Alternatives to OpenText ZENworks Mobile Workspace

Compare OpenText ZENworks Mobile Workspace alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to OpenText ZENworks Mobile Workspace in 2024. Compare features, ratings, user reviews, pricing, and more from OpenText ZENworks Mobile Workspace competitors and alternatives in order to make an informed decision for your business.

  • 1
    IBM Security MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.
    Compare vs. OpenText ZENworks Mobile Workspace View Software
    Visit Website
  • 2
    ManageEngine Endpoint Central
    ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Compare vs. OpenText ZENworks Mobile Workspace View Software
    Visit Website
  • 3
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Partner badge
    Compare vs. OpenText ZENworks Mobile Workspace View Software
    Visit Website
  • 4
    Esper

    Esper

    Esper

    Esper powers exceptional Android and iOS device experiences by revolutionizing the way companies manage their device fleets. Through advanced capabilities, such as remote control & debugging, Pipelines for software deployment, Esper device SDK and APIs, Blueprints for dynamic configuration, and no-touch Seamless Provisioning, Esper provides a solution beyond standard MDM, into the modern era of DevOps for devices and beyond. Recognized as one of Deloitte’s Fast500 in 2023, Esper supports some of the world’s most innovative brands in retail, hospitality, logistics, healthcare, education, and more. Traditional mobile device management and mobility solutions (like MDMs, MAMs, EMMs, and UEMs) weren’t built for today’s growing, modern hardware fleets. That’s why Esper goes beyond device management with intelligent tooling and infrastructure for company-owned and managed devices, providing a single pane of glass for both Android and iOS devices.
  • 5
    Jamf Pro

    Jamf Pro

    Jamf Pro

    Formerly known as Casper Suite, Jamf Pro is an enterprise mobility management (EMM) tool for Apple macOS and iOS devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily: - Choose a zero-touch, hands-free experience or go hands-on through imaging. Either way, enroll devices and deploy them with ease. - Go beyond configuration profiles and use policies and scripts to customize devices for the optimal user experience. - Purchase apps in bulk and make them available automatically or through a Self Service catalog. - Manage device settings and configurations, restrict malicious software, and patch all of your Apple devices without user interaction. Jamf Pro works seamlessly with your existing IT services and technologies, including: Apple Business Manager, Active Directory, SSO/SAML, SCCM, APIs, Cisco ISE, Security Connector and Fast Lane, Conditional Access for Mac.
  • 6
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution supporting cross-platform-functionalities. They support all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS and support out-of-the-box enrollment. The management process, streamlining the entire device lifecycle starting from enrollment up until device retirement can be monitored and managed from a unified central console. The automated device enrollment, geofencing, remote access, remote control of device/user grouping functionalities, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 7
    WipeDrive

    WipeDrive

    WipeDrive

    WipeDrive allows home users, corporations and government entities to securely and permanently erase data from hard drives, removable media, and mobile devices, providing a cost-effective, secure, and socially responsible way of recycling and retiring computer storage. WipeDrive is the world leader in secure data destruction.
    Starting Price: $19.95/one-time/drive
  • 8
    Cubed Mobile

