Alternatives to Harmony Mobile

Compare Harmony Mobile alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Harmony Mobile in 2024. Compare features, ratings, user reviews, pricing, and more from Harmony Mobile competitors and alternatives in order to make an informed decision for your business.

  • 1
    IBM Security MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.
    Compare vs. Harmony Mobile View Software
    Visit Website
  • 2
    BlackBerry Protect
    AI detects and prevents attacks before they can execute, preventing users from opening URLs or visiting spoofing pages mimicking those of legitimate websites. It prevents, detects and remediates advanced malicious threats at the device and application levels. Malware and grayware are identified by application sandboxing and code analysis, plus app-security testing. All applications are scanned and validated before being pushed to the device or the user seeking access. All mobile endpoints BlackBerry UEM manages are protected from zero-day threats without reliance on end users to install, log in or maintain third-party apps or configure settings manually. Choose a single-point connectivity solution. Download once, distribute locally. Hybrid deployment facilitates security-related communication between the cloud and local infrastructure without exposing your network.
  • 3
    Sophos Intercept X for Mobile
    Intercept X for Mobile protects users, their devices, and corporate data from known and never-before-seen mobile threats by leveraging our market leading Intercept X deep learning engine. It is all managed seamlessly through Sophos Central, alongside the entire Sophos portfolio of next-generation cybersecurity solutions. Sophos Intercept X for Mobile continuously monitors device health and notifies you if a device is compromised so you can take remediating action or automatically revoke access to corporate resources. Device security advisors detect jailbreaking or rooting and can inform the user and admin of necessary operating system updates. Establish a first line of defense at the mobile network level on Android and iOS. Network connections are examined in real time to check for suspicious characteristics that may identify an attack. This helps mitigate the risk of Man-in-the-Middle (MitM) attacks. Web filtering and URL checking stops access to known bad sites on mobile devices.
  • 4
    Traced Control
    Traced Control for businesses delivers groundbreaking MTD (mobile threat defence) that gives you immediate visibility and analysis of mobile threats. Every personal and business-owned mobile device is a gateway to business data and a route to your network. The Traced app protects your mobile devices and the Control MTD gives your IT and security teams the tools they need to protect your business. Traced protects employee devices from application, network and device-based threats including malware, phishing, rogue WiFi, unauthorised screen, camera and microphone access, permissions abuse and device exploits. The Traced Deep Learning engine detects both known and unknown malicious apps and provides you with crucial information for your analysis, investigation and response. WiFi protection alerts both the device and in Control when a user connects to a compromised or insecure WiFi network.
    Starting Price: £9/device/year
  • 5
    Trellix Mobile Security
    Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, Trellix Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier, and even offline. Machine learning algorithms analyze device behavior deviations to uncover indicators of compromise and accurately identify advanced device, application, and network-based attacks. Extend visibility and control of mobile devices from the same console managing OS-based endpoints, servers, containers, and embedded IoT devices. Leave employees to their own devices and accommodate the human factor, without compromising the user experience or violating privacy. Trellix Mobile secures Android and iOS devices, including iPhones and iPads.
  • 6
    Comodo Mobile Device Security
    The leading-edge mobile security technology for iOS and Android. High-performance malware engine, VPN, ID protection, safe browsing, and AppLock features help you to keep your apps and data safe. Comodo’s mobile antivirus app provides complete protection against different types of malware, including trojans, worms, ransomware, cryptoware, spyware, and adware. Our advanced security app, integrated with real-time virus signature, identifies new threats on the fly and immediately blocks them to protect your mobile device. Receive alerts when sensitive data is circulating the dark web to begin proactively preventing further damage. Activate this safe Wi-Fi feature to be alerted when the Wi-Fi network you are on is not secure or when it is under attack. Block phishing, malware domains, malicious sites, botnets, C&C callback events, and web-borne attacks. Protect your privacy by masking your IP address and encrypting your mobile connection to ensure privacy.
  • 7
    SlashNext

