Introducing G2.ai, the future of software buying.Try now

Best Mobile Data Security Software

Lauren Worth
LW
Researched and written by Lauren Worth

Mobile data security software aims to protect mobile devices and their data by identifying threats, securing networks and endpoints, and creating data backups. Companies use mobile data security tools to ensure secure connections, enforce authentication, and limit the use of third-party software such as mobile apps.

Monitoring and alert functions ensure all devices connected to the network remain in compliance with company access and security policies. Companies look to mobile data security solutions to protect company data while allowing employees to access their network from personal and company-owned mobile devices, especially in remote or off-site work environments. Some mobile data security solutions also protect data through encryption, firewalls, and other security tools.

Mobile data security tools have features that overlap with data security software, network security software, and web security software.

Mobile data security tools, however, cater specifically to the security of mobile devices. The focus on security makes these tools less comprehensive than mobile device management (MDM) software, though there is overlap in functionality.

Mobile data security also differs from IoT security solutions as it refers to security around devices capable of complex multitasks such as cellphones and tablets. On the other hand, IoT encompasses a more expansive range of products such as printers, cameras, medical devices, and household appliances.

Mobile data security also differs from application security as it protects devices and data, while application security protects applications and their code.

To qualify for inclusion in the Mobile Data Security category, a product must:

Provide mobile-specific security features
Protect data through encryption, firewalls, use of VPNs, intrusion prevention systems (IPS), etc.
Provides authentication requirements for mobile access and protects against jailbreaking and rooting attempts
Monitor for and defend against threats such as phishing attempts, man-in-the-middle (MITM) attacks, and malicious third-party applications on mobile devices
Alert administrators when mobile data is compromised

Best Mobile Data Security Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
45 Listings in Mobile Data Security Available
(1,901)4.8 out of 5
Optimized for quick response
1st Easiest To Use in Mobile Data Security software
Save to My Lists
Entry Level Price:$5.75
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Jamf Pro is a purpose-built device management solution for Apple devices that allows organizations to automate every aspect of device and application management. It empowers IT professionals to deploy

    Users
    • Systems Administrator
    • IT Manager
    Industries
    • Education Management
    • Higher Education
    Market Segment
    • 51% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Jamf Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Device Management
    281
    Ease of Use
    278
    Apple Device Management
    188
    Features
    188
    Jamf Services
    135
    Cons
    Difficult Learning
    63
    Complexity
    61
    Learning Curve
    56
    Improvement Needed
    52
    Missing Features
    52
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Jamf Pro features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    7.7
    Backup
    Average: 8.3
    8.6
    Data Transport
    Average: 8.4
    9.2
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Jamf
    Company Website
    Year Founded
    2002
    HQ Location
    Minneapolis, MN
    Twitter
    @JAMFSoftware
    10,709 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,640 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Jamf Pro is a purpose-built device management solution for Apple devices that allows organizations to automate every aspect of device and application management. It empowers IT professionals to deploy

Users
  • Systems Administrator
  • IT Manager
Industries
  • Education Management
  • Higher Education
Market Segment
  • 51% Enterprise
  • 41% Mid-Market
Jamf Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Device Management
281
Ease of Use
278
Apple Device Management
188
Features
188
Jamf Services
135
Cons
Difficult Learning
63
Complexity
61
Learning Curve
56
Improvement Needed
52
Missing Features
52
Jamf Pro features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
7.7
Backup
Average: 8.3
8.6
Data Transport
Average: 8.4
9.2
Data Encryption
Average: 8.5
Seller Details
Seller
Jamf
Company Website
Year Founded
2002
HQ Location
Minneapolis, MN
Twitter
@JAMFSoftware
10,709 Twitter followers
LinkedIn® Page
www.linkedin.com
2,640 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, co

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks GlobalProtect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Reliability
    4
    Security
    4
    Remote Access
    3
    Easy Implementation
    2
    Cons
    Expensive
    2
    Lack of Customization
    2
    Laggy Performance
    2
    Complexity
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks GlobalProtect features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Backup
    Average: 8.3
    9.8
    Data Transport
    Average: 8.4
    9.8
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, co

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Enterprise
  • 38% Mid-Market
Palo Alto Networks GlobalProtect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Reliability
4
Security
4
Remote Access
3
Easy Implementation
2
Cons
Expensive
2
Lack of Customization
2
Laggy Performance
2
Complexity
1
Difficult Learning
1
Palo Alto Networks GlobalProtect features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.9
9.2
Backup
Average: 8.3
9.8
Data Transport
Average: 8.4
9.8
Data Encryption
Average: 8.5
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(46)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Mobile Data Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appdome’s mission is to protect every mobile business and user in the world from scams, fraud, bots, and hackers. Appdome’s patented AI-Native XTM Platform is designed to automate every aspect of mobi

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 37% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Appdome is a mobile security platform that allows the addition of security protections to mobile apps without requiring native code changes.
    • Users frequently mention the ease of use, the no-code integration process that saves significant development time, the proactive support team, and the comprehensive list of mobile app protections that can be applied simply by toggling a switch.
    • Reviewers mentioned the licensing model needs improvement with more features included into packages compared to having many add-ons, the cloud solution adds more time to the build process, and the cost is considered high for the market.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appdome Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    21
    Ease of Use
    18
    Implementation Ease
    15
    Security
    14
    Easy Setup
    13
    Cons
    Expensive
    8
    Complexity
    6
    Feature Issues
    5
    Implementation Complexity
    5
    Learning Curve
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appdome features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Backup
    Average: 8.3
    9.5
    Data Transport
    Average: 8.4
    9.6
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appdome
    Company Website
    Year Founded
    2012
    HQ Location
    Redwood City, California, United States
    Twitter
    @appdome
    2,120 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    169 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Appdome’s mission is to protect every mobile business and user in the world from scams, fraud, bots, and hackers. Appdome’s patented AI-Native XTM Platform is designed to automate every aspect of mobi

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 52% Enterprise
  • 37% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Appdome is a mobile security platform that allows the addition of security protections to mobile apps without requiring native code changes.
  • Users frequently mention the ease of use, the no-code integration process that saves significant development time, the proactive support team, and the comprehensive list of mobile app protections that can be applied simply by toggling a switch.
  • Reviewers mentioned the licensing model needs improvement with more features included into packages compared to having many add-ons, the cloud solution adds more time to the build process, and the cost is considered high for the market.
Appdome Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
21
Ease of Use
18
Implementation Ease
15
Security
14
Easy Setup
13
Cons
Expensive
8
Complexity
6
Feature Issues
5
Implementation Complexity
5
Learning Curve
4
Appdome features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
7.5
Backup
Average: 8.3
9.5
Data Transport
Average: 8.4
9.6
Data Encryption
Average: 8.5
Seller Details
Seller
Appdome
Company Website
Year Founded
2012
HQ Location
Redwood City, California, United States
Twitter
@appdome
2,120 Twitter followers
LinkedIn® Page
www.linkedin.com
169 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Harmony Mobile offers enterprise mobile security that protects against threats to the OS, apps and network. Leveraging Check Point’s best-of-breed threat prevention technology, SandBlast Mobile offers

