Best IT Security Apps for iPad - Page 15

Compare the Top IT Security Apps for iPad as of May 2026 - Page 15

  • 1
    MobileWare

    MobileWare

    MobileWare

    When it comes to IoT connectivity, you need stable, blazing-fast connections you can trust. MobileWare inspires forward-thinking customer connectivity with simple-to-deploy and easily managed mobile solutions. At MobileWare, we provide advanced end-to-end connectivity and IoT solutions for enterprises. We use industry-leading IoT connectivity technologies to support your business’ mobility, wireline, IoT, and security. Our unique MobileWare Single SIM™ simply and securely connects all endpoints between your customers around the world. When it comes to global IoT connectivity, you need a network that keeps your business connected in the wildest of weather or the most remote locations. And this is why MobileWare exists—to give your business a truly global IoT network connectivity that covers different parts of the earth. Bring your products and services to the market faster, using our secure, scalable mobile IoT connectivity.
  • 2
    GoGuardian

    GoGuardian

    GoGuardian

    Unify your filtering, classroom management, and school mental health tools into a single suite. GoGuardian’s suite of tools helps you maximize the learning potential of your 1:1 school technology program. Seamlessly integrate multiple device types and platforms into your 1:1 deployment. From Chromebooks and Apple devices to Windows and BYOD, GoGuardian’s suite of tools can help keep your students safe on any device. As the world of digital learning accelerates, we believe it is critical to study and understand the impact of the digital learning experience on student outcomes. Our dedicated impact research team is working tirelessly to understand this impact, and how digital learning can be improved. With an average response time of 30 seconds, our world-class support team is here to help you solve virtually any problem. We even provide direct support for your teachers. And our dedicated implementation team ensures you’re set up for success from the moment you deploy GoGuardian.
  • 3
    Moki Total Control

    Moki Total Control

    Moki Mobility

    Moki creates mobile device management software that enables companies to manage large fleets of single-purpose customer-facing iOS, Android, and BrightSign devices. With our MDM software, mobile devices transform into kiosks, digital signage, and points of sale (POS). Moki MDM is the simplest solution for mobile device management on interactive kiosks, POS stations, and digital signage. Moki’s device deployment can be done in minutes. Once enrolled devices can be managed in bulk with Moki’s simple-to-use UI. Moki’s mobile device management platform helps turn any smartphone or tablets into a single-purpose POS terminal. With Moki these devices can be locked to a single application so you can be sure they are only being utilized as intended. Moki MDM provides the functionality needed to deploy and manage digital kiosks in any scenario. Additionally, when using our Moki Kiosk application users can lock to desired URLs, images, and videos for a consistent end-user experience.
  • 4
    Intuitive Password

    Intuitive Password

    Intuitive Security Systems

    Intuitive Password is a military-grade password manager that simplifies your online experience by remembering your passwords and confidential data for you. With Intuitive Password to manage your logins and passwords, it's easy to have an unique and strong password for every online account and improve your online security. Automatically syncs your data across all devices, so you can easily access your data from anywhere at anytime. Stop filling in the same login details over and over. Intuitive Password can login for you with one-click. Never again forget a username or password. Ever. Forget what it's like to go through tedious password resets.
  • 5
    Vaultize DRM