    SlashNext

    SlashNext

    SlashNext anti-phishing and IR solutions stop threats across mobile, email, and web—dramatically reducing the risk of data theft, cyber extortion, and breaches. Protect iOS and Android users from mobile-centric phishing threats with a lightweight, cloud-powered agent. Shield employees from live phishing sites with cloud-powered browser extensions for all major desktop browsers. Use live threat intelligence to turn existing network security controls into a real-time, multi-vector phishing defense. Automate phishing incident response and threat hunting with accurate, run-time analysis of suspicious URLs on-demand. Targeted attack to gain access to an individual’s account or impersonate a specific individual. Using deception to manipulate users into divulging confidential information for fraudulent use. HTML, PDF and Microsoft Office attachments used to harvest credentials or download malware.
  • 8
    Malwarelytics
    Protect your app users from mobile malware and other device-related threats. Learn what malware is currently active on your users' devices, see which specific users have insecure devices, and actively help them fix their smartphone's problematic configuration as soon as it shows up on your radar. Mobile malware and cyber attackers became extremely sophisticated. They are looking for new ways to hack your mobile apps and cause damage. By misusing the mobile operating system features, they can gain an advantage and steal your users’ personal data or even money. Avoid these devastating consequences. After all, your business reputation is at stake! Malwarelytics® prevents the most common threats that mobile apps are facing these days and helps your organization stay safe and compliant. Device rooting or jailbreak disables security features provided by the mobile operating system, which opens the device to the attackers.
  • 9
    Proofpoint Mobile Defense
    Enterprises face growing threats from malicious Wi-Fi hotspots and millions of apps on employee-owned devices. These apps can include malware and “riskware” – apps that might not be overtly malicious but exhibit behavior that puts enterprise data at risk. Enterprises face growing threats from malicious Wi-Fi hotspots and millions of apps on employee-owned devices. These apps can include malware and “riskware” – apps that might not be overtly malicious but exhibit behavior that puts enterprise data at risk. Together, these threats expose enterprise users to data leakage, credential theft, and the exfiltration of private information that can be used to target specific employees in advanced attacks. Enterprise users casually access Wi-Fi hotspots and give these riskware apps sweeping permissions, not realizing that their personal and corporate data may be sent to remote servers and advertising networks all over the world, where it can be mined by cyber criminals.
  • 10
    SEAP

    SEAP

    XTN Cognitive Security

    SEAP® for Mobile is an SDK integrated into the customer’s app and doesn’t require any special permission. SEAP® for Web is JavaScript based, executed in the web browser application environment and does not require the installation of any agent. SEAP® detects malware activity both in mobile and web apps. Some examples of the malware threats monitored include man-in-the-browser and man-in-the-app-attacks, RAT, web injections, overlay attacks, SMS grabbing, memory tampering, and Injection attacks. SEAP® detects and reports technological threats in the device such as jailbreaking and rooting, reverse engineering attempts, binary tampering, repacking. Countermeasures to some of these device conditions can be activated in the app relying on the dedicated RASP APIs. SEAP® detects fraudulent activity taking control of existing user accounts, relying on behavioral biometrics checks and device identity authentication.
  • 11
    Webroot Mobile Security
    Threats from mobile malware on Android™ devices continue to grow exponentially. Each year, Webroot categorizes millions of new apps as suspicious or malicious. And iOS attacks are on the rise, too. With more and more shopping, banking, and browsing happening on mobile devices, hackers are devoting greater effort to compromising these devices. Protecting them is more important than ever. Secure mobile web browsing identifies malicious websites and protects against phishing and other social engineering tactics aimed at seizing your personal data in real time. Android antivirus automatically protects, scans, and checks all applications and updates for threats without interruptions. Simple-to-use, powerful internet security for your iPhone® that won’t impact browsing speed. Blocks malicious websites that steal personal information while using Webroot or Safari® browsers. Worry-free browsing backed by machine learning and Artificial Intelligence with 20 years of historical data.
    Starting Price: $15.00/year
  • 12
    Pradeo

    Pradeo

    Pradeo

    Automate on-device mobile threat protection and track device's security compliance. Pradeo Security is a mobile security application that prevents corporate data theft / leakage and fraud. It is available for Android, Android Enterprise, iOS and Chromebooks. The Pradeo Security mobile application delivers an advanced detection of known and 0-day threats coming from mobile apps, network connections and OS configurations. When it detects a threat, it remediates it automatically according to your organization’s security policy. - Ready-to-use mobile security application - Fast deployment - 0-touch configuration - Automatable - Data protection - Multiprofile mode dedicated to Android Enterprise
  • 13
    Cubed Mobile