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Harmony Mobile Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Security Measures
    3
    Device Security
    1
    Jamf Services
    1
    Remote Access
    1
    Cons
    Expensive
    2
    Limited Compatibility
    1
    Poor Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Harmony Mobile features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.6
    Backup
    Average: 8.3
    8.8
    Data Transport
    Average: 8.4
    8.8
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Harmony Mobile offers enterprise mobile security that protects against threats to the OS, apps and network. Leveraging Check Point’s best-of-breed threat prevention technology, SandBlast Mobile offers

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 26% Enterprise
Harmony Mobile Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Security Measures
3
Device Security
1
Jamf Services
1
Remote Access
1
Cons
Expensive
2
Limited Compatibility
1
Poor Integration
1
Harmony Mobile features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
8.6
Backup
Average: 8.3
8.8
Data Transport
Average: 8.4
8.8
Data Encryption
Average: 8.5
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Mobile Access is a safe and easy solution to connect to corporate applications over the Internet, with a smartphone, tablet, or PC.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Mobile Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Measures
    4
    Device Security
    3
    Remote Access
    3
    Device Management
    1
    Ease of Use
    1
    Cons
    Difficult Setup
    2
    Complexity
    1
    Difficult Learning
    1
    Outdated Interface
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Mobile Access features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Backup
    Average: 8.3
    8.9
    Data Transport
    Average: 8.4
    8.6
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Mobile Access is a safe and easy solution to connect to corporate applications over the Internet, with a smartphone, tablet, or PC.

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 47% Mid-Market
Check Point Mobile Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Measures
4
Device Security
3
Remote Access
3
Device Management
1
Ease of Use
1
Cons
Difficult Setup
2
Complexity
1
Difficult Learning
1
Outdated Interface
1
Slow Performance
1
Check Point Mobile Access features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
9.1
Backup
Average: 8.3
8.9
Data Transport
Average: 8.4
8.6
Data Encryption
Average: 8.5
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(47)4.6 out of 5
5th Easiest To Use in Mobile Data Security software
Save to My Lists
Entry Level Price:$6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Jamf Protect is a purpose-built endpoint security and mobile threat defense (MTD) solution for Mac, iPhone, iPad and Android that allows organizations to defend against modern threats like malware, ph

    Users
    No information available
    Industries
    • Information Technology and Services
    • Education Management
    Market Segment
    • 51% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Jamf Protect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Easy Setup
    4
    Reliability
    4
    Security
    4
    Security Measures
    4
    Cons
    UX Improvement
    4
    Complexity
    3
    Poor Interface Design
    3
    Device Management Issues
    2
    Difficult Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Jamf Protect features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Backup
    Average: 8.3
    7.2
    Data Transport
    Average: 8.4
    6.7
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Jamf
    Year Founded
    2002
    HQ Location
    Minneapolis, MN
    Twitter
    @JAMFSoftware
    10,709 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,640 employees on LinkedIn®
    Ownership
    NASDAQ: JAMF
Product Description
How are these determined?Information
This description is provided by the seller.

Jamf Protect is a purpose-built endpoint security and mobile threat defense (MTD) solution for Mac, iPhone, iPad and Android that allows organizations to defend against modern threats like malware, ph

Users
No information available
Industries
  • Information Technology and Services
  • Education Management
Market Segment
  • 51% Mid-Market
  • 43% Enterprise
Jamf Protect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Easy Setup
4
Reliability
4
Security
4
Security Measures
4
Cons
UX Improvement
4
Complexity
3
Poor Interface Design
3
Device Management Issues
2
Difficult Setup
2
Jamf Protect features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
6.7
Backup
Average: 8.3
7.2
Data Transport
Average: 8.4
6.7
Data Encryption
Average: 8.5
Seller Details
Seller
Jamf
Year Founded
2002
HQ Location
Minneapolis, MN
Twitter
@JAMFSoftware
10,709 Twitter followers
LinkedIn® Page
www.linkedin.com
2,640 employees on LinkedIn®
Ownership
NASDAQ: JAMF
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single bu

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Micro Mobile Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    3
    Features
    2
    Security Measures
    2
    Tracking
    2
    Cons
    Slow Performance
    3
    Laggy Performance
    1
    Operational Difficulties
    1
    Software Bugs
    1
    Software Errors
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Mobile Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Backup
    Average: 8.3
    8.8
    Data Transport
    Average: 8.4
    8.6
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single bu

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Small-Business
  • 32% Mid-Market
Trend Micro Mobile Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
3
Features
2
Security Measures
2
Tracking
2
Cons
Slow Performance
3
Laggy Performance
1
Operational Difficulties
1
Software Bugs
1
Software Errors
1
Trend Micro Mobile Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.8
Backup
Average: 8.3
8.8
Data Transport
Average: 8.4
8.6
Data Encryption
Average: 8.5
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Enterprise
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Mobile Threat Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Measures
    1
    Setup Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Mobile Threat Defense features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.9
    8.5
    Backup
    Average: 8.3
    8.9
    Data Transport
    Average: 8.4
    8.3
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Enterprise
  • 36% Small-Business
Symantec Mobile Threat Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Measures
1
Setup Ease
1
Cons
This product has not yet received any negative sentiments.
Symantec Mobile Threat Defense features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.9
8.5
Backup
Average: 8.3
8.9
Data Transport
Average: 8.4
8.3
Data Encryption
Average: 8.5
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(46)4.6 out of 5
3rd Easiest To Use in Mobile Data Security software
Save to My Lists
Entry Level Price:$1.30
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. I

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Tracking
    5
    Ease of Use
    4
    Asset Management
    3
    Customer Support
    3
    Security
    3
    Cons
    Feature Deficiency
    3
    Missing Features
    3
    Deployment Issues
    1
    Device Management
    1
    Device Management Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prey features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    6.4
    Backup
    Average: 8.3
    6.9
    Data Transport
    Average: 8.4
    7.2
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Santiago, Santiago
    Twitter
    @preyproject
    9,595 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. I

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 33% Mid-Market
Prey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Tracking
5
Ease of Use
4
Asset Management
3
Customer Support
3
Security
3
Cons
Feature Deficiency
3
Missing Features
3
Deployment Issues
1
Device Management
1
Device Management Issues
1
Prey features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
6.4
Backup
Average: 8.3
6.9
Data Transport
Average: 8.4
7.2
Data Encryption
Average: 8.5
Seller Details
Year Founded
2010
HQ Location
Santiago, Santiago
Twitter
@preyproject
9,595 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CryptoSmart is a restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy)