    Vaultize DRM

    Vaultize Technologies

    Achieve security and governance of files throughout their lifecycles, inside and outside your network. Vaultize enables your team to store, access and share files securely & easily and, you to protect & manage them, with digital rights management (DRM), secure file sharing and continuous data protection. The Vaultize platform is designed to protect enterprise data end-to-end - from external or internal threats, from accidental or intentional data leakage and, exposure. Vaultize offers secure and user-friendly solutions that enable teams to store and share files easily via any kind of device while giving IT and auditors complete visibility and control over those files. DRM protection - give and revoke access rights (view, edit, print, share, copy/paste & more). Powerful sharing controls at admin and user level. Full control of who, where, when, how & more.
    Starting Price: $5,000 one-time payment
  • 6
    Intertrust ExpresssPlay
    Content protection and anti-piracy services for premium and high-value OTT streaming and broadcast delivery. Cloud-based multi-DRM content protection and media monetization service for video streamers and content distributors. Cloud-based broadcast TV security solution, enabling direct-to-TV broadcasting to smart TVs without STBs/CAMs, reducing CAPEX/OPEX. Comprehensive anti-piracy services featuring digital fingerprinting, forensic watermarking, web monitoring and piracy take-down. The emergence of streaming as a crucial component of pay-TV business models has spawned unprecedented online piracy. Reversing this worrisome trend requires a new, innovative approach that goes well beyond legacy security platforms optimized for traditional broadcasting and streaming services. To ensure robust content protection in this new era, Intertrust offers the ExpressPlay Media Security Suite, comprising cloud-based multi-DRM service, anti-piracy and forensic watermarking services, and more.
  • 7
    BeyondTrust Password Safe
    Discover, manage, audit, and monitor privileged accounts of all types. Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts. Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. Log and monitor all privileged credential activity and sessions for compliance and forensic review.
  • 8
    Comodo Dome Antispam
    Secure Email Gateway is an enterprise anti-spam and threat prevention system that uses a sophisticated array of spam filters, anti-virus scanners and content analysis engines to prevent unsolicited mail from ever entering your network. Security needs differ from employee to employee. You may want to apply different security levels to different employees such as from finance or sales departments. Dome Anti-spam gives you the freedom to define different types of profiles with different security features and restrictions. Containment protects from the newest forms of ransomware, zero-malware, and other advanced threats. The Valkyrie file verdict system analyzes unknown files. Users are free to open, execute and use the attachments with ZERO risk of infection. Comodo's unique containment technology ensures that risks are fully contained before reaching the end point, so there is no risk of infection, even from the newest malware.
    Starting Price: $4.00/one-time/user
  • 9
    Mobility DNA

    Mobility DNA

    Zebra Technologies

    Mobility DNA unique software ecosystem transforms Android™, the world’s most popular consumer operating system, into an enterprise-ready force. Now, the pains common to other enterprise mobility platforms disappear — making application management simpler, integration problem-free and operations a powerhouse of productivity. During your mobile devices’ lifecycle, you’ll face different needs at different stages. Our software simplifies device lifecycle management throughout your mobile computers’ hardware journey. Ongoing functionality is continually raised to the latest, highest standards. Make your investment last through Mobility DNA. Maximize mobile user productivity and minimize IT complexities across operations, IT, developers, frontline workers, and more, with our built-in software capabilities. Greater device protection against a world of security threats, reducing your risk and extending the lifespan of your device.
  • 10
    Appvance

    Appvance

    Appvance.ai

    Appvance IQ (AIQ) delivers transformational productivity gains and lower costs in both test creation and execution. For test creation, it offers both AI-driven (fully machine-generated tests) and also 3rd-generation, codeless scripting. It then executes those scripts through data-driven functional, performance, app-pen and API testing — for both web and mobile apps. AIQ’s self-healing technology gives you complete code coverage with just 10% the effort of traditional testing systems. Most importantly, AIQ finds important bugs autonomously, with little effort. No coding, scripting, logs or recording required. AIQ is easy to integrate with your current DevOps tools and processes. Appvance IQ was developed by a pioneering team who envisioned a better way to test. Their innovative vision has been made possible by applying differentiated, patented AI methods to test creation while leveraging today’s high-availability compute resources for massive levels of parallel execution.
  • 11
    HCL BigFix

    HCL BigFix

    HCL Software

    HCL BigFix: Secure Resilient Operations, Powered by AI HCL BigFix is the platform for unified endpoint and infrastructure management, purpose-built to deliver on the Digital+ promise of reducing cost, risk, and complexity. Proven at enterprise scale, BigFix secures and manages 155M+ endpoints across nearly 100 operating systems. It leverages AI-driven automation to deliver continuous compliance and real-time vulnerability remediation with one of the industry’s best first-pass patch success rates (>98%). This is enhanced by AEX, our agentic AI platform, which transforms the digital employee experience through proactive, self-healing support. HCL BigFix is the single solution to secure any endpoint, in any cloud, across any industry.
  • 12
    MobiKEY