    Cubed Mobile

    Cubed Mobile

    End-to-end mobile security is made simple. Get the protection you need for your growing business in two simple steps. Cubed Mobile frees your employees from the need for a second device and/or second SIM while creating a secured separation between personal and business workspaces. Keep sensitive data safe and isolated in a secure environment. Ensure employees only connect to secure Wi-Fi networks. Empower your team to access the Internet securely. Protect against network, apps, privilege abuse, and advanced attacks. Strengthen security, smooth communication coordination, and ease management of BYOD with a new approach that anyone can set it up in two minutes! Create workspaces with different settings, apps, and access-rights based on user parameters. Let your admins invite and remove users, edit personal details, settings, and virtual lines, and filter lists of associated devices. Anytime you can remotely backup, restore, and wipe entire workspaces immediately.
  • 14
    V-OS Mobile App Protection
    V-OS Mobile App Protection solution can detect and protect the mobile app from threats, such as reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code injection, debugging, and many more. In an insecure OS environment when the phone is compromised, apps integrated with V-OS Mobile Application Protection have rooted and jailbreak detection mechanisms that allow a mobile app to run smoothly without compromising its integrity and confidentiality, without breaking its security or leaking any sensitive information stored inside the app. Built on top of V-Key’s patented V-OS Virtual secure element as the security foundation, V-OS Mobile App Protection adds another layer of tamper protection and security enhancements. V-OS Mobile App Protection was created as a versatile solution to ensure both security and convenience to enterprise end-users. True cybersecurity should be based on the synergy of various protection techniques.
  • 15
    BETTER Mobile

    BETTER Mobile

    Better Mobile Security

    BETTER Mobile Threat Defense protects mobile devices from attacks and threats. It’s simple, affordable, and powerful. Lightweight mobile agent that provides endpoint protection. Deploy it in minutes via EMM. Streamlined admin console gives immediate visibility, intelligence and control over device risks and threats. The console provides rich information and easy policy management, but our goal is to keep you from ever needing to use it. We have built one of the most advanced machine learning platforms and focused it on mobile threat detection. With our global mobile sensor network feeding rich intelligence into Deep Thinker, a cloud-based AI engine, BETTER MTD provides highly accurate detection of risky apps, anomalous behavior, and network threats. The detection engine provides comprehensive around-the-clock protection for your company data and resources. Runs in the background only consuming 5% battery and 1% CPU.
  • 16
    Corrata

    Corrata

    Corrata

    Mobile threat defense which is more powerful, more respectful of employee privacy and easier to deploy than competing solutions. Corrata works unobtrusively in the background watching for signs of malware infection and automatically quarantining any compromised devices. Our unique traffic inspection technology means even the most sophisticated malware has nowhere to hide. 85% of mobile phishing attacks take place outside email. Corrata monitors incoming messages over SMS, WhatsApp and other channels, scanning them for phishing attacks, and blocking malicious links. Corrata continuously assesses the configuration of devices and alerts employees if they need to update operating system software, remove harmful applications or change settings. Conditional access policies prevent poorly configured phones and tablets from accessing business applications.
  • 17
    Whalebone

    Whalebone

    Whalebone

    Whalebone is a zero disruption cybersecurity product for telcos, ISPs, and corporations that provides millions of everyday internet users unyielding protection from malware, phishing schemes, ransomware, and other malicious digital attacks without the need for them to download anything. Whalebone’s mission is to bring cybersecurity to 1 billion everyday people. Whalebone has repeatedly proven its potential by enabling important CEE telcos to properly protect their customers, while significantly raising their revenue. At this point, Whalebone has 200+ customers in telecommunications and corporate sectors around the globe.
  • 18
    CopperheadOS