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CryptoSmart Mobile Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Easy Integrations
    1
    Management Efficiency
    1
    Product Quality
    1
    Cons
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CryptoSmart Mobile features and usability ratings that predict user satisfaction
    0.0
    No information available
    5.0
    Backup
    Average: 8.3
    6.7
    Data Transport
    Average: 8.4
    6.7
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ERCOM
    Year Founded
    1986
    HQ Location
    Vélizy-Villacoublay, FR
    LinkedIn® Page
    www.linkedin.com
    155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CryptoSmart is a restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy)

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Mid-Market
CryptoSmart Mobile Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Easy Integrations
1
Management Efficiency
1
Product Quality
1
Cons
Complexity
1
CryptoSmart Mobile features and usability ratings that predict user satisfaction
0.0
No information available
5.0
Backup
Average: 8.3
6.7
Data Transport
Average: 8.4
6.7
Data Encryption
Average: 8.5
Seller Details
Seller
ERCOM
Year Founded
1986
HQ Location
Vélizy-Villacoublay, FR
LinkedIn® Page
www.linkedin.com
155 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Redamp.io offers a revolutionary approach to digital safety, seamlessly protecting both mobile and desktop devices without compromising user privacy. By using Redamp.io's robust apps, users can shield

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Redamp.io Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    3
    Device Security
    2
    Security Measures
    2
    Customer Support
    1
    Cons
    Expensive
    1
    Technical Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Redamp.io features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Backup
    Average: 8.3
    8.8
    Data Transport
    Average: 8.4
    8.3
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Brno, CZ
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Redamp.io offers a revolutionary approach to digital safety, seamlessly protecting both mobile and desktop devices without compromising user privacy. By using Redamp.io's robust apps, users can shield

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Redamp.io Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
3
Device Security
2
Security Measures
2
Customer Support
1
Cons
Expensive
1
Technical Difficulties
1
Redamp.io features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.8
Backup
Average: 8.3
8.8
Data Transport
Average: 8.4
8.3
Data Encryption
Average: 8.5
Seller Details
Year Founded
2012
HQ Location
Brno, CZ
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SyncDog offers a FIPS 140-2 Certified, AES 256 bit encrypted, CMMC compliant, end-to-end mobile security solution. SyncDog protects and manages the device, detects and prevents malware/phishing and ot

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Small-Business
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SyncDog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Ease
    1
    Remote Access
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SyncDog features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.4
    9.2
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SyncDog
    Year Founded
    2013
    HQ Location
    Reston, VA
    Twitter
    @SyncDog
    339 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SyncDog offers a FIPS 140-2 Certified, AES 256 bit encrypted, CMMC compliant, end-to-end mobile security solution. SyncDog protects and manages the device, detects and prevents malware/phishing and ot

Users
No information available
Industries
No information available
Market Segment
  • 71% Small-Business
  • 14% Enterprise
SyncDog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Ease
1
Remote Access
1
Cons
This product has not yet received any negative sentiments.
SyncDog features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
10.0
Backup
Average: 8.3
10.0
Data Transport
Average: 8.4
9.2
Data Encryption
Average: 8.5
Seller Details
Seller
SyncDog
Year Founded
2013
HQ Location
Reston, VA
Twitter
@SyncDog
339 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Certo AntiSpy is the only bug and spyware detection tool available for iOS devices. Our clients use Certo AntiSpy to ensure their employee's devices are secure.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Certo AntiSpy Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Device Security
    1
    Security Measures
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Certo AntiSpy features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Backup
    Average: 8.3
    5.8
    Data Transport
    Average: 8.4
    6.7
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    N/A
    Twitter
    @certosoftware
    1,842 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Certo AntiSpy is the only bug and spyware detection tool available for iOS devices. Our clients use Certo AntiSpy to ensure their employee's devices are secure.

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 17% Mid-Market
Certo AntiSpy Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Device Security
1
Security Measures
1
Cons
Expensive
1
Certo AntiSpy features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
6.7
Backup
Average: 8.3
5.8
Data Transport
Average: 8.4
6.7
Data Encryption
Average: 8.5
Seller Details
Year Founded
2016
HQ Location
N/A
Twitter
@certosoftware
1,842 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reduce Mobile Data Spend

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberReef MobileWall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Measures
    3
    Reliability
    2
    Solutions
    2
    Features
    1
    Product Quality
    1
    Cons
    Complexity
    2
    Connectivity Issues
    1
    Difficult Learning
    1
    Feature Deficiency
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberReef MobileWall features and usability ratings that predict user satisfaction
    7.2
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Backup
    Average: 8.3
    6.7
    Data Transport
    Average: 8.4
    7.8
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Shreveport, US
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reduce Mobile Data Spend

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Mid-Market
CyberReef MobileWall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Measures
3
Reliability
2
Solutions
2
Features
1
Product Quality
1
Cons
Complexity
2
Connectivity Issues
1
Difficult Learning
1
Feature Deficiency
1
Learning Curve
1
CyberReef MobileWall features and usability ratings that predict user satisfaction
7.2
Has the product been a good partner in doing business?
Average: 8.9
6.7
Backup
Average: 8.3
6.7
Data Transport
Average: 8.4
7.8
Data Encryption
Average: 8.5
Seller Details
Year Founded
2012
HQ Location
Shreveport, US
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HYPERG appGuard: Advanced Mobile Application Security Solution HYPERG appGuard is a comprehensive mobile application security solution designed to protect applications against potential cyber threats

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • appGuard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security
    1
    Support Availability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • appGuard features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HYPERG appGuard: Advanced Mobile Application Security Solution HYPERG appGuard is a comprehensive mobile application security solution designed to protect applications against potential cyber threats

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
appGuard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security
1
Support Availability
1
Cons
This product has not yet received any negative sentiments.
appGuard features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for Mobile Threat Defense (MTD) allows you to protect both corporate and employee-owned Android and iOS devices from advanced threats. It enables enterprises to monitor, manage and secu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ivanti Neurons for MTD Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Customer Support
    1
    Device Security
    1
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Poor Connectivity
    1
    Poor Customer Support
    1
    Technical Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for MTD features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    5.0
    Backup
    Average: 8.3
    7.2
    Data Transport
    Average: 8.4
    7.8
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,921 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for Mobile Threat Defense (MTD) allows you to protect both corporate and employee-owned Android and iOS devices from advanced threats. It enables enterprises to monitor, manage and secu