    MobiKEY

    Route1

    Generate exceptional outcomes for your organization with real-time secure delivery of actionable intelligence—whether in a manufacturing plant, in-theater, or in a university parking lot. With the right analysis, your performance potential is limitless. We can put the appropriate technology in place to help you find key insights and remove your limitations, all while assuring military-grade data security. Route1 help organizations of all kinds use the data they have—and data they didn’t even know they had—to make better decisions and gain tremendous advantages…with no compromise in data security. Secure data with patented technologies. Understand data with real-time acquisition and analytics. Visualize data with industrial-grade rugged devices. Leverage data with advanced technologies and services. We can help you leverage the data you have and the data you didn’t know you had to make better decisions, gain tremendous advantages and generate exceptional outcomes.
  • 13
    VdoCipher

    VdoCipher

    VdoCipher Media Solutions

    Videos streamed through VdoCipher player can't be downloaded using any internet plugins or software. VdoCipher is the complete video hosting solution for e-learning, media and marketing businesses. No downloader, plugin or hack can download or share the videos streamed through us. Hollywood certified DRM to stop piracy. Ip address, user id, email id, phone no, logo, text overlay. Custom size, color, speed to discourage screen capture. Amazon AWS for Servers + CDN. Transcoding, Analytics, API, Dashboard, Plugins, Custom workflows. Customizable player with subtitles, speed change, forward rewind options. Option for viewer to download secure in android app and play offline. DRM encrypted video streaming technology ensures that no downloader, plugin can grab your content. Highest security from video piracy with Widevine DRM. Viewer specific moving/static watermark with email, user id, IP, time stamp. Customize color, speed, transparency, size for watermark.
    Starting Price: $129 per user, per year
  • 14
    idgard

    idgard

    Uniscon

    Efficient collaboration done at the highest level of data protection. Idgard cloud saas: ultra-secure file transfer and data rooms. More than 1,200 companies around the world have already put their trust in idgard. This web service secures digital communication and collaboration with partners and customers at the highest level, and simplifies them as well. With the help of idgard, data rooms for projects can be set up in no time. They turn file sharing into an efficient and highly secure process. Users on the go have protected access to their data via app or browser. No one else has access to them. The internationally patented sealed cloud technology ensures this protection. It also automates key management. Instead of getting bogged down in technical questions, users can focus on their jobs. The following features make idgard unique: Over 1.200 Businesses trust idgard. Over 70.000 Users trust idgard The simple and secure storage and exchange of data online.
    Starting Price: $49.90 per month
  • 15
    Knowee

    Knowee

    Knowee

    Digital business cards. Knowee transforms your business card into a sustainable communication channel. 2,400 Trees cut every day to make business cards. 60 million Business cards printed every day. 746,594 tons of CO2 emitted to the atmosphere annually. Environmental impact and carbon footprint of your business cards. The way we work has changed when we stay at home Knowee - the new way to introduce yourself. Individual use. Paperless digital card. Enriched content with video. New communication channel in your email signature. and for business. Corporate identity with customizable templates. Centralised management. Usage KPIs. Corporate cardholder, CRM. Domain URL masking. Anti - Phishing. SSO - Single Sign-On. IT integrations. Traditional way 88% of all cards are lost in this process. Functional cards on any device. No sign up, no previous knowledge of the tool required. Share via email, WhatsApp, text, Bluetooth, NFC, AirDrop. Inmediate. Remote. Contactless
    Starting Price: $5 per user per month
  • 16
    Libraesva Email Security
    Protect your business from disruption, financial loss and reputational damage. Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides exceptional email security by integrating cloud email and a secure email gateway with Libraesva’s unique Adaptive Trust Engine that uses AI to learn the usual patterns of behavior for organizations and individuals, continuously assessing the strength of business-to-business trust and proactively holding anomalous traffic. Libraesva Email Security scans and filters all inbound and outbound emails for advanced malware, phishing, business email compromise, spam and more. Proprietary sandboxing technology removes dangerous payloads and active content from attachments, and you can protect users from visiting unsafe sites with active URL analysis that checks every link.
  • 17
    Super Gluu
    Super Gluu is a push-notification two-factor authentication (2FA) mobile app built to work with the Gluu Server. Super Gluu uses public-key encryption as specified in the FIDO U2F authentication standard. Upon device enrollment, Super Gluu registers its public key against the Gluu Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. Better identity access management for customers, citizens, and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network.
  • 18
    GoSecure

