Introducing G2.ai, the future of software buying.Try now

Best Mobile Data Security Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Mobile data security software aims to protect mobile devices and their data by identifying threats, securing networks and endpoints, and creating data backups. Companies use mobile data security tools to ensure secure connections, enforce authentication, and limit the use of third-party software such as mobile apps.

Monitoring and alert functions ensure all devices connected to the network remain in compliance with company access and security policies. Companies look to mobile data security solutions to protect company data while allowing employees to access their network from personal and company-owned mobile devices, especially in remote or off-site work environments. Some mobile data security solutions also protect data through encryption, firewalls, and other security tools.

Mobile data security tools have features that overlap with data security software, network security software, and web security software.

Mobile data security tools, however, cater specifically to the security of mobile devices. The focus on security makes these tools less comprehensive than mobile device management (MDM) software, though there is overlap in functionality.

Mobile data security also differs from IoT security solutions as it refers to security around devices capable of complex multitasks such as cellphones and tablets. On the other hand, IoT encompasses a more expansive range of products such as printers, cameras, medical devices, and household appliances.

Mobile data security also differs from application security as it protects devices and data, while application security protects applications and their code.

To qualify for inclusion in the Mobile Data Security category, a product must:

Provide mobile-specific security features
Protect data through encryption, firewalls, use of VPNs, intrusion prevention systems (IPS), etc.
Provides authentication requirements for mobile access and protects against jailbreaking and rooting attempts
Monitor for and defend against threats such as phishing attempts, man-in-the-middle (MITM) attacks, and malicious third-party applications on mobile devices
Alert administrators when mobile data is compromised
Show More
Show Less

Best Mobile Data Security Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Mobile Data Security Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
44 Listings in Mobile Data Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for Mobile Threat Defense (MTD) allows you to protect both corporate and employee-owned Android and iOS devices from advanced threats. It enables enterprises to monitor, manage and secu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ivanti Neurons for MTD Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Customer Support
    1
    Device Security
    1
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Poor Connectivity
    1
    Poor Customer Support
    1
    Technical Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for MTD features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    5.0
    Backup
    Average: 8.3
    7.2
    Data Transport
    Average: 8.5
    7.8
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,763 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,984 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for Mobile Threat Defense (MTD) allows you to protect both corporate and employee-owned Android and iOS devices from advanced threats. It enables enterprises to monitor, manage and secu

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Ivanti Neurons for MTD Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Customer Support
1
Device Security
1
Ease of Use
1
Implementation Ease
1
Cons
Expensive
1
Poor Connectivity
1
Poor Customer Support
1
Technical Difficulties
1
Ivanti Neurons for MTD features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
5.0
Backup
Average: 8.3
7.2
Data Transport
Average: 8.5
7.8
Data Encryption
Average: 8.6
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,763 Twitter followers
LinkedIn® Page
www.linkedin.com
2,984 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetworkSecure is a network-based cybersecurity solution, offering zero-touch, clientless operation, requiring no application installation by the end customer. With NetworkSecure, a communications serv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetworkSecure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Measures
    3
    Customer Support
    1
    Device Security
    1
    Jamf Services
    1
    Product Quality
    1
    Cons
    Complexity
    1
    Poor Connectivity
    1
    Poor Documentation
    1
    Technical Difficulties
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetworkSecure features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.4
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.5
    9.4
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Allot
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetworkSecure is a network-based cybersecurity solution, offering zero-touch, clientless operation, requiring no application installation by the end customer. With NetworkSecure, a communications serv

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
NetworkSecure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Measures
3
Customer Support
1
Device Security
1
Jamf Services
1
Product Quality
1
Cons
Complexity
1
Poor Connectivity
1
Poor Documentation
1
Technical Difficulties
1
Update Issues
1
NetworkSecure features and usability ratings that predict user satisfaction
0.0
No information available
9.4
Backup
Average: 8.3
10.0
Data Transport
Average: 8.5
9.4
Data Encryption
Average: 8.6
Seller Details
Seller
Allot
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlueFletch Enterprise is designed to provide advanced enterprise-grade security management for shared Android devices, featuring robust Single Sign-On (SSO) capabilities and comprehensive Device Lockd

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlueFletch features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Atlanta, US
    Twitter
    @bluefletch
    1,459 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BlueFletch Enterprise is designed to provide advanced enterprise-grade security management for shared Android devices, featuring robust Single Sign-On (SSO) capabilities and comprehensive Device Lockd

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
BlueFletch features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2008
HQ Location
Atlanta, US
Twitter
@bluefletch
1,459 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. It enables you to remotely locate, lock, and wipe devices you manage to prevent data compromise. From For

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DriveStrike features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Backup
    Average: 8.3
    6.7
    Data Transport
    Average: 8.5
    6.7
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Salt Lake City, US
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. It enables you to remotely locate, lock, and wipe devices you manage to prevent data compromise. From For

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
DriveStrike features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Backup
Average: 8.3
6.7
Data Transport
Average: 8.5
6.7
Data Encryption
Average: 8.6
Seller Details
Year Founded
2012
HQ Location
Salt Lake City, US
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Small-Business
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra Secure Collaboration features and usability ratings that predict user satisfaction
    7.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    8.3
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,565 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Digital Guardian Secure Collaboration (formerly Vera) encrypts and controls access to sensitive files wherever they go. Taking a Zero Trust approach to file sharing, collaboration with anyone – extern