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
Ivanti Neurons for MTD Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Customer Support
1
Device Security
1
Ease of Use
1
Implementation Ease
1
Cons
Expensive
1
Poor Connectivity
1
Poor Customer Support
1
Technical Difficulties
1
Ivanti Neurons for MTD features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
5.0
Backup
Average: 8.3
7.2
Data Transport
Average: 8.4
7.8
Data Encryption
Average: 8.5
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,766 Twitter followers
LinkedIn® Page
www.linkedin.com
2,921 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetworkSecure is a network-based cybersecurity solution, offering zero-touch, clientless operation, requiring no application installation by the end customer. With NetworkSecure, a communications serv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetworkSecure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Measures
    3
    Customer Support
    1
    Device Security
    1
    Jamf Services
    1
    Product Quality
    1
    Cons
    Complexity
    1
    Poor Connectivity
    1
    Poor Documentation
    1
    Technical Difficulties
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetworkSecure features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.4
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.4
    9.4
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Allot
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetworkSecure is a network-based cybersecurity solution, offering zero-touch, clientless operation, requiring no application installation by the end customer. With NetworkSecure, a communications serv

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
NetworkSecure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Measures
3
Customer Support
1
Device Security
1
Jamf Services
1
Product Quality
1
Cons
Complexity
1
Poor Connectivity
1
Poor Documentation
1
Technical Difficulties
1
Update Issues
1
NetworkSecure features and usability ratings that predict user satisfaction
0.0
No information available
9.4
Backup
Average: 8.3
10.0
Data Transport
Average: 8.4
9.4
Data Encryption
Average: 8.5
Seller Details
Seller
Allot
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Senturo offers a unified platform for mobile IT asset protection, geo-tracking, and compliance monitoring. Key features include: • Mobile IT Fleet Management: Organize and manage devices across variou

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Senturo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Apple Device Management
    1
    App Management
    1
    Cross-platform
    1
    Cybersecurity
    1
    Device Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Senturo features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Senturo
    Year Founded
    2010
    HQ Location
    London
    Twitter
    @hiddenapp
    1,191 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Senturo offers a unified platform for mobile IT asset protection, geo-tracking, and compliance monitoring. Key features include: • Mobile IT Fleet Management: Organize and manage devices across variou

Users
No information available
Industries
No information available
Market Segment
  • 46% Small-Business
  • 38% Mid-Market
Senturo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Apple Device Management
1
App Management
1
Cross-platform
1
Cybersecurity
1
Device Security
1
Cons
This product has not yet received any negative sentiments.
Senturo features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Senturo
Year Founded
2010
HQ Location
London
Twitter
@hiddenapp
1,191 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlueFletch Enterprise is designed to provide advanced enterprise-grade security management for shared Android devices, featuring robust Single Sign-On (SSO) capabilities and comprehensive Device Lockd

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlueFletch features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Atlanta, Georgia
    Twitter
    @bluefletch
    1,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BlueFletch Enterprise is designed to provide advanced enterprise-grade security management for shared Android devices, featuring robust Single Sign-On (SSO) capabilities and comprehensive Device Lockd

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
BlueFletch features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2008
HQ Location
Atlanta, Georgia
Twitter
@bluefletch
1,480 Twitter followers
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Digital Guardian Secure Collaboration Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Encryption
    1
    Product Quality
    1
    Protection
    1
    Cons
    Complexity
    1
    Complex Processes
    1
    Difficult Learning Curve
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Digital Guardian Secure Collaboration features and usability ratings that predict user satisfaction
    7.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    8.3
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 27% Enterprise
Digital Guardian Secure Collaboration Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Encryption
1
Product Quality
1
Protection
1
Cons
Complexity
1
Complex Processes
1
Difficult Learning Curve
1
Difficult Setup
1
Digital Guardian Secure Collaboration features and usability ratings that predict user satisfaction
7.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
8.3
Data Encryption
Average: 8.5
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. It enables you to remotely locate, lock, and wipe devices you manage to prevent data compromise. From For

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DriveStrike features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Backup
    Average: 8.3
    6.7
    Data Transport
    Average: 8.4
    6.7
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Salt Lake City, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. It enables you to remotely locate, lock, and wipe devices you manage to prevent data compromise. From For

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
DriveStrike features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Backup
Average: 8.3
6.7
Data Transport
Average: 8.4
6.7
Data Encryption
Average: 8.5
Seller Details
Year Founded
2012
HQ Location
Salt Lake City, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaymera Secure Calls and Chats features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    N/A
    Twitter
    @KaymeraTech
    183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Kaymera Secure Calls and Chats features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
N/A
Twitter
@KaymeraTech
183 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust secu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pradeo Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Efficiency
    1
    Reliability
    1
    Security
    1
    Security Measures
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pradeo Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.4
    10.0
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pradeo
    Year Founded
    2010
    HQ Location
    Paris, FR
    Twitter
    @pradeo
    3,210 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust secu

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Pradeo Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Efficiency
1
Reliability
1
Security
1
Security Measures
1
Cons
Slow Performance
1
Pradeo Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
9.2
Backup
Average: 8.3
10.0
Data Transport
Average: 8.4
10.0
Data Encryption
Average: 8.5
Seller Details
Seller
Pradeo
Year Founded
2010
HQ Location
Paris, FR
Twitter
@pradeo
3,210 Twitter followers
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppSuit is a mobile app security solution which is develped by attacker's view. Protect various type of mobile apps in safe such as finace, game, public, IoT, fintech, O2O etc., from hacking threat.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AppSuit features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    STEALIEN
    Year Founded
    2015
    HQ Location
    서울특별시, KR
    Twitter
    @stealien
    493 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppSuit is a mobile app security solution which is develped by attacker's view. Protect various type of mobile apps in safe such as finace, game, public, IoT, fintech, O2O etc., from hacking threat.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
AppSuit features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
STEALIEN
Year Founded
2015
HQ Location
서울특별시, KR
Twitter
@stealien
493 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corrata is a cloud-based SaaS mobile data management software that uses advanced analytics to ensure you're always getting the best value from your mobile service provider and offers the enterprise

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corrata features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corrata
    Year Founded
    2016
    HQ Location
    Co. Dublin, IE
    Twitter
    @Corrata_co
    631 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corrata is a cloud-based SaaS mobile data management software that uses advanced analytics to ensure you're always getting the best value from your mobile service provider and offers the enterprise

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Corrata features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Corrata
Year Founded
2016
HQ Location
Co. Dublin, IE
Twitter
@Corrata_co
631 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    C-Prot Embedded AppDefense is an SDK solution that enables easy integration into mobile applications and solutions developed by app developers, security providers or mobile service providers to ensure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Embedded AppDefense features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @cprottr
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

C-Prot Embedded AppDefense is an SDK solution that enables easy integration into mobile applications and solutions developed by app developers, security providers or mobile service providers to ensure