    GoSecure

    GoSecure

    GoSecure, a recognized cybersecurity leader and innovator, combines more than 20+ years of market-leading security technology with highly skilled professionals who become an extension of in-house security team to mitigate threats before they can compromise business operations. GoSecure Titan® Managed Security Services pioneers the integration of endpoint, network, and email threat detection into a single Managed Extended Detection & Response (MXDR) service. Our GoSecure Titan® Platform offers superior visibility and protection, detecting more threats and reducing security costs with faster threat mitigation. GoSecure Professional Security Services provides a full portfolio of testing and assessment services to evaluate cybersecurity maturity, identify risks and gaps. We define a roadmap tailored to your situation, needs, and budget, improving security posture. Our Professional Services find issues, our Managed Services fix them, helping you thrive.
  • 19
    Cryptomator

    Cryptomator

    Skymatic GmbH

    Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all.
  • 20
    LifeLock

    LifeLock

    NortonLifeLock

    Criminals can open new accounts, get payday loans, and even file tax returns in your name. There's a victim every 3 seconds, so don't wait to get identity theft protection. Lock your TransUnion credit file in one click with Identity Lock. Help keep ID thieves from moving in on your biggest asset with Home Title Monitoring. Available when you choose Ultimate Plus. Scan common people-search sites with Privacy Monitor, find your info, and opt-out. It only takes a few minutes to enroll and install. If we detect a potential threat to your identity, we alert you by text, email, phone†† , or mobile app. We help block hackers from stealing personal information on your devices, and our VPN helps keep your online activity private. If you become a victim of identity theft, one of our U.S.-based agents will work to fix it. We’ll reimburse funds stolen due to identity theft up to the limit of your plan.
    Starting Price: $8.29 per month
  • 21
    DoubleClue

    DoubleClue

    DoubleClue

    DoubleClue is an Identity and Access Management platform from HWS Group in Bavaria to manage identities, rights and access. It secures company networks with modern multi factor authentication from cyberattacks targeted on digital identities / the "human factor". Plus, the platform offers an integrated password management and secure cloud storage for confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On premises or in the cloud. DoubleClue protects the component of your business that is not covered by firewalls and virus scanners – the human factor, the most vulnerable part in any IT security. All digital accesses and applications, passwords and confidential data protected by a strong all-in-one platform. In the digital working world, employees demand maximum flexibility. Enable them to work from anywhere with any device without compromising their IT security.
  • 22
    Avast Small Office Protection
    Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all their business devices. Run your business online safely and with confidence. Our solution will keep hackers away so you can focus on growing your operations. Effortless, layered next-gen endpoint protection that is easy to install and requires no management or configuration. No experience or IT staff required! Advanced endpoint security for employees in the office or on the go. Covers up to 10 devices, including PCs, Mac computers, iPads, iPhone, and Android mobile devices. 24/5 fast and friendly support from our highly trained technical engineers, who can assist you via email, chat, or phone. We’re here for you. Small Office Protection works effortlessly with your business’ existing hardware and devices. It’s a cost-effective solution that boosts productivity while delivering robust next-gen endpoint security.
    Starting Price: $11.67 per month
  • 23
    AVG AntiVirus Free