    Cubed Mobile

    Cubed Mobile

    End-to-end mobile security is made simple. Get the protection you need for your growing business in two simple steps. Cubed Mobile frees your employees from the need for a second device and/or second SIM while creating a secured separation between personal and business workspaces. Keep sensitive data safe and isolated in a secure environment. Ensure employees only connect to secure Wi-Fi networks. Empower your team to access the Internet securely. Protect against network, apps, privilege abuse, and advanced attacks. Strengthen security, smooth communication coordination, and ease management of BYOD with a new approach that anyone can set it up in two minutes! Create workspaces with different settings, apps, and access-rights based on user parameters. Let your admins invite and remove users, edit personal details, settings, and virtual lines, and filter lists of associated devices. Anytime you can remotely backup, restore, and wipe entire workspaces immediately.
  • 9
    Sophos Mobile
    Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices. Sophos Mobile lets you secure any combination of personal and corporate-owned devices with minimal effort. When users bring their personal macOS, Windows 10, or mobile devices to work, the flexible self-service portal lets them enroll their device, reset passwords, and get help, with no involvement from IT, making your life easier. Container-only Management gives admins control over corporate content in the Sophos Secure Email and Sophos Secure Workspace apps without requiring management of the mobile device itself. Ensure business data doesn’t go adrift and isn’t threatened by malware.
  • 10
    BlackBerry Enterprise BRIDGE
    BlackBerry® Enterprise BRIDGE provides a highly secure option for seamlessly using native Microsoft mobile apps on iOS and Android. Using Microsoft Office mobile apps just got a lot simpler and more secure. Regulated and security-conscious organizations can now enable their users with the full native app experience for Microsoft PowerPoint, Word, and Excel from BlackBerry Dynamics apps such as BlackBerry Work. With the rapid adoption of Office 365 by business and consumer users, some employees may use personal Office 365 accounts to work with corporate files. With the collaboration between BlackBerry and Microsoft, users no longer need to use this workaround. The secure bridge ensures that data encryption and document fidelity are preserved in the document-sharing process and that common data leakage policies are applied. BlackBerry Enterprise BRIDGE allows users to view, create, edit, and annotate Office files on their mobile device of choice inside a secure managed app environment.
  • 11
    SureMDM

    SureMDM

    42Gears Mobility Systems

    Secure, Monitor, and Manage company or employee-owned devices. Avoid security risks and solve maintenance challenges during all phases of device lifecycle. SureMDM by 42Gears is an intuitive and powerful MDM solution and MDM app for Android, iOS/iPadOS, Windows, Linux, macOS, Wear OS, VR, and IoT platforms. You can secure, monitor, and manage company-owned devices for dedicated-use as well as employee-owned devices used to access company data (BYOD). SureMDM incorporates all aspects of enterprise mobility through unified endpoint management, including Mobile Application Management, Mobile Device Management, and Mobile Content Management. SureMDM licenses also include access to SureLock for kiosk lockdown, SureFox for a secure lockdown browser, and SureVideo for a secure digital signage solution.
  • 12
    Trend Micro Mobile Security
    Stay safe, no matter where you go or what you do. Enjoy advanced security and privacy. Live your mobile life more safely with powerful protection for all your mobile devices. Improve performance. Take advantage of optimization features to make your mobile devices work better. Avoid online scams and fraud. Flag malicious phishing emails and scam websites. Trust in experience. Enjoy peace of mind thanks to mobile solutions built on nearly 30 years of security expertise. Stop threats, rely on the cloud-based Smart Protection Network™ and mobile app reputation technology to stop threats before they can reach you. Surf anywhere and prevent mobile apps from loading dangerous and risky websites when you browse. Protects you against malicious apps, ransomware, dangerous websites, unsafe Wi-Fi networks, unwanted access to your device, and more. Optimize your mobile phone to keep it running at peak performance.
  • 13
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 14
    Digital.ai App Management
    Enterprise mobile app management (MAM) enables IT to balance the unique needs of IT and remote users. Connect with our MAM mobile BYOD security experts listen to an in-depth discussion on the mobile security landscape and view a product demonstration. Receive guidance on enterprise app store capabilities and the values of internal app-store testing. Easily manage and update any app, complete security management of sensitive app data down to the physical mobile device using MAM in tandem with existing MDM solutions. Distribute policy-enabled apps through existing app stores, and support the secure distribution and management of any app using MAM centralized policy management and App Store or Google Play. Developers can improve overall app quality, improve ‘time-to-market’ metrics, and continuously innovate on features by gathering user data and feedback. Securely manage and distribute apps to external employees or trusted internal employees.
  • 15
    Relution

    Relution

    Relution

    Manage iOS, Android, and Windows 10/11 devices. Secure via restrictions and configurations. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Inventory and manage native and public Apple, Android, and Windows mobile apps. Review, approve, and publish apps for usage on mobile devices. Enable employees, partners, and external stakeholders to access your enterprise apps through your own app store in your corporate identity. Manage your Apple iOS and Android tablets easily and securely and deploy the right apps in your school. Companies, Authorities and Teams of every size benefit from Relution's Mobile Device and App Management. Resellers, Educational Institutions and IT Retailers use Relution to provide the service to their customers. Relution is one of the most relevant IT applications in the digital education space. For over 10 years, Relution has been the mobile device management solution for privacy-compliant and cross-platform device management.
  • 16
    Blue Cedar

