Mobile data security software aims to protect mobile devices and their data by identifying threats, securing networks, and creating data backups. IT workers will use mobile data security software to allow secure mobile access to networks and systems. Personal users will use data security tools to protect their personal information and data. Companies will require mobile data security tools to ensure secure connections, enforce authentication, and limit the use of third-party software. Some companies will encrypt data to prevent access to stolen devices. Others will use the software to perform periodic audits, monitor for threats, and create secure gateways. Mobile data security tools have functionality that overlaps with data security, network security, and web security products in regards to features. Mobile data security tools, however, cater specifically to the security of mobile devices.
To qualify for inclusion in the Mobile Data Security category, a product must:
Mobile Data Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Every industry has its own unique compliance and governance requirements. Salesforce Shield offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements. IT departments and developers can now use point-and-click tools to seamlessly build a new level of trust, transparency, compliance, and governance right into business-critical apps.
Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks.
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
zANTI™ is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.
Appknox is one of the enterprise level security assessment product that helps businesses and enterprises to detect, manage and fix security issues. Its been used by some of the top enterprises to secure more than 500 mobile apps on regular basis. Appknox is listed in one of the Gartner's top mobile app security testing vendors list. Working with more than 100 organizations globally Appknox has been focusing on niche area of mobile app security.
NetMotion Mobility® mobile VPN software maintains resilient, reliable connections and optimizes performance through the most challenging wireless-network conditions. The result? Seamless use of mobile networks and applications for mobile workers, and better experiences for the customers they serve.
MYMobile Security is the no1 provider of mobile security. We offer a wide portfolio of mobile security products to ensure your mobile peace of mind. For us the definition of mobile security is any product or service that can enhance your security and privacy, whether it may be a top anti-virus protection or a service that makes everyday life easier. Simply, we truly care for protecting your mobile life.
DexGuard provides advanced security features tailor-made for the Android operating system. It offers protection against static analysis (code hardening). DexGuard secures your Android APK or SDK against cloning, piracy, tampering and key extraction by applying multiple obfuscation and encryption techniques.
App Builder: Take your concepts, ideas and needs to rich engaging apps in hours using our “Zero Code App Builder”. All this can now be done while connecting to any enterprise backend infrastructure regardless of complex composite data sets from multiple sources without compromising on security & policy controls. Our platform/solution seamlessly fits in to your existing infrastructure without needing any drastic changes. No Vendor Lock-In: Our solution/platform is built on open standards and architecture, which enables us to connect into any backend infrastructure as well as any mobile device and platform. Any apps built using our solution/platform transact conforming to those standards. With the built in tools to export the app configuration you can point the apps to any backend should your future needs change, thereby ensuring “No Vendor Lock In”. Additionally the ability to export the app source code gives further freedom to build and launch the app on any backend. Flexible & Extensible: Off the shelf one-size fits all mobile app solutions require organizations to fit their processes to the capability of the app. Any changes to the app would result in either loss of data or even worse cumbersome migration challenges. Our flexible and extensible architecture allows you to take control of the data and the app to customize to your needs while connecting into any backend infrastructure there by increasing the life span of the app and in turn the ROI of the app itself. This ensures business continuity. Platform Agnostic: In a world with many devices and platforms; developing agnostic, cross platform apps is key to keeping ahead in the fast evolving world of mobile applications. We give you the flexibility to make architecturally sound design decisions without being limited to one platform or another. Unified Security: Enterprise grade security demands more than just user authentication and encryption of data. Our solution/platform provides layered security across device, application, data and user, which enable us to provide contextual security and policy controls. This level of granular control is key in terms of not only managing where, when and how the data flows but also in providing rich insight into such flows. Lower TCO: Our platform allows for lower cost of ownership by enabling you maximize reuse of your development efforts, build robust, responsive mobile apps in a matter of hours that are platform agnostic, test app functionality as you configure your data sources and extend mobile apps seamlessly thus significantly lowering the time, effort and investment involved in developing your mobile apps from end to end.
NowSecure Lab Automated provides security professionals with a proven solution for analyzing and mitigating security flaws in mobile apps. Lab Automated dynamic and static app security testing generates results in minutes, providing developers with the actionable intelligence they need to secure apps.
iPhone Eraser guards your private information. It provides 100% promise to securely remove all the data and settings from your device safely. No personal information will be tracked after you sell your phone. iPhone Eraser guards your private information and protects your personal data from data criminals.
App Shielding by OneSpan proactively protects against zero-day and other targeted attacks on mobile apps, allowing mobile business apps to run securely by blocking malicious/foreign code or shutting down the application if a threat is identified. Integrating OneSpan App Shielding into mobile apps ensures the complete integrity of Android and iOS apps and fully protects sensitive business and personal data from cybercriminals.
CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure OS, application security, secure communication, personal security, and ultimate usability.
KAYMERA'S CIPHERWATCH, ADAPTIVE MOBILE THREAT DEFENSE SOLUTION, IS A ROBUST, ENTERPRISE-CENTRIC, RISK-BASED, CONTEXTUAL AND PRIVACY AWARE MOBILE SECURITY SOLUTION THAT AIMS TO PERFECTLY BALANCE MOBILITY AND PRODUCTIVITY. CIPHERWATCH UTILIZES THREE PILLARS TO DYNAMICALLY ALLEVIATE ALL MOBILE SECURITY RISKS; DETECTION, AUGMENTATION, AND MITIGATION.
Cyber adAPT is a platform that secures mobile-enabled enterprises protecting real-world reputations, it combine powerful Secure Device Management, guaranteeing secure access to cloud and network services, with real-time Attack Detection inside the network and instantly illuminates otherwise hidden, malicious behavior ensuring more real attacks are found more quickly.
Fyde replaces outdated and costly VPN, SWG and NAC point products with a quick to deploy, easy to manage, unified offering. Fyde helps companies mitigate security and compliance risk, increase user productivity and experience by enabling secure access to corporate applications like Jira, Confluence, Bitbucket, Gitlab, Kibana, MS RDP, SSH and cloud workloads.
Cutting-edge protection for your iOS apps. iXGuard has been designed to protect your Swift and Objective-C apps and SDKs from reverse engineering and its consequences. It hardens the source code of the applications using a variety of obfuscation and encryption techniques. The applied layers of protection make it close to impossible to access the internal logic of your applications.
MORE is aplug & play solution able to know if a transaction was securely executed and if the users really are who they say they are, providing stronger identification of advanced cyber attacks; it is capable of analyzing whether a device is compromised and can correlate its behavioural and biometric analysis with the user's business and multi-device data (if the customer uses multiple devices to interact with the service) in order to provide a wider, more sophisticated range of protection.
passQi provides both an intelligent password management mobile app and a complementary server-side solution called mFactor to implement a proprietary Multi Factor Authentication login for WordPress and other web sites. The app can be used as a stand alone product, or in concert with the mFactor solution. The passQi 2 app provides the highest level of security by storing information exclusively in the user’s smartphone vault, a single tool that goes everywhere. One-time keys securely encrypt relayed information via the cloud, and are never passed through the network or shared with another device. passQi 2 is designed to work seamlessly with nearly any site on the Internet and offers an optional automated TOTP support alternative to Google authenticator.
Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust security framework and automatically prevent attacks. Pradeo's next generation technology provides a reliable detection of threats, protecting against data leakage and enforcing compliance with data privacy regulations.