of an entity on the web. It is the technological link between a real entity (a person, a company, an organization) and virtual entities, i.e. its digital representations. The digital identity thus allows the identification of an individual online, as well as his or her connection to services offered on the web. Gone are the lists of identifiers and passwords to remember to authenticate oneself online, from now on digital identity makes it possible to prove that the user is indeed the person he or she claims to be and thus to identify oneself to online services in a secure manner. These digital identities enable governments, public services, private companies and regulated activities (banks, Fintech, online games, etc.) to protect themselves against the risks of fraud and to comply with increasingly restrictive regulations while remaining accessible to the greatest number of people.
  • 16
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 17
    Entreda Unify
    A unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications and you can access it from anywhere, or any device. Build a solid information security architecture. Keep your mission-critical data safe. Identify malicious behavior and actors. Develop an incident response plan. Ensure business continuity and uptime.
  • 18
    WithSecure Elements Infinite
    WithSecure Elements Infinite provides a comprehensive suite of security tools and capabilities as a continuous Managed Detection and Response (MDR) service that includes responding 24/7 to cyber security incidents and improving customers security posture through Continuous Threat Exposure Management (CTEM). Elements Infinite’s proprietary Endpoint Detection & Response (EDR) agent and log collectors feed data into our XDR detection platform, offering exceptional visibility into user, endpoint, cloud, and network activities. The primary service components cover the environments external attack surface(s), identity management systems (Entra ID), physical endpoints, corporate networks and cloud environments (AWS, Azure). WithSecure is a premier European cyber security company dedicated to helping our customers achieve compliance and effectiveness the European way.
  • 19
    Provision

    Provision

    Provision

    Today, management is aggressively adopting new technologies to drive growth. However, with technological advancement, an organization needs to identify and address risks. Digital risk is an essential part of business management. It’s focused on the threats and risks for enterprise information and the underlying IT systems processing them as they are implementing the full set of business processes. Today, organizations around the world are looking to embrace the latest technologies so that they can remain competitive in the global economy. Consequentially, these organizations are exposing themselves to more digital risk. We are offering end-to-end management and security tools for cybersecurity risk, third-party risk, business continuity risk, data privacy risk and other forms of digital risk add to the uncertainty of achieving business objectives. We’ll assess your current infrastructure and will recommend suitable solutions that can fill in those gaps.
  • 20
    CryptoDefender

    CryptoDefender

    BlockSafe Technologies

    Prevents malware from spying on what you type. The keystrokes are secured between the kernel and the wallet application using military grade encryption. Now, the password you enter to logon or decrypt your secret key is safe. Prevents malware from monitoring the clipboard to spy on, copy and paste the contents of the clipboard. So the destination address to which a crypto transaction is sent to is not modified. Prevents screen-scraping malware from taking screenshots of information surreptitiously. Displays hidden frames or frames originating from a potentially malicious domain. This neutralizes one of the favorite tricks of the hackers to download malware onto your computer. CryptoColor visual verification shows you that CryptoDefender™ is protecting your input by highlighting what you type in a color you select.
    Starting Price: $5.99 per 2 devices per month
  • 21
    swIDch

    swIDch

    swIDch

    swIDch’s OTAC technology combines elements of the three most common authentication systems, user ID/passwords, RSA hardware/ software for generating authentication codes, and tokenization. Based on the world’s first 1-way dynamic authentication technology, OTAC sets a new standard for authentication in cyber security beyond the limitations of existing authentication methods. swIDch is an authentication technology expert to help every person and every organization have secure access to the information they want in communication networks through an easy and secure identity authentication process. Our authentication technology guarantees trustworthy access anywhere in the world, regardless of network connection. We prove that authentication is not a difficult technology, but a secure transport that leads to the desired information. swIDch helps to remove CNP frauds in the most secure and cost-effective way.
  • 22
    EnSecure

    EnSecure

    Enqura

    Strong multi-factor customer authentication designed for secure first time log-in, transaction signing, document verification protecting digital channels against fraud. Digital Identity, created by using multi-factor authentication is crucial for enhancing user experience, guaranteeing the protection of your customers’ assets, and adhering to regulatory requirements. EnSecure offers the ideal solution for end users’ authentication needs across many industries, with two versions based on Soft OTP and Electronic Certificate.
  • 23
    RevBits Zero Trust Network
    Remote workforce, BYOD assets, and third-party access have created a new security dilemma for organizations. Relying solely upon a VPN as security for remote workers and third-party access is insufficient to protect the network. While VPNs provide a degree of protection through encrypting inbound traffic, their security failure comes through providing full network access to users with no privileged access demarcation. RevBits ZTN encrypts, authenticates, and securely connects external users, over SSL/TSL, to internal network assets and applications to which they have specific access without granting full network access. Moving the network perimeter to the endpoint RevBits Zero Trust Network (ZTN) helps isolate and protect your internal assets. As the network perimeter moves to where the user is, RevBits Zero Trust Network (ZTN) helps isolate and protect internal network assets without the necessity of implementing complicated network segmentation.
  • 24
    Chekin