    Blue Cedar

    Blue Cedar

    Easily modify mobile apps to meet security needs without developer assistance. Execute streamlined mobile app deployments. Manage zero-trust network access (ZTNA) controls for mobile apps and devices. Reduce lead time with workflows that orchestrate fragmented deployments efforts, coordinate technologies, and enhance cross-team collaboration. Easily address your unique deployment needs with our workflow builder, deployment and enhancement services, and integrations with popular technologies. Use visualizations of analyzed workflow data to optimize future deployments. The Blue Cedar platform is used by leaders in finance, insurance, healthcare, government, energy, and other industries. Request a demo today to find out how Blue Cedar can help you streamline mobile app deployments. Add new functionality to mobile apps without coding. Orchestrate any sequence of deployment tasks. Enable zero-trust access from any mobile app on any device.
  • 17
    Perscale

    Perscale

    Perscale

    All of your apps, files and data are accessible via Perscale. Touch up that picture on Photoshop on your iphone, Chromebook, or desktop–all you need is wifi. Your hardware will never again be obsolete. Your files, documents, pictures and videos stay in the cloud. Perscale offers online storage so your files are always up to date. Perscale offers free storage, file sync and sharing that is fully integrated with all of your applications. We’re integrated with Dropbox so you can save your files straight from your app to your preferred online storage provider. Say goodbye to viruses. Because your apps are in the cloud, viruses, Trojans, and other malware cannot get to them. Perscale secures your files with 256-bit AES encryption and two-step verification. Even if your device is damaged, lost, or stolen, all of your apps and files are always ready to go, wherever you are. Access your applications where ever you go with Perscale.
  • 18
    NovaEMM

    NovaEMM

    Tabnova

    NovaEMM offers a powerful mobile device management solution that provides comprehensive control over devices used for work, including BYOD and COPE devices. Our EMM solution allows businesses to manage their devices from a centralized console, eliminating potential threats and vulnerabilities, and optimizing device performance. NovaEMM provides comprehensive, turnkey analytics rooted in data, network, and location utilization. These insights enable organizations to collect and leverage actionable data on the elements influencing their mobile device productivity. A single view offers a consolidated overview of your entire installation, showcasing each device, and making it the paramount solution. NovaEMM provides a streamlined solution for creating and managing a variety of kiosk/lockdown profiles on a single platform. With our platform, passwords and other essential configurations can be easily set.
  • 19
    Appaloosa

    Appaloosa

    Appaloosa

    For personal devices used at work, we split work and personal spaces to provide a secure and engaging experience. For corporate devices, we simplify configuration for network, apps and security. Whether you need to distribute a single app to a few beta-testers or deploy to thousands of employees, Appaloosa scales with you. We offer different enterprise mobility management packages of features to precisely suit your needs. Everything you need to ship your private apps in a matter of minutes. Quickly deploy and manage apps without the hassle of large MDM solutions. Configure, update & remove apps silently. Our most complete solution, best suited for large organizations. Deploy apps, enroll and manage devices. Trusted by the most demanding production environments. Start your free trial today. We were down for only 12 minutes last year.
  • 20
    AirDroid Business

    AirDroid Business

    Sand Studio

    AirDroid Business is a full-fledged Enterprise Mobile Device Management (EMM/MDM) Solution for managing and securing all Android endpoints with powerful remote monitoring and remote control features. Some popular device types are smartphones and tablets, digital signages, POS, restaurant kiosks, IoT, and other OEM Android endpoints. It is a solution that can ensure SMBs and Enterprises enhance their business mobility and device security, along with an excellent support team for the best customer service. AirDroid Business MDM Solution Highlights: *Multiple enrollment options: Zero-Touch Enrollment, AE Enrollment, Enroll with Device Owner, Regular Enrollment *Google Play apps management *Unattended remote access *Batch operations *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS) *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications
  • 21
    OneAPM MI

