Mobile data security software aims to protect mobile devices and their data by identifying threats, securing networks, and creating data backups. IT workers will use mobile data security software to allow secure mobile access to networks and systems. Personal users will use data security tools to protect their personal information and data. Companies will require mobile data security tools to ensure secure connections, enforce authentication, and limit the use of third-party software. Some companies will encrypt data to prevent access to stolen devices. Others will use the software to perform periodic audits, monitor for threats, and create secure gateways. Mobile data security tools have functionality that overlaps with data security, network security, and web security products in regards to features. Mobile data security tools, however, cater specifically to the security of mobile devices.
To qualify for inclusion in the Mobile Data Security category, a product must:
Mobile Data Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Every industry has its own unique compliance and governance requirements. Salesforce Shield offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements. IT departments and developers can now use point-and-click tools to seamlessly build a new level of trust, transparency, compliance, and governance right into business-critical apps.
MYMobile Security is the no1 provider of mobile security. We offer a wide portfolio of mobile security products to ensure your mobile peace of mind. For us the definition of mobile security is any product or service that can enhance your security and privacy, whether it may be a top anti-virus protection or a service that makes everyday life easier. Simply, we truly care for protecting your mobile life.
Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks.
Appknox is one of the enterprise level security assessment product that helps businesses and enterprises to detect, manage and fix security issues. Its been used by some of the top enterprises to secure more than 500 mobile apps on regular basis. Appknox is listed in one of the Gartner's top mobile app security testing vendors list. Working with more than 100 organizations globally Appknox has been focusing on niche area of mobile app security.
KAYMERA'S CIPHERWATCH, ADAPTIVE MOBILE THREAT DEFENSE SOLUTION, IS A ROBUST, ENTERPRISE-CENTRIC, RISK-BASED, CONTEXTUAL AND PRIVACY AWARE MOBILE SECURITY SOLUTION THAT AIMS TO PERFECTLY BALANCE MOBILITY AND PRODUCTIVITY. CIPHERWATCH UTILIZES THREE PILLARS TO DYNAMICALLY ALLEVIATE ALL MOBILE SECURITY RISKS; DETECTION, AUGMENTATION, AND MITIGATION.
Cyber adAPT is a platform that secures mobile-enabled enterprises protecting real-world reputations, it combine powerful Secure Device Management, guaranteeing secure access to cloud and network services, with real-time Attack Detection inside the network and instantly illuminates otherwise hidden, malicious behavior ensuring more real attacks are found more quickly.
DexGuard provides advanced security features tailor-made for the Android operating system. It offers protection against static analysis (code hardening). DexGuard secures your Android APK or SDK against cloning, piracy, tampering and key extraction by applying multiple obfuscation and encryption techniques.
App Builder: Take your concepts, ideas and needs to rich engaging apps in hours using our “Zero Code App Builder”. All this can now be done while connecting to any enterprise backend infrastructure regardless of complex composite data sets from multiple sources without compromising on security & policy controls. Our platform/solution seamlessly fits in to your existing infrastructure without needing any drastic changes. No Vendor Lock-In: Our solution/platform is built on open standards and architecture, which enables us to connect into any backend infrastructure as well as any mobile device and platform. Any apps built using our solution/platform transact conforming to those standards. With the built in tools to export the app configuration you can point the apps to any backend should your future needs change, thereby ensuring “No Vendor Lock In”. Additionally the ability to export the app source code gives further freedom to build and launch the app on any backend. Flexible & Extensible: Off the shelf one-size fits all mobile app solutions require organizations to fit their processes to the capability of the app. Any changes to the app would result in either loss of data or even worse cumbersome migration challenges. Our flexible and extensible architecture allows you to take control of the data and the app to customize to your needs while connecting into any backend infrastructure there by increasing the life span of the app and in turn the ROI of the app itself. This ensures business continuity. Platform Agnostic: In a world with many devices and platforms; developing agnostic, cross platform apps is key to keeping ahead in the fast evolving world of mobile applications. We give you the flexibility to make architecturally sound design decisions without being limited to one platform or another. Unified Security: Enterprise grade security demands more than just user authentication and encryption of data. Our solution/platform provides layered security across device, application, data and user, which enable us to provide contextual security and policy controls. This level of granular control is key in terms of not only managing where, when and how the data flows but also in providing rich insight into such flows. Lower TCO: Our platform allows for lower cost of ownership by enabling you maximize reuse of your development efforts, build robust, responsive mobile apps in a matter of hours that are platform agnostic, test app functionality as you configure your data sources and extend mobile apps seamlessly thus significantly lowering the time, effort and investment involved in developing your mobile apps from end to end.
Cutting-edge protection for your iOS apps. iXGuard has been designed to protect your Swift and Objective-C apps and SDKs from reverse engineering and its consequences. It hardens the source code of the applications using a variety of obfuscation and encryption techniques. The applied layers of protection make it close to impossible to access the internal logic of your applications.
MORE is aplug & play solution able to know if a transaction was securely executed and if the users really are who they say they are, providing stronger identification of advanced cyber attacks; it is capable of analyzing whether a device is compromised and can correlate its behavioural and biometric analysis with the user's business and multi-device data (if the customer uses multiple devices to interact with the service) in order to provide a wider, more sophisticated range of protection.
NowSecure Lab Automated provides security professionals with a proven solution for analyzing and mitigating security flaws in mobile apps. Lab Automated dynamic and static app security testing generates results in minutes, providing developers with the actionable intelligence they need to secure apps.
passQi provides both an intelligent password management mobile app and a complementary server-side solution called mFactor to implement a proprietary Multi Factor Authentication login for WordPress and other web sites. The app can be used as a stand alone product, or in concert with the mFactor solution. The passQi 2 app provides the highest level of security by storing information exclusively in the user’s smartphone vault, a single tool that goes everywhere. One-time keys securely encrypt relayed information via the cloud, and are never passed through the network or shared with another device. passQi 2 is designed to work seamlessly with nearly any site on the Internet and offers an optional automated TOTP support alternative to Google authenticator.
zANTI™ is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.
The Zimperium In-App Protection (zIAP) SDK ensures that mobile applications remain safe from cyber attacks by providing immediate device risk assessments and threat alerts. Organizations can minimize exposure of their sensitive data, and prevent their customers and partners' data from being jeopardized by malicious and fraudulent activity.