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
C-Prot Embedded AppDefense features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@cprottr
182 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Endpoint Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.4
    10.0
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @cprottr
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
C-Prot Endpoint Security features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Backup
Average: 8.3
10.0
Data Transport
Average: 8.4
10.0
Data Encryption
Average: 8.5
Seller Details
Twitter
@cprottr
182 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cubed Mobile transforms one mobile into two, encapsulating an entire business smartphone in a super-app. Delivering a complete workspace combined with a unified communication hub, the self-contained,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cubed Mobile Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Device Security
    1
    Product Quality
    1
    Security
    1
    Security Measures
    1
    Cons
    Compatibility Issues
    1
    Limited Compatibility
    1
    Platform Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cubed Mobile features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Backup
    Average: 8.3
    8.3
    Data Transport
    Average: 8.4
    8.3
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cubed Mobile transforms one mobile into two, encapsulating an entire business smartphone in a super-app. Delivering a complete workspace combined with a unified communication hub, the self-contained,

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Cubed Mobile Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Device Security
1
Product Quality
1
Security
1
Security Measures
1
Cons
Compatibility Issues
1
Limited Compatibility
1
Platform Compatibility
1
Cubed Mobile features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
8.3
Backup
Average: 8.3
8.3
Data Transport
Average: 8.4
8.3
Data Encryption
Average: 8.5
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gokiosk is a mobile device kiosk lockdown application to protect it from being misused.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gokiosk features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Backup
    Average: 8.3
    0.0
    No information available
    10.0
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intricare
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gokiosk is a mobile device kiosk lockdown application to protect it from being misused.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Gokiosk features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
10.0
Backup
Average: 8.3
0.0
No information available
10.0
Data Encryption
Average: 8.5
Seller Details
Seller
Intricare
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kaymera Encrypted Phone Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Device Security
    1
    Ease of Use
    1
    Security
    1
    Cons
    Limited Integration
    1
    Third-Party Dependence
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaymera Encrypted Phone features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Backup
    Average: 8.3
    8.3
    Data Transport
    Average: 8.4
    10.0
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    N/A
    Twitter
    @KaymeraTech
    183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Kaymera Encrypted Phone Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Device Security
1
Ease of Use
1
Security
1
Cons
Limited Integration
1
Third-Party Dependence
1
Kaymera Encrypted Phone features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Backup
Average: 8.3
8.3
Data Transport
Average: 8.4
10.0
Data Encryption
Average: 8.5
Seller Details
Year Founded
2013
HQ Location
N/A
Twitter
@KaymeraTech
183 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Encrypt phone calls, messaging, and conference calls on Android, iPhone and BlackBerry with easy to use applications.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Koolspan TrustCall features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Data Transport
    Average: 8.4
    10.0
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Koolspan
    HQ Location
    Germantown, US
    Twitter
    @Koolspan
    617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Encrypt phone calls, messaging, and conference calls on Android, iPhone and BlackBerry with easy to use applications.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Koolspan TrustCall features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Data Transport
Average: 8.4
10.0
Data Encryption
Average: 8.5
Seller Details
Seller
Koolspan
HQ Location
Germantown, US
Twitter
@Koolspan
617 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The EMVCo-evaluated Licel vTEE provides a secure execution environment where trusted applications can perform sensitive transactions and operations. It also protects against sophisticated attacks that

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Licel vTEE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Device Security
    1
    Security
    1
    Security Measures
    1
    Cons
    Slow Performance
    1
    Technical Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Licel vTEE features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Backup
    Average: 8.3
    6.7
    Data Transport
    Average: 8.4
    6.7
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Licel
    Year Founded
    2011
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The EMVCo-evaluated Licel vTEE provides a secure execution environment where trusted applications can perform sensitive transactions and operations. It also protects against sophisticated attacks that

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Licel vTEE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Device Security
1
Security
1
Security Measures
1
Cons
Slow Performance
1
Technical Difficulties
1
Licel vTEE features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
6.7
Backup
Average: 8.3
6.7
Data Transport
Average: 8.4
6.7
Data Encryption
Average: 8.5
Seller Details
Seller
Licel
Year Founded
2011
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneSpan's Mobile Security Suite natively integrates application security, including Runtime Application Self Protection (RASP), biometric authentication and transaction-signing into your mobile applic

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneSpan Mobile Security Suite features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OneSpan
    Year Founded
    1991
    HQ Location
    Boston, MA
    Twitter
    @OneSpan
    3,398 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    607 employees on LinkedIn®
    Ownership
    OSPN
Product Description
How are these determined?Information
This description is provided by the seller.

OneSpan's Mobile Security Suite natively integrates application security, including Runtime Application Self Protection (RASP), biometric authentication and transaction-signing into your mobile applic

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
OneSpan Mobile Security Suite features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OneSpan
Year Founded
1991
HQ Location
Boston, MA
Twitter
@OneSpan
3,398 Twitter followers
LinkedIn® Page
www.linkedin.com
607 employees on LinkedIn®
Ownership
OSPN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identify and block apps known to be malicious and those with risky behaviors that may lead to spear-phishing attacks and expose sensitive data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Mobile Security Solutions features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Identify and block apps known to be malicious and those with risky behaviors that may lead to spear-phishing attacks and expose sensitive data

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Proofpoint Mobile Security Solutions features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protectt.ai offers an innovative Mobile App Security Platform to safeguard mobile apps from ever-evolving mobile cyber threats & frauds. Protect your sensitive mobile apps with our advanced Mobil

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Protectt.ai Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security Measures
    1
    Speed
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Protectt.ai features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Backup
    Average: 8.3
    8.3
    Data Transport
    Average: 8.4
    6.7
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Mumbai, IN
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protectt.ai offers an innovative Mobile App Security Platform to safeguard mobile apps from ever-evolving mobile cyber threats & frauds. Protect your sensitive mobile apps with our advanced Mobil

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Protectt.ai Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security Measures
1
Speed
1
Cons
This product has not yet received any negative sentiments.
Protectt.ai features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.3
Backup
Average: 8.3
8.3
Data Transport
Average: 8.4
6.7
Data Encryption
Average: 8.5
Seller Details
Year Founded
2020
HQ Location
Mumbai, IN
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Seclore is committed to providing industry leading technology that helps organizations protect their most valuable assets and achieve compliance. Headquartered in California, Seclore has 2,000+ custom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Seclore Data-Centric Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Protection
    5
    Data Security
    4
    Customer Support
    3
    Data Protection
    3
    Cons
    Expensive
    3
    Not User-Friendly
    3
    User Accessibility
    2
    UX Improvement
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.4
    10.0
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Seclore
    Company Website
    Year Founded
    2011
    HQ Location
    Santa Clara, US
    Twitter
    @secloretech
    1,287 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    469 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Seclore is committed to providing industry leading technology that helps organizations protect their most valuable assets and achieve compliance. Headquartered in California, Seclore has 2,000+ custom