    OneAPM MI

    OneAPM

    Fully master application performance, real-time perception of user real physical experience. It is a mobile application performance monitoring tool for mobile devices. Mi shows the interactive performance of mobile applications, collapse rate, HTTP error rate, core performance indicators such as network error rate, user access trajectory, user action and other behavioral data, and active user and other operational data can enable users to have a more comprehensive and profound understanding of the overall performance experience status of the current application and promote product optimization and upgrade. The user experience is evaluated from the three core indicators of user action, network request, and collapse, and the user distribution is summarized in multiple dimensions such as application versions, operating systems, equipment, and regions. Completely record the access trajectory of each user.
  • 22
    Appmobi

    Appmobi

    Appmobi

    Appmobi has a serious solution, automated real-time threat detection and remediation. With over 2 million apps in the App Store, 5 billion mobile phones in use, and over 8 billion connected devices in the market today, keeping up with every cyber threat to such a massive number of apps and devices has become a nearly impossible task for IT teams. Appmobi puts the power back into the hands of IT to monitor and resolve app and IoT threats in real-time. Our easy-to-use solution tracks usage patterns, notifies IT when there is a threat, and even takes remedial actions to stop breaches before they occur. Appmobi draws from behavioral and environmental data to monitor usage patterns in real-time and uses artificial intelligence and a customizable rules engine to identify suspicious behavior that may lead to an application breach or data hack. When a rule or string of rules is triggered, Appmobi can recommend a course of action or automatically launch immediate protections.
  • 23
    ManageEngine Mobile Device Manager Plus
    ManageEngine Mobile Device Manager (MDM) Plus is designed to help enterprises empower their workforce with mobility. A leading enterprise mobile device management solution, ManageEngine MDM is suitable for managing multiple mobile platforms from a single interface, including iOS, Android, and Windows devices. The solution is available as an on-premise and cloud offering and includes features like mobile device management, application management, email management and device containerization.
  • 24
    ProMDM

    ProMDM

    ProMDM

    ProMDM is a mobile device management solution that provides end-to-end control of all mobile devices across the IT infrastructure, using standard MDM specifications for iOS, Android and Windows devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Dynamic Group management based on AD/LDAP groups, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automation for administrative tasks with Health check service Role base administration SSO with Client Certificate Authentication for Exchange, Sharepoint, Web sites iOS SSO with Kerberos for Safari and native apps (integration with ADFS or websites directly) MAM - Mobile App Management Samsung KNOX support Document management – Managed media support Photo sync for Android GPS location and tracking Android for Work support (ProMDM is certified Google Partner)
  • 25
    Applivery

    Applivery

    Applivery

    Applivery is the most powerful Unified Endpoint Management (UEM) platform that provides full control over App Distribution and Device Management for Android, Windows, and Apple. Its easy-to-use, cloud-based Mobile Device Management (MDM) solution enables efficient remote management with top-notch security. It seamlessly integrates into organizations of all sizes, requiring only a few minutes to set up.
  • 26
    Check Point Application Control
    Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups, to identify, block or limit the usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications, and more. Granular control of social networks, applications, and application features, identify, allow, block, or limit the usage. Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware. Integrated into Next Generation Firewalls enables consolidation of security controls decreasing costs. Only the right users and devices can access your protected assets.
  • 27
    Mosyle

    Mosyle

    Mosyle

    An Enhanced MDM, an Endpoint Security, an Internet Privacy & Security, an Identity Management, an Application Management... NO LONGER five separate solutions. Mosyle is the only solution that fully integrates five different applications on a single Apple-only platform, allowing businesses and schools to easily and automatically deploy, manage and protect all Apple devices
  • 28
    WizyEMM

    WizyEMM

    WizyEMM

    WizyEMM is a Cloud SaaS solution built on Android Enterprise management API’s & Google Cloud Platform. Using Android API’s enables us to leverage the full Android Enterprise Security Stack as well as the Google Play store functionalities for Public and Private Apps. We have initially developed this solution for a European Express Courier company with a fleet of 30.000 Android devices used by delivery drivers
  • 29
    PolicyPak