    CopperheadOS

    Copperhead

    CopperheadOS is a Secure Android built for encrypted and secure phones by a privacy focused company. Available as security-centric and privacy focused Google-free Android for the latest Pixel devices. Develop or include a secure phone in your businesses mobile security program. CopperheadOS integrates with the latest and greatest mobile security solutions. Mobile devices are easy targets for hackers so we developed the most secure android, CopperheadOS, to protect against a variety of attack vectors. Copperhead's technical documentation is available for review. Security-centric, non- technical user experience. No Google or any tracking analytics. Sandboxing and application isolation. Integrates with the latest mobile device management and intrusion detection system mobility software.
  • 19
    Symantec Endpoint Protection Mobile
    Threat defense tools that use a mix of vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling and transport security technologies to help defend mobile devices and applications from advanced threats. Mobile devices are more than just small computers in continuous use with perpetual connections to the Internet. The operating paradigm of these devices calls for new approaches to help ensure the data processed by them remains secure while maintaining productivity. Symantec designed the risk-based mobile security approach in Mobile Threat Defense from the ground up to defend against all detected threats that put business data at risk of exposure, theft, and manipulation while respecting users’ need for privacy, productivity, and a great mobile experience. Detect the most threats with on-device and in-cloud machine learning elements. Benefit from real-time processing, detection, and protection–at scale.
  • 20
    GlobalProtect

    GlobalProtect

    Palo Alto Networks

    The modern workforce is more mobile than ever, accessing the network from any place on any device, at any time. Endpoint antivirus and VPN technologies aren’t enough to stop advanced threats. By extending next-generation firewall capabilities through the GlobalProtect subscription, you can gain greater visibility into all traffic, users, devices, and applications. With GlobalProtect, organizations can extend consistent security policies to all users, while eliminating remote access blindspots and strengthening security. GlobalProtect safeguards your mobile workforce by using the capabilities of your Next-Generation Firewall to inspect all traffic—incoming and outgoing. Enable always-on IPsec/SSL VPN connection between a variety of endpoints and operating systems to deliver transparent access to sensitive data without risk. Quarantine compromised devices with immutable characteristics on internal and external networks.
  • 21
    Trend Micro Mobile Security
    Stay safe, no matter where you go or what you do. Enjoy advanced security and privacy. Live your mobile life more safely with powerful protection for all your mobile devices. Improve performance. Take advantage of optimization features to make your mobile devices work better. Avoid online scams and fraud. Flag malicious phishing emails and scam websites. Trust in experience. Enjoy peace of mind thanks to mobile solutions built on nearly 30 years of security expertise. Stop threats, rely on the cloud-based Smart Protection Network™ and mobile app reputation technology to stop threats before they can reach you. Surf anywhere and prevent mobile apps from loading dangerous and risky websites when you browse. Protects you against malicious apps, ransomware, dangerous websites, unsafe Wi-Fi networks, unwanted access to your device, and more. Optimize your mobile phone to keep it running at peak performance.
  • 22
    Zimperium Mobile Threat Defense (MTD)
    Zimperium Mobile Threat Defense (MTD) – formerly known as zIPS- is a privacy-first mobile security solution that provides comprehensive mobile security for organizations. Zimperium protects an employee’s corporate-owned or BYOD from advanced persistent threats without sacrificing privacy or personal data. Zimperium MTD can help organizations identify which mobile devices have risky or banned apps by pinpointing what servers these apps are connecting to and blocking these apps and browsers from sending data off the device to the domains to which the app connects. By leveraging zero-touch activation, Zimperium MTD can automatically enforce conditional access controls as part of a zero-trust strategy, which prevents the use of enterprise apps and access to sensitive corporate data while these banned apps are installed.
  • 23
    zDefend

    zDefend

    ZIMPERIUM

    Zimperium zDefend offers an outside-in approach to mobile in-app protection. It’s an SDK that enables the host application to detect and proactively protect itself by taking actions on the end user’s device, even without network connectivity. The SDK leverages z9, Zimperium’s patented machine learning-based threat detection engine. The on-device actions are configured within the application. They can be updated in real-time without publishing a new version making it practical and scalable across large install bases. zDefend’s mobile RASP capabilities allow continuous monitoring, protection, and effective threat modeling within the mobile DevSecOps life cycle. -Advanced machine learning-based behavior detections -Restrict access & disable features when risk is unacceptable -Update in-app protection policies in real time -SDK optimized for size and performance -Minimal app permissions to preserve privacy -No PII data taken off the device
  • 24
    AppSuit