    AVG AntiVirus Free

    AVG Technologies

    Our free antivirus software just got even better. It now includes real-time security updates, scans for malware, ransomware, and performance issues, and even catches malicious downloads before they reach your PC. You also get an all-new, refreshingly simple design that shows you exactly how you’re protected. All of this, and it still won’t slow you down. Whether you choose free or full protection, you've got impressive security that even updates itself automatically. And with a cutting-edge virus scanner that blocks and removes viruses, you can be reassured that you and your family are protected from the latest threats. Stop viruses, spyware, ransomware & other malware, secure personal folders with an extra layer of ransomware protection, block unsafe links, downloads, & email attachments, scan for PC performance problems.
  • 24
    BlackBerry Access
    Enable access to your corporate network from personal or non-corporate managed devices, protecting enterprise data with full containerization to reduce the risk of data leakage. BlackBerry® Access provides a secure, intuitive user experience for intranet browsing. Employees get access to corporate intranets and apps on their personal or non-corporate managed devices. Simplify your bring your own computer program with desktop offerings from BlackBerry, giving you modern alternatives to traditional VPN and VDI solutions. BlackBerry® Desktop enables users to securely access corporate on-premises or cloud content and resources on their personally owned or non-corporate managed Windows 10 and macOS devices. It includes BlackBerry Access as well as BlackBerry® Work. BlackBerry Access is a secure browser that allows your organization to confidently enable mobile access to your corporate network. It supports iOS, Android, Windows, and macOS.
  • 25
    Azure Information Protection
    Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it’s shared with. Configure policies to classify, label, and protect data based on its sensitivity. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation. Add classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. Track activities on shared data and revoke access if necessary. Your IT team can use powerful logging and reporting to monitor, analyze, and reason over data. Share data safely with coworkers as well as your customers and partners. Define who can access data and what they can do with it.
  • 26
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this, Identité™ has introduced its NoPass™ Employee MFA solution, a lightweight feature that enhances the overall security and is adaptable with the leading authentication protocols that are in the market.
    Starting Price: $2
  • 27
    Privakey

    Privakey

    Privakey

    Privakey’s transaction intent verification provides a secure channel to streamline high risk exchanges between services and their users. Now available as a cloud service. Fraud is everywhere yet so is your competition. Enterprises are constantly seeking to delight their customers while balancing experience and security. It’s a challenging problem that’s getting tougher every year. So how can you securely engage with your customers, and gain their trust of you during sensitive exchanges, in a way that doesn’t add frustration to the process? The answer is Privakey. Transaction intent verification (TIV) is the combination of strong identity assurance and contextual response into one intuitive user experience. Common examples of TIV include payment confirmations, wire transfer approvals and account update acknowledgements. Our solution utilizes asymmetric cryptography, mobile biometrics and secure notifications to ensure the integrity of every exchange.
  • 28
    Belkasoft Remote Acquisition
    Belkasoft Remote Acquisition (Belkasoft R) is a new digital forensic and incident response tool developed specifically for remote extraction of hard and removable drives, RAM, connected mobile devices, and even specific types of data. Belkasoft R will be useful in cases when an incident response analyst or a digital forensic investigator needs to gather evidence quickly and the devices in question are situated in geographically distributed locations. With Belkasoft R, there is no longer need to interrupt an employees' daily routine or draw excessive attention to your investigation. Belkasoft R saves your time and money doing a forensically sound remote acquisitions: no more excessive costs and extra time for travels. No more geographical challenges and expensive trips. No need in having trained specialists in all locations of your organization’s offices.
  • 29
    ImageWare CloudID
    ImageWare CloudID® is a highly modular, software platform that enabled rapid development and deployment of highly secure, yet flexible biometric identity management solutions. ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures. Two innovations differentiate this biometric identity platform, virtually any biometric modality and algorithm from any vendor can be quickly incorporated into the system, and the system can be easily scaled to satisfy the requirements of small organizations or entire counties, providing ultra-scalable real-time solutions. ImageWare CloudID’s server platform is a set of configurable, server-based software modules designed to add or enhance biometric identity management and credential issuance capabilities to existing applications or support the development of these capabilities in new end-to-end applications.
  • 30
    PXL Vision

    PXL Vision

    PXL Vision

    PXL Vision revolutionizes digital identity verification, automating customer onboarding and KYC processes to increase conversion rates. As the Swiss market leader for digital identity verification, our flexible solutions utilize efficient, AI-based ID checks as a SaaS or on-premise solutions. With our patented technologies, we ensure fast, reliable, and user-friendly identification processes that seamlessly integrate into existing workflows. Our Auto-ID adapts to various customer needs, offering customizable deployment, branding options, and security levels. Since 2017, we have empowered numerous partners and customers to save costs, boost revenue, and enhance user experience.
MongoDB Logo MongoDB