    PolicyPak

    Netwrix

    The PolicyPak Platform gives organizations with different management and security requirements the flexibility to choose an edition right for them. In today's hybrid work environment, users access their desktops at the office, at home, traveling, through a kiosk, and virtually. Managing and securing these environments creates a challenge because not all management systems were designed for modern management scenarios. PolicyPak provides solutions that modernize and extend the power of your existing infrastructure. Using PolicyPak with your Active Directory simplifies how you manage and secure Active Directory joined computers with Microsoft Group Policy. Microsoft Group Policy is a powerful technology you rely upon day after day. But it needs a boost to meet your modern enterprise's management, security, reporting, and automation needs.
  • 30
    Gamban

    Gamban

    Gamban

    Gamban not only provides award-winning gambling blocking, but we have now added a series of tools to help you quit online gambling. Avoiding online gambling might seem tough. Gamban provides a secure, effective, and affordable tool in your battle to ward off temptation. Gamban takes a multi-layered approach to blocking tens of thousands of gambling websites and apps worldwide. Starting your recovery journey is an important step, but it's also important to see how far you've come. Your Gamban app can now track how long you've remained gamble-free and how much time and money you've saved along the way. Take the first steps in fighting addiction, and claim your 7-day free trial of Gamban today. Get Gamban's award-winning global gambling blocking, as well as a whole host of new features. Protect all of your devices with one license. Gamban can be installed across all major device platforms, that way you can rely on Gamban to be there if willpower slips.
  • 31
    Applicaster

    Applicaster

    Applicaster

    The only no/low-code platform for creating, launching & managing streaming apps across multiple devices & technology stacks. App independence; developers optional. Use simple, built-in tools to craft and change custom experiences, connect your preferred integrations & launch directly to the app stores. Scale & expand your streaming business with budget predictability & full control over timelines & resources. Support the growing needs of your business in the most operationally efficient way. Continuously experiment, personalize & optimize your app experience to drive that perfect user experience & desired business outcomes. Non-developers build & compile apps, and manage releases. Hundreds of available integrations power client apps. Use our APIs to extend your capabilities. Features available OOTB, you configure your backend. For measurement, data source & UI across platforms. Continuously collect user data, rollout changes quickly.
  • 32
    SquareStack

    SquareStack

    SquareStack

    All your business apps and data in one no-nonsense dashboard. SquareStack brings everything into a single platform. Make sense of it all in one place, make smart decisions, and make your mark. Managing your business is hard enough. Managing your business app subscriptions can be even harder. SquareStack provides SMB owners with an all-in-one dashboard to organize and access all your apps which will help you make decisions confidently. Have one place where you can see all your app subscriptions. From your bank and credit cards, see instantly how much you are paying. SquareStack has thousands of free and paid apps that you may want to add, replace, or review in one place. One dashboard gives you the high-level snapshot you need to make informed decisions and grow your business. With your apps wrangled, you can get back to leading your team and sharing your craft with the world. Supercharge the ROI of the apps you’ve already got and find your next power tools.
  • 33
    SyncDog

    SyncDog

    SyncDog

    Unless your current mobile security solution is capable of addressing the newer, more advanced threats that are built to jailbreak/root the device, you are vulnerable. The scary part is that just about every solution on the market fails to prevent these newer, more advanced threats. True mobile security needs to incorporate a containerization-based solution that isolates and encrypts the data being accessed and stored on the device and doesn’t rely on the Keystore for storing its crypto. Challenge any vendor with this mobile security requirements list below before committing to any solution. Full encryption of data on the device and full encryption of data being sent or received from the device using AES 256-bit encryption at a minimum. Containerized and encrypted isolation of all work-related emails, files, and apps from personal use. Encrypted transfer of data between apps on the device. Zero use of KeyStore for crypto key storage.
  • 34
    @Hand