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 47% Mid-Market
Seclore Data-Centric Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Protection
5
Data Security
4
Customer Support
3
Data Protection
3
Cons
Expensive
3
Not User-Friendly
3
User Accessibility
2
UX Improvement
2
Access Issues
1
Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
10.0
Backup
Average: 8.3
10.0
Data Transport
Average: 8.4
10.0
Data Encryption
Average: 8.5
Seller Details
Seller
Seclore
Company Website
Year Founded
2011
HQ Location
Santa Clara, US
Twitter
@secloretech
1,287 Twitter followers
LinkedIn® Page
www.linkedin.com
469 employees on LinkedIn®
(1)4.5 out of 5
View top Consulting Services for SentinelOne Singularity Mobile
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Mobile is an AI-powered MTD solution delivering autonomous threat protection, detection, and response for iOS, Android, and ChromeOS devices. It is the industry’s leading on-device behavio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Mobile features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    8.3
    Data Transport
    Average: 8.4
    8.3
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Mobile is an AI-powered MTD solution delivering autonomous threat protection, detection, and response for iOS, Android, and ChromeOS devices. It is the industry’s leading on-device behavio

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
SentinelOne Singularity Mobile features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
8.3
Data Transport
Average: 8.4
8.3
Data Encryption
Average: 8.5
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vysk has all the tools you need to secure your organization's voice communication. We have solutions to fit businesses of all sizes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Vysk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vysk features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.4
    10.0
    Data Encryption
    Average: 8.5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vysk
    Year Founded
    2014
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vysk has all the tools you need to secure your organization's voice communication. We have solutions to fit businesses of all sizes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Vysk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Expensive
1
Vysk features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Backup
Average: 8.3
10.0
Data Transport
Average: 8.4
10.0
Data Encryption
Average: 8.5
Seller Details
Seller
Vysk
Year Founded
2014
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
(1)4.0 out of 5
View top Consulting Services for Zimperium Mobile Threat Defense
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zimperium Mobile Threat Defense (MTD)📱-- is a real-time, on-device mobile security solution that protects iOS and Android devices from advanced threats—without compromising privacy. Zimperium detects

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zimperium Mobile Threat Defense features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zimperium
    Company Website
    Year Founded
    2010
    HQ Location
    Dallas, TX
    Twitter
    @ZIMPERIUM
    10,925 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    249 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zimperium Mobile Threat Defense (MTD)📱-- is a real-time, on-device mobile security solution that protects iOS and Android devices from advanced threats—without compromising privacy. Zimperium detects

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Zimperium Mobile Threat Defense features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Zimperium
Company Website
Year Founded
2010
HQ Location
Dallas, TX
Twitter
@ZIMPERIUM
10,925 Twitter followers
LinkedIn® Page
www.linkedin.com
249 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coolmuster Data Erasure -- Securely Erase Sensitive Files, Disks, and Free Space Securely erase files/folders from HDD, SSD, or external drives, ensuring data remanence prevention. Wipe entire disks

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coolmuster Data Erasure features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Shenzhen, cn
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coolmuster Data Erasure -- Securely Erase Sensitive Files, Disks, and Free Space Securely erase files/folders from HDD, SSD, or external drives, ensuring data remanence prevention. Wipe entire disks

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Coolmuster Data Erasure features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Shenzhen, cn
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hypori revolutionizes secure access to enterprise data, enabling organizations to embrace Bring Your Own Device (BYOD) without compromising security or user privacy. With Hypori’s innovative virtual w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hypori Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Setup
    1
    Monitoring
    1
    Setup Ease
    1
    Cons
    Laggy Performance
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hypori features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hypori
    Company Website
    Year Founded
    2011
    HQ Location
    Reston, VA
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hypori revolutionizes secure access to enterprise data, enabling organizations to embrace Bring Your Own Device (BYOD) without compromising security or user privacy. With Hypori’s innovative virtual w

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Hypori Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Setup
1
Monitoring
1
Setup Ease
1
Cons
Laggy Performance
1
Slow Performance
1
Hypori features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Hypori
Company Website
Year Founded
2011
HQ Location
Reston, VA
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KAYMERA'S CIPHERWATCH, ADAPTIVE MOBILE THREAT DEFENSE SOLUTION, IS A ROBUST, ENTERPRISE-CENTRIC, RISK-BASED, CONTEXTUAL AND PRIVACY AWARE MOBILE SECURITY SOLUTION THAT AIMS TO PERFECTLY BALANCE MOBILI

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaymera Command Center features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    N/A
    Twitter
    @KaymeraTech
    183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

KAYMERA'S CIPHERWATCH, ADAPTIVE MOBILE THREAT DEFENSE SOLUTION, IS A ROBUST, ENTERPRISE-CENTRIC, RISK-BASED, CONTEXTUAL AND PRIVACY AWARE MOBILE SECURITY SOLUTION THAT AIMS TO PERFECTLY BALANCE MOBILI

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Kaymera Command Center features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
N/A
Twitter
@KaymeraTech
183 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    M3 Solutions is a leading provider of automated mobile device management (MDM) solutions, dedicated to enhancing operational efficiency across various industries. Our platform ensures that all mission

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • M3 Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Fort Lauderdale, US
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

M3 Solutions is a leading provider of automated mobile device management (MDM) solutions, dedicated to enhancing operational efficiency across various industries. Our platform ensures that all mission

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
M3 Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Fort Lauderdale, US
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Application security for mobile organisations.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TeskaLabs features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TeskaLabs
    Twitter
    @TeskaLabs
    659 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Application security for mobile organisations.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TeskaLabs features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
TeskaLabs
Twitter
@TeskaLabs
659 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simpler security for richer and faster services on any device

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustonic Secure OS Mobile features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustonic
    Year Founded
    2012
    HQ Location
    Cambridge, United Kingdom
    Twitter
    @trustonic
    1,014 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simpler security for richer and faster services on any device

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Trustonic Secure OS Mobile features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Trustonic
Year Founded
2012
HQ Location
Cambridge, United Kingdom
Twitter
@trustonic
1,014 Twitter followers
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®

Learn More About Mobile Data Security Software

Mobile data security software refers to applications or suites that safeguard sensitive data stored on mobile devices such as smartphones and tablets. Protected data includes credentials to access accounts, financial information, communication history, location data, and personal files.

Mobile data security solutions are essential for employees who use mobile devices for work because they keep unauthorized users from accessing enterprise networks. They provide an extra layer of security against malware, phishing scams, spyware, and other cybersecurity threats.

What are the common features of mobile data security software?

