Product Avatar Image

Tether Security

Show rating breakdown
2 reviews
  • 1 profiles
  • 1 categories
Average star rating
4.8
Serving customers since
2005

Profile Name

Star Rating

2
0
0
0
0

Tether Security Reviews

Review Filters
Profile Name
Star Rating
2
0
0
0
0
Verified User in Information Technology and Services
AI
Verified User in Information Technology and Services
04/22/2026
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Great interface and solid product

We used Tether back when they were known as EXO5. The interface has come a long way and it is a great way to manage encryption on a distributed fleet of mobile devices. Being able to track location, remotely wipe or lock a computer down is very helpful.
KK
Karl K.
03/11/2026
Validated Reviewer
Review source: Seller invite
Incentivized Review

The Go-To Solution for Remote Device Management

I've worked with Tether for almost a decade and it has been a great small business solution that has scaled with us as we've grown, now supporting over 100 employees. Tether is easy to use and manage, especially for small businesses without large IT teams. It automates the tracking of laptops for remote employees and allows us to trace, deactivate, or temporarily restrict devices as needed. Installing Tether is simple and can be done in minutes, locally or remotely. I also appreciate their amazing service, responsiveness, and elite support.

About

Contact

HQ Location:
San Francisco, US

Social

What is Tether Security?

Tether Security is a cybersecurity firm that specializes in providing advanced security solutions to protect organizations from cyber threats. The company focuses on enhancing security posture through services such as threat detection, incident response, and vulnerability management. Tether Security employs a team of experts who utilize cutting-edge technology and methodologies to help clients safeguard their digital assets and ensure compliance with industry standards. Their offerings are designed to address the evolving landscape of cyber risks, making them a trusted partner for businesses seeking to improve their cybersecurity defenses.

Details

Year Founded
2005