    @Hand

    IgniteTech

    Welcome to hand.com, IgniteTech's Services arm. We're here to give you a hand to maximize the value of your IgniteTech relationship, without you having to lift a finger. Identify and execute immediate savings on AWS, Azure & Google Cloud. Free to start for savings up to 10x your annual IgniteTech subscription. One company saved over $400 million using this offering. IgniteTech’s Platinum Support is the preferred support services option for our most active and demanding customers, as it contains the widest array of services and the highest prioritization for critical issue resolution. Our highly experienced Consulting Services teams provide unlimited programmatic services and hands-on consulting to IgniteTech Platinum customers. Using our proven methodology, IgniteTech consulting teams ensure projects are flawlessly implemented and are fully aligned with your business goals and objectives.
  • 35
    Heimdal Application Control
    Heimdal Application Control is a novel approach to integrative application management and user rights curation. Modular and easy to set up, App Control empowers the system administrator to create all-encompassing rule-based frameworks, streamline auto-dismissal or auto-approval flows, and enforce individual rights per Active Directory group. The tool’s uniqueness comes from its ability to perfectly pair with a (PAM) Privileged Access Management solution, imparting the user with granular oversight of software inventories and hardware assets.
  • 36
    OpenText ZENworks Full Disk Encryption
    OpenText ZENworks Full Disk Encryption enables you to centrally enforce policies for encrypting entire hard disks on Windows 7, Windows 8, and Windows 10 machines in your organization. You manage them using the same web-based console and adaptive agent that you use for other ZENworks products. Protect your company data with the proven reliability of encrypting the entire hard disk drive. Ensure that encrypted devices remain easy to manage across the enterprise. You can remotely unlock devices that are protected by full disk encryption and keep users productive while they work remotely. Ensure that you meet critical industry guidelines and government regulations for protecting customer and patient data. Leverage your experience with ZENworks to reduce the cost of implementing Full Disk Encryption.
  • 37
    Switch Secure Workspace

    Switch Secure Workspace

    Egress Software Technologies

    Secure Workspace makes it easy for users to upload, control, and share documents securely with teammates and external partners. Our encrypted environment offers enterprise-grade access permissions at the click of a button. Our mobile app and productivity toolkit enable teams to collaborate seamlessly from anywhere. Detailed reporting helps you to demonstrate compliance and stay clear of burned reputations and regulatory fines. Secure Workspace lets you easily and securely share your most confidential data both internally and with your supply chain. Zones act as secure containers, making it easy for you to clearly organize content within folders and keep sensitive content safe from unauthorized access. With access permissions and controls, accredited security frameworks, and flexible authentication, your team can stay in control while sharing sensitive documents internally and with external partners.
  • 38
    Retain Mobile Archiving
    Retain Mobile Archiving delivers secure, encrypted messaging and archiving for iOS and Android devices. Generate and consume data to meet regulatory and compliance requirements—regardless of who owns the device. Retain Mobile also features carrier-level archiving of text messages. This gives you oversight on mobile communication data for your iOS, Android, and other mobile devices on the mobile carrier network. This solution is ideal for environments with corporate-owned devices, BYOD, or a hybrid environment of both. With Retain Mobile, you don’t lose valuable information and your organization stays compliant. Your sensitive data stays securely within your organization. Allow administrators, human resources, compliance officers, eDiscovery, and legal teams to review and audit smartphone user data. Users can access and search their personal archives, and administrators and other named users can access and search archived messages for all users.
  • 39
    BlackBerry Access

    BlackBerry Access

    BlackBerry

    Enable access to your corporate network from personal or non-corporate managed devices, protecting enterprise data with full containerization to reduce the risk of data leakage. BlackBerry® Access provides a secure, intuitive user experience for intranet browsing. Employees get access to corporate intranets and apps on their personal or non-corporate managed devices. Simplify your bring your own computer program with desktop offerings from BlackBerry, giving you modern alternatives to traditional VPN and VDI solutions. BlackBerry® Desktop enables users to securely access corporate on-premises or cloud content and resources on their personally owned or non-corporate managed Windows 10 and macOS devices. It includes BlackBerry Access as well as BlackBerry® Work. BlackBerry Access is a secure browser that allows your organization to confidently enable mobile access to your corporate network. It supports iOS, Android, Windows, and macOS.
  • 40
    Bitwarden