    Chekin

    Chekin

    Increase your income, profits and improve your guest experience while saving time and money by automating the entire registration process. Our online check-in tool is at the top of the market. Designed from minute one to provide your guests with a simple, fast and pleasant check-in experience. We verify the identity through our biometric comparison software, ensuring that the documentation provided corresponds to the person accessing your home. You can customize the rental contract by adding all the clauses you want. Your guests will be able to read and digitally sign it during online check-in. Offer your guests personalized experiences, such as early check-in / late check-out, services, transportation, leisure activities, and generate more money from each reservation and more direct bookings. Your and your guest’s peace of mind. During online check-in, you can ask your guests to pay insurance or make a deposit, which will be blocked until after check-out.
    Starting Price: €4 per month
  • 25
    Ekahau

    Ekahau

    Ekahau

    Precise Wi-Fi diagnostics paired with mobile-optimized apps deliver significantly faster site surveys, faster spectrum analysis, and more accurate and reliable data. Robust, professional gear that anyone can use, developed by Wi-Fi enthusiasts who consistently innovate and redefine what it means to be industry-standard. Well-designed and optimized networks reduce business-stopping downtime, giving you the assurance that your Wi-Fi is always high-performing. Ditch the dongles and upgrade to the most precise Wi-Fi diagnostics and measurement device for faster, more accurate Wi-Fi site surveys and spectrum analysis. Everything you need to design, validate, optimize, troubleshoot, and collaborate on your wireless network is included with Connect.
  • 26
    ProMDM

    ProMDM

    ProMDM

    ProMDM is a mobile device management solution that provides end-to-end control of all mobile devices across the IT infrastructure, using standard MDM specifications for iOS, Android and Windows devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Dynamic Group management based on AD/LDAP groups, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automation for administrative tasks with Health check service Role base administration SSO with Client Certificate Authentication for Exchange, Sharepoint, Web sites iOS SSO with Kerberos for Safari and native apps (integration with ADFS or websites directly) MAM - Mobile App Management Samsung KNOX support Document management – Managed media support Photo sync for Android GPS location and tracking Android for Work support (ProMDM is certified Google Partner)
  • 27
    Comodo Secure DNS
    100% cloud-based, load-balanced, geo-distributed, highly available Anycast DNS infrastructure hosted in 25+ countries. Cloud-based web security is delivered at the DNS level, the first layer for everything internet-connected. Block phishing, malware domains, malicious sites, botnets, C&C callback events, spyware, drive-by-downloads, XSS-injected sites, cookie stealing, anonymizers, TOR, encrypted files & all web-borne attacks. Protect, control, and monitor users' web traffic regardless of where they are connecting the internet from. Per company, location, endpoint, mobile device, IP, subnet, and user. Add your own logo, show different pages for each category, or change the messages to serve your needs. Get real-time web visibility for everything internet-connected and schedule reports to be sent to your email. Protect mobile devices seamlessly across 2G, 3G, 4G, LTE cellular networks, and Wi-Fi.
  • 28
    Q5id

    Q5id

    Q5id

    Eliminate the impact of fraud, identity theft, and data breaches with the patented Q5id Proven Identity solution. Individuals identity should never be assumed, they should be PROVEN. Every business deserves to know who their customers are. Q5id’s Proven Identity solution gives that highest level of assurance so that you NOW know your customers are who they say they are. The Q5id patented solution: • Promotes a more robust KYC/AML solution & regulatory compliance • Expands MFA (multi-factor authentication) • Provides multiple biometrics/passwordless & highest level of assurance • Reduces service costs & eliminates dispute resolutions
  • 29
    SAFE

    SAFE

    Safe Security

    On average, a Fortune 2000 CISO today uses 12 cybersecurity products in their environment. This means they have 12 dashboards to tell them what’s going wrong and no place to aggregate all of them. Most cybersecurity product purchases fail to justify an objective ROI. A clear difference in the delta change of the organization's cyber resilience from its “before” to “after” implementation state of the product is missing. There is also no industry standard to measure the quality of the implementation of cybersecurity products. SAFE enables an organization to predict cyber breaches in their environment while contextually aggregating signals from existing cybersecurity products, external threat intelligence and business context. This data is fed into a supervised Machine Learning Bayesian Network-based breach likelihood prediction engine that gives scores, prioritized actionable insights, and the value risk the organization is facing.
  • 30
    ByePass
    Simple, secure automated password management that helps protect your online identity by safeguarding passwords against hackers. Go beyond Windows Password Manager and simplify the password management process across all of your digital devices. ByePass uses local data encryption to store your passwords safely, only calling them up to fill in online login details as they are needed. ByePass encrypts your credit card data for secure checkout. Online vendors have no access and cannot store the information. Manage your passwords by letting ByePass remember and fill in your login details — no typing needed! Scan the Dark Web to see if any of your passwords appear on lists hackers share, and change them immediately right within ByePass. Let ByePass automatically think up strong, unique passwords for you for the very best password security.
    Starting Price: $15.95 one-time payment