Audience

MSPs, IT Directors, IT Managers, Cybersecurity, CISO

About Tether Security

Tether gives IT teams full control over corporate devices worldwide. It provides device tracking, RemoteKill® data/device lockdown, full disk encryption management, and geofencing. Designed by cybersecurity experts, Tether is secure, standards-based, and proven through 20+ years of real-world use.

Pricing

Starting Price:
$29/device/year
Free Trial:
Free Trial available.

Integrations

API:
Yes, Tether Security offers API access

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Tether Security
Founded: 2006
United States
tethersecurity.com

Videos and Screen Captures

Get Started
Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms Supported
Cloud
Windows
Mac
iPhone
iPad
Android
Training
Documentation
Live Online
Webinars
Support
Phone Support
24/7 Live Support
Online

Tether Security Frequently Asked Questions

Q: What kinds of users and organization types does Tether Security work with?
Q: What languages does Tether Security support in their product?
Q: What kind of support options does Tether Security offer?
Q: What other applications or services does Tether Security integrate with?
Q: Does Tether Security have an API?
Q: Does Tether Security have a mobile app?
Q: What type of training does Tether Security provide?
Q: Does Tether Security offer a free trial?
Q: How much does Tether Security cost?

Tether Security Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Whitelisting / Blacklisting
Signature Matching
Web Threat Management

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support