    Bitwarden

    Bitwarden

    Bitwarden is an open source password management solution that empowers enterprises and individuals to securely store and share sensitive data with end-to-end encryption. Share Encrypted Information - Share your sensitive information safely and securely with individuals, teams, and enterprises. - Transmit encrypted information via a secure link to anyone through your preferred communication channel like text or email. Make Password Management Convenient - Generate and store your strong and unique passwords all in one place. - Access account credentials from anywhere, on any device with secure cloud syncing. - Bitwarden offers multiple client options to access your password vault including desktop, mobile, browser, web, and CLI. - Autofill makes it easy to quickly and securely log in to accounts. Strengthen Your Security - Identify potential security weaknesses like reused, exposed, or weak passwords, and other helpful data security metrics.
  • 41
    Cachatto

    Cachatto

    Maddox

    Access, manage, connect and secure your entire corporate database on-premise and or on the cloud to any device, anytime and anywhere with Cachatto. No data stored on the device while ensuring DLP. Prevents security breaches in event of theft. Ensure mobile security while you are on the go. With only one virtualized server, sever cost of special hardware and experience simple configuration. Work anywhere and anytime while preventing data leakage and ensuring computer security. No major changes to the existing corporate system. No changes to firewall settings necessary.
  • 42
    Check Point Harmony Endpoint

    Check Point Harmony Endpoint

    Check Point Software Technologies

    Check Point Harmony is the industry’s first unified security solution for users, devices and access. The solution protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications. Protecting today’s hyper-distributed workspace requires endless security functions across user devices, applications and networks. However, stitching together point solutions often leaves security gaps and creates a cumbersome infrastructure that is difficult to manage and scale. Harmony offers an alternative that saves you the overhead and increases security. Harmony unifies 6 cloud-based security products to keep you 100% safe. Wherever you connect from, whatever you connect to, and however you connect – Your home, your devices, your privacy and your organizational data are secured and protected from any cyber threat.
  • 43
    Turbo

    Turbo

    Turbo.net

    Turbo lets you publish and manage all of your enterprise applications from a single point to every platform and device. Book a demo with our team to see Turbo in action. Deploy custom containerized applications on desktops, on-premises servers, and public and private clouds. The student digital workspace brings applications to every campus and personal device. Deliver applications everywhere from a single, configurable container environment. Freely migrate between devices and platforms with rich APIs and connectors. Deploy to managed and BYOD PCs with no installs. Stream to HTML5, Mac, and mobile with Turbo Application Server. Publish to existing Citrix and VMware VDI environments. Dynamically image applications onto non-persistent WVD instances. Bring course applications directly inside Canvas, Blackboard, and other major LMS systems. Authoring environment for creating your own containerized applications and components.
  • 44
    Samsung Blockchain Wallet
    Keep your valuables safe and secure with Samsung Blockchain. With added protection from Knox, Samsung Blockchain Keystore and Wallet keeps your virtual assets secure. Also, Private Share ensure that your valuable data and information are managed and shared without risking your privacy. Samsung Blockchain Wallet brings secure virtual asset management to mobile. Support for major and non-major virtual assets are regularly updated and include favorites like Bitcoin, Ethereum, ERC20, Tron and more. The future of data security lies in blockchain tech. Samsung Blockchain keeps your private key in a single, secure location and provides encryption for your data files with this private key. With additional protection from Samsung Knox and Trusted Execution Environment (TEE), your virtual assets are protected and your files are shared securely with private share.
  • 45
    Zimperium Mobile Threat Defense (MTD)
    Zimperium Mobile Threat Defense (MTD) – formerly known as zIPS- is a privacy-first mobile security solution that provides comprehensive mobile security for organizations. Zimperium protects an employee’s corporate-owned or BYOD from advanced persistent threats without sacrificing privacy or personal data. Zimperium MTD can help organizations identify which mobile devices have risky or banned apps by pinpointing what servers these apps are connecting to and blocking these apps and browsers from sending data off the device to the domains to which the app connects. By leveraging zero-touch activation, Zimperium MTD can automatically enforce conditional access controls as part of a zero-trust strategy, which prevents the use of enterprise apps and access to sensitive corporate data while these banned apps are installed.
  • 46
    Estimote