Mobile data security software offers comprehensive features to safeguard mobile devices and the information they contain. Some of the most common include:

  • Data encryption. Mobile data security software helps users conceal both data at rest (stored on the device) and in transit (transmitted to other devices or networks). Encryption ensures that unauthorized users cannot read confidential mobile device data. 
  • Remote wipe capability. Mobile data security software allows administrators or device owners to delete all sensitive data remotely. This covers situations where stolen or lost devices fall into unauthorized hands.
  • Multi-factor authentication (MFA). This feature adds an extra layer of security by requiring users to verify two or more credentials before getting access to a device. MFA technology supports fingerprint scans, one-time passcodes, and security answers to confirm user identity.
  • Virtual private network (VPN) services. When using risky networks like public WiFi, VPN services come in handy by creating encrypted tunnels for data transmission. This ensures that the transferred data is safe from any vulnerabilities. 
  • Secure containers. Protecting data necessitates a secure workspace for mobile devices. Containers provide separate, encrypted storage for sensitive information to ensure everything is defended, even if the device's data is compromised.
  • Trustworthy browsing. Malicious websites attempt to steal information or infect devices with malware. Secure browsing shields private information from all potential threats.
  • Application security. Mobile data security software scans and monitors apps for vulnerabilities and malicious behavior. It stops users from installing apps that could compromise the device's security. 
  • Compliance monitoring and reporting. All employee devices must meet regulatory and organizational security standards. Mobile security solutions continuously track devices and generate reports to help organizations adhere to regulations.
  • Device management. These solutions give IT departments centralized control over mobile devices. It enforces security policies, manages apps, and remotely controls the device's functionality.
  • Anti-malware and threat protection. Mobile data security software scans devices for malware, viruses, and malicious apps. It constantly defends mobile devices against advanced threats.
  • Firewall. Organizations need to establish a barrier between their mobile devices and the Internet to filter incoming and outgoing traffic. These solutions use the same technology as firewall systems to block unauthorized access and cyber attacks.
  • Intrusion prevention system (IPS). This feature allows mobile device security systems to monitor network and system activities and react in real time to protect vulnerabilities before hackers find them.
  • Security patch management. Mobile data security apps ensure devices have the latest security patches installed on time. This lets IT teams successfully address potential threats, keeping digital defenses strong.
  • Backup and recovery. These solutions ensure that each device's data is regularly backed up for restoration in case of failure, accidental deletion, or a successful attack.
  • At-risk analysis. Teams use at-risk analysis to assess the security posture of mobile devices and identify potential weaknesses that may cause security breaches. Once identified, leadership should take the necessary steps to strengthen their defenses.
  • Access management. Mobile device security solutions control who can access devices so that only authorized individuals have the correct permissions. Access management features determine access and privileges based on user roles or needs. 

Types of mobile data security software

Each type of mobile device security solution addresses different facets of security needs. Sometimes, an overlap in functionality exists, but organizations can implement one or a combination of these platforms to ensure robust security.

  • Mobile antivirus or anti-malware software solutions detect, prevent, and remove malicious viruses from mobile devices. They offer real-time protection against threats like malware, spyware, and ransomware. Antiviruses also often include features for mobile app scanning and safe browsing.
  • Mobile device management (MDM) helps IT departments and admins to oversee employee mobile devices and provide optimal performance within a secure environment. MDM tools also control access to corporate resources and can remotely wipe devices if they are lost or stolen.
  • Mobile application management (MAM) tools control the use of specific applications on mobile devices. MAM software lets organizations manage and distribute corporate applications and content without handling the entire device, which is helpful for bring-your-own-device (BYOD) policies.
  • Virtual private networks (VPN) create encrypted connections over the internet. These secure channels allow employees to access corporate resources on their mobile devices when working remotely or using untrusted public networks.
  • Data encryption tools scramble datasets and render them unreadable to unauthorized users to secure stored and transmitted data. They act as a digital vault to protect and maintain data integrity.
  • Secure browsing tools provide mobile devices a safe environment to browse the web while protecting themselves from potential threats. These solutions offer features like phishing protection and content filtering to safeguard devices from any website that tries to steal information or spread malware.
  • Identity and access management (IAM) systems control user access to critical organizational information on mobile devices. It supports MFA, single sign-on (SSO), and user access policies.
  • Endpoint protection platforms (EPP) go beyond anti-malware functionality to protect organizational endpoints, including mobile devices. EPP software performs mobile device management, application management, data encryption, and secure browsing.
  • Unified endpoint security (UES) is the most comprehensive mobile data platform. UEM security solutions offer all the features of EPP along with additional functionalities like network security controls and vulnerability management.

What are the benefits of mobile data security software?

Mobile device security solutions offer several ways to enhance an organization's overall security posture, from protecting corporate data to making mobile device usage safe for business operations.

  • Protection of sensitive data: Mobile device security solutions safeguard confidential data from unauthorized access in case of device loss, theft, or cyber attacks.
  • Enhanced security for BYOD policies: Many companies allow employees to use personal devices for work. Mobile data security software keeps work data safe, enforces access controls, and enables remote wipe capabilities.
  • Timely security updates: These solutions automatically update operating systems and apps with the latest security patches to maintain the most robust defenses against evolving cyber threats.
  • Remote management and wipe capabilities: Mobile security solutions let IT admins manage devices remotely, configure security settings, and distribute apps. They also offer remote wipe functionality to erase data on lost or stolen devices.
  • Reduced risk of data breaches: Mobile data protection enforces a combination of security measures and policies to lower the likelihood of cyber attacks and data breaches.
  • Secure connectivity and data transmission: These tools facilitate safe communication for mobile devices and protect data when employees use public or unsecured networks.
  • Enhanced user productivity: By restricting access to company resources and minimizing security risks, mobile data security software makes it possible for employees to work from anywhere without compromising data integrity.
  • Refined device management: By implementing mobile data security, IT departments can efficiently oversee all mobile devices remotely, saving time and reducing administrative burden.
  • Detailed audit trails: Enabling mobile data privacy allows organizations to track user activity and security incidents with an audit trail created through logging and reporting features. This helps teams analyze trends and investigate any breaches.
  • Cost savings: Mobile data protection mitigates the financial impacts associated with data breaches, including fines, remediation costs, and reputational damage.
  • User authentication and access controls: With strict user authentication protocols and granular access controls, mobile device security solutions guarantee that only verified users access enterprise data and applications.
  • Regulatory compliance: Organizations must meet data protection regulations such as the General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), or payment card industry (PCI) compliance

Who uses mobile data security software?

Different users rely on mobile data security platforms to mitigate risks associated with mobile computing and maintain data privacy and security.

  • Companies of all sizes use mobile data security software to protect corporate data, especially with the prevalence of BYOD policies and increased remote work.
  • Government agencies that handle sensitive or classified information employ these tools to ensure data remains secure and to prevent unauthorized disclosures.
  • Individuals use mobile data security apps to protect sensitive information like contacts, photos, financial data, browsing history, and other personal files.
  • Healthcare providers safeguard patient data by enabling mobile data privacy for tasks like accessing medical records or communicating with insurers.
  • Financial institutions use mobile data security software to protect this information on mobile banking and transaction devices.