    AppSuit

    STEALIEN

    AppSuit Premium is a total mobile app security solution that protects the app from various hacking attacks using app obfuscation and anti-tampering technologies. It has been used by many financial firms and other companies in Korea and has been verified for its safety. Beta tests for new devices/OSs before release. Constant upgrades against evolving cyber threats. Quick and accurate technical support and maintenance service. Client application gets built (archived) after AppSuit plug-in (library) installation and gradle setting configuration in the client's app development environment. AppSuit gets applied to the client APK/IPA automatically after it gets uploaded/downloaded into the build system. The build system (in web service form) is required to apply AppSuit to the client APK/IPA. Designated as the best quality product several times in the POC and BMT evaluation by financial firms and large corporates.
  • 25
    iVerify

    iVerify

    iVerify

    Use iVerify to manage the security of your iOS device and detect modifications to your smartphone. iVerify makes it easy to manage the security of your accounts and online presence with simple instructional guides. Stay ahead of vulnerabilities by securing your team’s mobile devices, metrics allow you to see completion of security guides, up-to-date OS, signs of compromise, and more. iVerify helps you keep your devices and online accounts secure from vulnerabilities and it detects compromise by monitoring for signs that iOS security has been degraded by an exploit and by checking for known bad files and folders. It detects most cases of compromise but cannot detect all of them. It's still important to limit your exposure to attacks and limit the sensitive data available on your phone and online accounts.
    Starting Price: $3 per user per month
  • 26
    MYAndroid Protection
    For you, it’s impossible to use personal judgment as a factor as to which apps have malicious intent and which have not. Our technology enables malware protection, privacy control, backup & recovery, Protection against theft & losses, and credit card & Identity theft protection. By combining an easy-to-use graphical interface with award-winning, business-strength technology, and preconfigured settings, MYAndroid Protection makes getting started straightforward and keeps your security level high. Several apps have been found with embedded malware, these apps contain malware that can steal your private information, wipe your data, or could increase your bill by dialing and texting Premium rate numbers without your awareness. Spyware apps can track your location, read your mailbox and more. Scan your smartphone and make sure that your Android device is free of malicious software and kept that way.
  • 27
    AdaptiveMobile Security

    AdaptiveMobile Security

    AdaptiveMobile Security

    Security and business intelligence services enabled by continuous supervized machine learning and security expertise providing managed threat detection, response, analysis and insight. Monitoring and assessment of evolving suspicious activity within our global deployments across every continent, 24 hours a day, every day. Our mobile and security skills form the foundation of our capabilities, ensuring the security of mobile services today and in the future. Providing continuous real-time security enforcement, using distributed artificial intelligence and machine learning policy decision engines. Enabling frictionless security from attack for all subscribers. Advanced threat detection and mitigation methods through industry-first research and collaboration. First to market in the telecoms industry for innovative security defenses, threat discovery and managed cyber & telecom security offerings.
  • 28
    Certo Mobile Security