    Estimote

    Estimote

    Workplace safety with wearables. The contact tracing dashboard notifies all exposed team members and protects your entire workforce. Team members use small, wireless devices which remind them to keep a safe distance and register direct contact exposure. In the event of a symptomatic employee, companies can quickly locate other exposed team members who are at risk. Wirelessly chargeable with programmable panic button, buzzer and vibration. All interactions are stored anonymously and the list of exposed employees is generated only when symptoms are reported. Employees can immediately report their health status to accelerate escalation and quarantine procedures. Anonymized data helps measure the effectiveness of social distancing behavior in the workplace. Co-worker interactions are secure and can be stored in a containerized safe environment of an existing data-center. Wearable self-contained devices are easy to distribute and work out of the box for all types of employees.
  • 47
    Q-Scout

    Q-Scout

    Quokka.io

    Q-Scout prioritizes BYOD and privacy concerns to help IT Teams secure business-related applications on corporate and personal devices while preserving the data privacy of employees. IT administrators can define enterprise data isolation policies and control the managed apps without impacting personal privacy. Allows for fast validation of thousands of devices with minimal use of a personal device’s resources. Creates and performs analysis on a virtual model of employee device without accessing personal data such as photos, contacts, or texts. This solution offers app-based policies that set a basic level of security for devices with Q-Scout installed, ensuring secure access to company data and files. By enabling employees to choose to install business apps on their devices and allowing users to self-remediate any policy violations, Q-Scout fosters a level playing field for the use of personal devices in work-related tasks.
  • 48
    Harmony Mobile

    Harmony Mobile

    Check Point

    In the new normal, while employees are increasingly accessing corporate data from their smartphones, your business is exposed to breaches more than ever. Harmony Mobile delivers complete protection for your mobile workforce that is simple to deploy, manage and scale. Protecting corporate data across the mobile attack surface: apps, networks and OS. Scalable and easy-to-manage security for any type of mobile workforce. Quick user adoption with zero impact on user experience or privacy. Prevents malware from infiltrating employees’ devices by detecting and blocking the download of malicious apps in real-time. By extending Check Point’s industry-leading network security technologies to mobile devices, Harmony Mobile offers a broad range of network security capabilities. Ensures devices are not exposed to compromise with real-time risk assessments detecting attacks, vulnerabilities, configuration changes, and advanced rooting and jailbreaking.
  • 49
    Axis Security

    Axis Security

    Axis Security

    Ensure least-privilege user access to specific business resources without granting excessive access to your corporate network, or exposing applications to the Internet. Avoid deploying agents on BYOD or third-party devices and the friction that comes with it. Support access to web apps, SSH, RDP and Git without a client. Analyze how users interact with your business applications to better detect anomalies, flag potential issues, and ensure networking remains aware of changes in security controls. Use key tech integrations to automatically verify and adapt access rights based on changes in context to protect data and always ensure least-privilege access. Make private apps invisible to the Internet, keep users off the network, and deliver a safer connection to SaaS apps.
  • 50
    Check Point Mobile Access

    Check Point Mobile Access

    Check Point Software

    Check Point Mobile Access is the safe and easy solution to securely connect to corporate applications over the Internet with your Smartphone, tablet or PC. Integrated into the Check Point Next Generation Firewalls (NGFW), Mobile Access provides enterprise-grade remote access via both Layer-3 VPN and SSL/TLS VPN, allowing you to simply and securely connect to your email, calendar, contacts and corporate applications. Easy access for mobile workers – simply connect from mobile devices to secure connectivity for smartphones, tablets, PCs and laptops. Communicate securely with proven encryption technology, two-factor authentication, and User-Device pairing to eliminate network security threats. Integrated in Next Generation Firewalls enables consolidation of security controls decreasing costs.