Users
No information available
Industries
No information available
Market Segment
  • 53% Small-Business
  • 27% Enterprise
Fortra Secure Collaboration features and usability ratings that predict user satisfaction
7.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
8.3
Data Encryption
Average: 8.6
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,565 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaymera Secure Calls and Chats features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @KaymeraTech
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Kaymera Secure Calls and Chats features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@KaymeraTech
182 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust secu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pradeo Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Efficiency
    1
    Reliability
    1
    Security
    1
    Security Measures
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pradeo Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.5
    10.0
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pradeo
    Year Founded
    2010
    HQ Location
    Paris, FR
    Twitter
    @pradeo
    3,192 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust secu

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Pradeo Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Efficiency
1
Reliability
1
Security
1
Security Measures
1
Cons
Slow Performance
1
Pradeo Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
9.2
Backup
Average: 8.3
10.0
Data Transport
Average: 8.5
10.0
Data Encryption
Average: 8.6
Seller Details
Seller
Pradeo
Year Founded
2010
HQ Location
Paris, FR
Twitter
@pradeo
3,192 Twitter followers
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppSuit is a mobile app security solution which is develped by attacker's view. Protect various type of mobile apps in safe such as finace, game, public, IoT, fintech, O2O etc., from hacking threat.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AppSuit features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    STEALIEN
    Year Founded
    2015
    HQ Location
    서울특별시, KR
    Twitter
    @stealien
    493 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppSuit is a mobile app security solution which is develped by attacker's view. Protect various type of mobile apps in safe such as finace, game, public, IoT, fintech, O2O etc., from hacking threat.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
AppSuit features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
STEALIEN
Year Founded
2015
HQ Location
서울특별시, KR
Twitter
@stealien
493 Twitter followers
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corrata provides endpoint threat detection and response for mobile. Our pioneering architecture delivers real-time visibility into threats targeting both iOS and Android devices, without compromising

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corrata features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corrata
    Year Founded
    2016
    HQ Location
    Co. Dublin, IE
    Twitter
    @Corrata_co
    630 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corrata provides endpoint threat detection and response for mobile. Our pioneering architecture delivers real-time visibility into threats targeting both iOS and Android devices, without compromising

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Corrata features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Corrata
Year Founded
2016
HQ Location
Co. Dublin, IE
Twitter
@Corrata_co
630 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    C-Prot Embedded AppDefense is an SDK solution that enables easy integration into mobile applications and solutions developed by app developers, security providers or mobile service providers to ensure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Embedded AppDefense features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Mersin, TR
    Twitter
    @cprottr
    205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

C-Prot Embedded AppDefense is an SDK solution that enables easy integration into mobile applications and solutions developed by app developers, security providers or mobile service providers to ensure

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
C-Prot Embedded AppDefense features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Mersin, TR
Twitter
@cprottr
205 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Endpoint Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Backup
    Average: 8.3
    10.0
    Data Transport
    Average: 8.5
    10.0
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Mersin, TR
    Twitter
    @cprottr
    205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
C-Prot Endpoint Security features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Backup
Average: 8.3
10.0
Data Transport
Average: 8.5
10.0
Data Encryption
Average: 8.6
Seller Details
Year Founded
2010
HQ Location
Mersin, TR
Twitter
@cprottr
205 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gokiosk is a mobile device kiosk lockdown application to protect it from being misused.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gokiosk features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Backup
    Average: 8.3
    0.0
    No information available
    10.0
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intricare
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gokiosk is a mobile device kiosk lockdown application to protect it from being misused.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Gokiosk features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
10.0
Backup
Average: 8.3
0.0
No information available
10.0
Data Encryption
Average: 8.6
Seller Details
Seller
Intricare
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kaymera Encrypted Phone Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Device Security
    1
    Ease of Use
    1
    Security
    1
    Cons
    Limited Integration
    1
    Third-Party Dependence
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaymera Encrypted Phone features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Backup
    Average: 8.3
    8.3
    Data Transport
    Average: 8.5
    10.0
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @KaymeraTech
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Kaymera Encrypted Phone Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Device Security
1
Ease of Use
1
Security
1
Cons
Limited Integration
1
Third-Party Dependence
1
Kaymera Encrypted Phone features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Backup
Average: 8.3
8.3
Data Transport
Average: 8.5
10.0
Data Encryption
Average: 8.6
Seller Details
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@KaymeraTech
182 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Encrypt phone calls, messaging, and conference calls on Android, iPhone and BlackBerry with easy to use applications.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Koolspan TrustCall features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Data Transport
    Average: 8.5
    10.0
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Koolspan
    HQ Location
    Germantown, US
    Twitter
    @Koolspan
    614 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Encrypt phone calls, messaging, and conference calls on Android, iPhone and BlackBerry with easy to use applications.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Koolspan TrustCall features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Data Transport
Average: 8.5
10.0
Data Encryption
Average: 8.6
Seller Details
Seller
Koolspan
HQ Location
Germantown, US
Twitter
@Koolspan
614 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The EMVCo-evaluated Licel vTEE provides a secure execution environment where trusted applications can perform sensitive transactions and operations. It also protects against sophisticated attacks that

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Licel vTEE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Device Security
    1
    Security
    1
    Security Measures
    1
    Cons
    Slow Performance
    1
    Technical Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Licel vTEE features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Backup
    Average: 8.3
    6.7
    Data Transport
    Average: 8.5
    6.7
    Data Encryption
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Licel
    Year Founded
    2011
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The EMVCo-evaluated Licel vTEE provides a secure execution environment where trusted applications can perform sensitive transactions and operations. It also protects against sophisticated attacks that

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Licel vTEE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Device Security
1
Security
1
Security Measures
1
Cons
Slow Performance
1
Technical Difficulties
1
Licel vTEE features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
6.7
Backup
Average: 8.3
6.7
Data Transport
Average: 8.5
6.7
Data Encryption
Average: 8.6
Seller Details
Seller
Licel
Year Founded
2011
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®