    Certo Mobile Security

    Certo Software

    Certo Mobile Security is brought to you by the industry-leading mobile security company, Certo Software. With years of experience in cyber security, our products have helped millions of people safeguard their devices and find peace of mind. Our all-in-one security app helps you protect your device by analyzing its configuration, scanning your WiFi network for threats, and guiding you through how to set up your iOS device for a more secure experience. Verifies if your device has the latest software version and security fixes from Apple. Also checks whether you are protected against unauthorized access. Helps you stay safe online by analyzing your current network for signs of unauthorized monitoring, router vulnerabilities, and other threats. Provides actionable security tips for protecting your personal data with an easy-to-use checklist to keep track of completed actions. Security health check, and security & privacy checklist.
  • 29
    Promon INSIGHT
    Take back control of your applications by monitoring and detecting mobile threats. With Promon INSIGHT™ you can securely monitor, detect and respond quickly to known and unknown threats. The data reporting is intended for collecting reports about the app’s runtime environment and specific threats to the security of the application. Promon INSIGHT™ gives you crucial time to react to emerging threats. With the ability to silently report back to servers, hackers performing targeted attacks won’t even be aware that they have been detected. Understand your apps execution environment and security status. Promon INSIGHT™ provides secure reporting methods that can be trusted. Other reporting technologies can easily be manipulated making their reports untrustworthy. Promon INSIGHT™ uses detailed in-depth monitoring of the app and the OS environment in ways that are not possible by using standard API`s. It can therefore see anomalies that are outside the scope of other reporting solutions.
  • 30
    DexProtector
    Instant protection for iOS and Android apps from static and dynamic attacks. A global leader in app and SDK defense with over ten billion installations. DexProtector’s approach to defending your apps is unique. Its Runtime Application Self Protection (RASP) native engine works at a system level deep within the app. From there, it interacts directly with the OS components. This helps it to control key processes and secure the most sensitive parts of your apps and libraries. DexProtector builds layers of protection on top of one another, creating a solid shield around your valuable code and assets. This hardens your apps and prevents real-time attacks. Instant, one-click integration into your CI/CD with no coding required. Protects your apps as well as the communication channel with servers. Provides a secure layer between your app and the operating system. Defends your app against both static and dynamic attacks.
  • 31
    Webroot Internet Security Complete
    The WiFi Security VPN and antivirus protection go hand in hand. To stay safe online, you need both. Antivirus protects your devices, VPN protects your connection by keeping your browsing private, and both work together to give you security and privacy as you work, share, bank and browse. Webroot protects your usernames, account numbers and other personal information against online threats. Our cloud-based protection keeps you and your family safe every time you connect. Webroot is one of the fastest, lightest and most effective antivirus products on the market. Stay safe at home or on the go. Access your files from your mobile device safely and easily. Privacy protection and system maintenance tool that erases past online activity to protect your privacy.
  • 32
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 33
    Wandera

    Wandera

    Wandera

    Unified real-time security for your remote users, wherever they are and however they connect. One single security solution for all your remote users, that spans use cases from threat protection to content filtering and zero trust network access, and covers smartphones, tablets and laptops. One unified analytics and policy engine that lets you configure once and apply everywhere. Your users have moved outside the perimeter, and your data has moved to the cloud. Wandera’s cloud-first approach ensures a consistent and seamless security and usability experience for all remote users, and doesn’t suffer from the challenges of extending legacy architectures to today’s new way of working. Our high-performance cloud platform scales vertically and horizontally on demand to deliver real-time security across 30+ global locations. Informed by 425 million sensors across our global network, the MI:RIAM threat intelligence engine always stays ahead of the evolving threat landscape.
  • 34
    NowSecure

    NowSecure

    NowSecure

    Fully automate security and privacy testing for mobile apps you build and use within one easy-to-use portal. With NowSecure Platform, test pre-prod and/or published iOS/Android binaries while monitoring the apps that power your workforce. Scale comprehensive security and privacy testing with automation Continuously test mobile binaries as you build them to keep pace with Agile and DevOps software development timelines. Monitor apps in production to confidently meet rapidly evolving mobile enterprise needs while building bridges across dev, security, GRC and mobile center of excellence (MCOE) teams. Streamline modern testing practices NowSecure Platform is tailored to meet the unique needs and complex infrastructure of the modern mobile SDLC, providing security and privacy testing solutions, including API testing, that are continuous, customizable, and accurate. Maximize visibility across teams with accurate results.
  • 35
    V-OS Virtual Secure Element
    V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. In this video, we take a step back to introduce and explain the core of our technology, V-OS. With V-OS as the security foundation of your mobile application, your organization can build a wide range of solutions that are secure, trusted and scalable, and customized to your business needs. Layered tamper detection and response mechanisms. Patented cryptographic virtual machine. FIPS 140-2 Level 1 and Common Criteria EAL3+. Minimizes total costs of ownership. Faster market penetration with effortless over-the-air deployment. Flexible and extensible SDK framework. Eradicate costly hardware dependency.
  • 36
    Webroot Internet Security Plus
    The WiFi Security VPN and antivirus protection go hand in hand. To stay safe online, you need both. Antivirus protects your devices, VPN protects your connection by keeping your browsing private, and both work together to give you security and privacy as you work, share, bank and browse. Webroot SecureAnywhere® Internet Security Plus provides cloud-based protection from online threats for all your devices keeping you safe no matter how or where you connect. It scans faster, uses fewer system resources, and protects you in real time by instantly identifying and blocking new threats as soon as they appear.
    Starting Price: $35.99 per year
  • 37
    Lookout

