Requires a second level of authentication, such as sms messaging or customized tokens, to access data.
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Security and Compliance
Abilities to set standards for database security and risk management.
Mobile Device Mangement
Ability to set standards for types of mobile devices and networks capable of accessing data.
(Based on 6 reviews)
Identifies location of data that may be less protected and more vulnerable to threats.
Manages user network accessibility on laptops, mobile phones, tablets and other mobile devices.
(Based on 10 reviews)
Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.
Administrators can access and organize data related to incidents to produce reports or make data more navigable.
Provides a local access point to view information about the mobile data security product.
Provide some level of encryption of data in transit, protecting sensitive data while it lives in the application.
Protects data with some form of encryption as it leaves your secure or local network.
Provides a virtual private network (VPN) to secure remote access to networks
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.