Mobile data security software pricing

The number of devices or apps covered determines the price, but there are also monthly or yearly subscriptions to choose from. Some solutions require additional costs for add-on features, such as data encryption.

Here are some factors that affect the cost of mobile data security software.

  • Company Size: Larger companies with more devices to manage pay more than smaller companies. Many vendors offer tiered pricing plans based on the number of devices or users.
  • Features and functionalities: More comprehensive solutions with advanced features cost more. Basic solutions with only core functionalities may be more affordable.
  • Type of deployment: Cloud-based solutions often have subscription-based pricing models based on the number of devices or users. On-premise deployments may involve a one-time perpetual license fee or ongoing maintenance and support costs.
  • Support and maintenance: The level of support offered affects how much organizations pay for mobile security solutions.
  • Industry and regulations: Companies in highly regulated industries need more advanced security features, which often translates to higher costs.
  • License length: Many vendors that offer long-term licenses provide discounts.

What are the alternatives to mobile data security software? 

Some alternatives complement mobile data security software but don’t replace it altogether. Therefore, implementing a combination of these measures provides a more thorough defense.

  • Built-in security features: Modern mobile operating systems have default security settings and features, including encryption, passcode locks, and remote device management. 
  • Physical security measures: Using screen locks or secure phone cases that shield the screen can help prevent 'shoulder surfing' and physical damage to devices. However, they don't protect against sophisticated cyber threats or internal breaches.
  • Routine data backups: Regularly backing up device data is beneficial to safeguard against accidents like loss from physical damage or cyber incidents. While not helpful in preventing attacks, backups make the recovery process much more manageable.
  • User training and awareness programs: Educating employees on best practices for mobile security can significantly reduce the risk of security incidents by helping them identify and avoid risks.
  • Policy-based approaches: Internal policies help manage the use of devices and data. For example, companies ought to enforce policies that limit the type of data employees can access or restrict the use of devices to specific secure environments.
  • Non-smartphone solutions: These devices have limited functionality but a much lower risk profile for data breaches. They can reduce the attack surface but may not be practical for most modern businesses that rely on the Internet.
  • Regular software and firmware updates: Keeping devices updated with the latest security patches addresses vulnerabilities and strengthens defenses against cyber threats.

Challenges with mobile data security software

The challenges with mobile security solutions are manageable, but mitigating these challenges requires careful planning, nuanced policies, and sophisticated technical solutions.

  • Diverse device ecosystem: Organizations with complex technological ecosystems may have to forgo a unified security approach and instead apply adaptive policies and solutions that cater to each device type.
  • BYOD policies: Managing the security of personal devices without infringing on users' privacy is difficult on its own, and unfortunately, BYOD policies can expand the risk perimeter, requiring defined protocols and segregated environments for secured data access.
  • Mixed use of personal and business data: Careful configuration is required for securing business data without intruding on individual user data.
  • Cyber crimes: The continuous growth of cyber threats can make it difficult for mobile security software to keep up. However, with a proactive, multifaceted security strategy and regular software updates, you and your organization can continue to safeguard data against new vulnerabilities.
  • User behavior and compliance: User actions like downloading unapproved apps or bypassing security protocols put data at risk. Promoting a security-aware culture and implementing strict policy enforcement can stop these behaviors.
  • Limited resources on devices: Mobile devices have less processing power and battery life than larger computers, which limits the capabilities of security software. Lightweight, efficient solutions are necessary to minimize resource drain.
  • Data leakage risks: From cloud storage to messaging apps, numerous channels can cause data leakages on mobile devices. Mobile data protection tools must continuously monitor for potential vulnerabilities and prevent data from being shared improperly.
  • Compatibility with enterprise systems: Integrating mobile device security tools with preexisting enterprise systems can be challenging due to compatibility and scalability issues.
  • Patch management: Mobile devices often run different versions of the same OS, making it difficult to ensure all devices operate with the latest security patches. Automated patch management helps with this challenge, but it requires diligent oversight.
  • Legal and privacy considerations: Making certain mobile device security measures comply with laws and respect user privacy presents another hurdle, especially with varying regulations across regions.
  • Physical security exposure: Mobile devices are more prone to physical theft or loss than stationary devices. Educating users on the importance of physical safety and quick reporting must become a part of your organization’s security plan.
  • Network security: Mobile devices frequently connect to potentially insecure public WiFi networks, increasing the risk of interception or unauthorized access. Employing VPNs to ensure devices operate through secure networks lowers the chances of harm.

Which companies should buy mobile data security software?

Any company that uses mobile devices for operations should consider investing in mobile data security software. Organizations with remote or hybrid workforces and industries with significant travel or fieldwork as a regular part of business need these platforms.

However, certain types of companies may find it more critical due to the nature of their business, the sensitivity of their data, and regulatory requirements. 

How to choose mobile data security software

Choosing the right mobile data security software involves thorough research, a clear understanding of your current and future needs, and careful consideration of the vendor's reliability and support structure. Here’s how to make your choice.

Identify needs and priorities

Assess your specific security requirements, including regulatory compliance needs. Determine what kind of mobile usage is common, whether BYOD, corporate-owned, or mixed-use. Once identified, you can prioritize the security features that are essential for your business operations and data protection strategy.

Choose the necessary technology and features

The next step is to list all essential features based on business priorities. Consider how the software will enhance or impede employee productivity. Future scaling should also be measured to determine whether the platform can manage increasing numbers of users and devices.

Review vendor vision, roadmap, viability, and support

Make sure you understand the vendor’s history, stability in the market, and user satisfaction statistics. You should also examine the vendor's development roadmap to see if it aligns with future technological trends and requirements. Lastly, check the level of support provided, including response times, problem-solving capabilities, and available communication channels.

Evaluate deployment and purchasing models

Decide which deployment model (on-premise, cloud-based, or hybrid) works best for you. Consider pricing models (subscription-based, per device, per user) and the total cost of ownership, including potential growth. The software should also be compatible with your existing IT infrastructure.

Put it all together

Finally, create a shortlist of potential vendors that meet the above criteria. To take things further, conduct pilot tests to see how the software performs in different environments. It also helps to share your findings with more stakeholders for a collaborative and informed decision-making process.

How to implement mobile data security software

In most cases, you don’t need direct physical access to an employee's mobile device to set up security software. Depending on the type of product, users can implement everything they need through a direct link from the company's IT department or by downloading an app. 

Physical access may be needed in cases when the security software requires specific hardware updates, but this is rare. IT teams can typically manage the software from a centralized system.