    Lookout

    Lookout

    Our mission is to secure and empower productivity in a privacy-focused world, where work and play can happen anywhere. With everything now in the cloud, it’s critical that cybersecurity follows you wherever you go, securing your data from the endpoint all the way to the cloud. Mobility and cloud technology have become essential, as most of us now work and manage our personal lives digitally. With a platform that integrates endpoint and cloud security technologies, Lookout solutions can be tailored for any industry and any company size, from individual users to large global enterprises and governmental organizations. Cloud access doesn’t have to be all or nothing. Security shouldn’t interrupt productivity or impair the user’s experience. With visibility and insights into everything, we enable you to secure your data by dialing in precise access and providing a seamless and efficient experience.
  • 38
    Check Point Harmony Endpoint

    Check Point Harmony Endpoint

    Check Point Software Technologies

    Check Point Harmony is the industry’s first unified security solution for users, devices and access. The solution protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications. Protecting today’s hyper-distributed workspace requires endless security functions across user devices, applications and networks. However, stitching together point solutions often leaves security gaps and creates a cumbersome infrastructure that is difficult to manage and scale. Harmony offers an alternative that saves you the overhead and increases security. Harmony unifies 6 cloud-based security products to keep you 100% safe. Wherever you connect from, whatever you connect to, and however you connect – Your home, your devices, your privacy and your organizational data are secured and protected from any cyber threat.
  • 39
    EndCrypt

    EndCrypt

    Procenne

    EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt provides a broad range of patented security capabilities to protect applications by preventing reverse engineering techniques via code obfuscation and anti-repackaging technology. It actively detects malicious key logging, screen readers, repackaged applications, debuggers and emulators, and jailbroken or rooted devices. It blocks foreign code from executing or shuts down the application to protect sensitive data from cybercriminals.
  • 40
    VIPRE ThreatIQ
    VIPRE ThreatIQ gives you the real-time intelligence you need to strengthen your cyber-defense and stop attackers cold. Today’s cyber attackers don’t mess around. They’re sophisticated, and they know how to target your business: drive-by websites, phishing emails, ransomware, or even all-out network exploits. Any technique proven to deliver results is fair game—and they’re constantly devising new ways to take you down. VIPRE ThreatIQ compiles real-time, global threat intelligence to help you understand where attackers are coming from and how they’re working to infiltrate networks—so you can focus your security efforts accordingly. Tackle known and emerging threats with a constant stream of malicious URLs and IP addresses, suspected malicious files, phishing links and other malware data processed by our labs. Blocking a single attack vector won’t work in this era of evolving malware. Use VIPRE ThreatIQ to ensure your security strategy covers every potential point of infiltration.
  • 41
    SandBlast Threat Emulation

    SandBlast Threat Emulation

    Check Point Software Technologies

    Attacks from unknown threats pose critical risks to businesses and are the hardest to prevent. This is why many businesses rely on SOC teams to detect them after breaching their systems. This is an ineffective strategy. Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. ThreatCloud is Check Point’s rich cyber defense database. Its threat intelligence powers Check Point’s zero-day protection solutions. Check Point Infinity is a unified security architecture that delivers real-time threat prevention of both known and unknown threats, simultaneously protecting the network, cloud, endpoints and mobile and IoT devices.
  • 42
    Check Point URL Filtering

    Check Point URL Filtering

    Check Point Software Technologies

    Web access is a predominant route for attacks on enterprises. Check Point URL Filtering controls access to millions of web sites by category, users, groups, and machines to protect users from malicious sites and enable safe use of the Internet. URL Filtering employs UserCheck technology, which educates users on web usage policy in real time. Protects users with cloud-based categorization and UserCheck technology. Enable on any Check Point security gateway reducing total cost of ownership. Unified security across all aspects of the web with full application control integration. Security teams must be able to isolate, secure, and control every device on the network at all times. Check Point solutions provide you with the ability to block infected devices from accessing corporate data and assets, including employees’ mobile devices and workstations, IoT devices and industrial control systems.
  • 43
    NCR Network & Security Services
    Internet attackers can target the IT infrastructure of organizations large and small, threatening your reputation and exposing your business to expensive fines. How do you know your security protection is sufficient to defend against these threats? Understanding the potential entry points for system attacks is complex and requires dedicated resources to maintain a strong, secure network. NCR Network and Security Services (NSS) offers a comprehensive solution that safeguards networks and detects threats before a breach occurs. It is fully integrated with other NCR solutions, such as Aloha. No matter the industry, no matter the location, every company in the world is in the security business. The threat of hacking and network breaches is too great. And customer data is too important. Restaurants and retailers that think bigger, broader and more holistically about security can effectively protect their POS networks, IT infrastructures and critical customer information.
  • 44
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 45
    Symatec Secure Access Cloud
    Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principles in delivering point-to-point connectivity without agents or appliances, eliminating network level threats. Secure Access Cloud provides point-to-point connectivity at the application level, cloaking all resources from the end-user devices and the internet. The network-level attack surface is entirely removed, leaving no room for lateral movement and network-based threats. Its simple-to-set, fine-grained and easy-to-manage access and activity policies prevent unauthorized access to the corporate resources by implementing continuous, contextual (user, device and resource-based context) authorization to enterprise applications allowing secured employee, partners and BYOD access.
  • 46
    Sequretek Percept EDR
    Secure your endpoints with cloud-native Percept EDR - a comprehensive centrally-managed, cross-platform technology with an end-to-end response mechanism to detect and protect against advanced threats. Percept EDR is an intelligent, easy-to-manage, simple-to-deploy product that works efficiently in heterogeneous environments. Percept EDR uses AI-ML and endpoint detection and response (EDR) telemetry analytics for enhanced detection capabilities. It is one of the very few products that features on-agent AI ensuring that devices stay protected even in an offline mode. Percept EDR provides a real-time defense against zero-day threats, advanced persistent threats, ransomware attacks, and any other malicious activities. Beyond advanced threat protection, Percept EDR also integrates components such as device control, application whitelisting, and vulnerability management into a single product with a single dashboard view over your endpoint security.
  • 47
    OpenText ZENworks Mobile Workspace
    OpenText™ ZENworks Mobile Workspace is a secure mobile access management solution. It balances mobile security and usability so you can take advantage of BYOD cost benefits and users can remain productive with access to what they need, anywhere. Secure, containerized accounts for mobile. Enable your workforce to conveniently access corporate accounts in a secure container on their mobile device. Keep corporate data safe and mobile users happy. Centrally manage mobile device corporate workspaces. Keystore and encryption remove potential vulnerabilities to secure data without controlling the entire device. Provide offsite access to company intranet resources and web apps without exposing them directly to the internet. Keep corporate data safe in secure containers. Control shared data with policy-enforced threat detection. Remote workspace wipes to prevent data theft on lost devices. Isolate and encrypt important data.
  • 48
    Foretrace

    Foretrace

    Foretrace

    Find exposed data before your adversaries do. Foretrace’s patent-pending Total Recon™ engine detects data exposure and alerts you before it results in costly breaches. Credentials can be exposed in data breaches, from leaks or publicly shared sources such as code repositories. Exposed account names and passwords are used by hackers to identify and target accounts. Exposed internal documents and collaboration suites can leak sensitive data. Adversaries can use this data to blackmail organizations or damage their reputations. Metadata is exposed in almost any document or file that is created and is rarely removed before sharing files. This metadata is used by attackers for targeted phishing and malware attacks. Discovered or stolen corporate data and credentials are sold and exchanged on criminal and dark web forums, resulting in easy access for attackers and potential damage to an organization’s reputation.
  • 49
    Symantec Endpoint Protection
    Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.
  • 50
    Panda Endpoint Protection
    Our endpoint protection stops malware, ransomware, and threats that leverage unknown (zero-day) vulnerabilities using an easy-to-manage cloud-based console and a lightweight agent that doesn’t interfere with the performance of the endpoints. Endpoint protection against malware, ransomware, and the latest threats. Detailed, real-time security monitoring and reporting. Lightweight agent and easy-to-use cloud-based console. Extend security by adding patch management and encryption without a new deployment. This effective, Cloud-native security solution for desktops, laptops, and servers centrally manages the security of endpoints, both inside and outside the corporate network. Our Endpoint Protection (EPP) technologies prevent infections by utilizing our Collective Intelligence, the consolidated and incremental knowledge repository of all applications, binaries, and other files, both trusted and malicious.