View
Sorting
Products found: 31
Better Mobile Security MTD…
- Apps. Prevent risky and leaky apps from putting sensitive data at risk with app scanning technology powered by machine learning.
- Web and Content. Employees are more likely to get phished on their phone than their computer. Protect them from all sources of malicious links (texting, WhatsApp, iMessage, Snapchat, Facebook, etc.)
- Device / OS. Mobile device OS vulnerabilities must be mitigated. Users need defense against advanced jailbreak attacks and risky device configurations. Get control of device versions, including CVEs based on Android patch levels and iOS versions.
- Network. Risky Wi-Fi hotspots are everywhere. How do you know if a man-in-the-middle attack is in place? Prevent the full range of advanced network-based threats with detection powered by our cloud-based global visibility.
Hexnode…
https://www.hexnode.com/roi-calculator/
Lookout Mobile Endpoint Security…
- Trojans and spyware that can exfiltrate data from the device
- Vulnerabilities in app data transfer and storage
- Risky app behaviors that pose a compliance risk
- Sideloaded apps that bypass official app stores
- Behavioral anomalies
- Advanced root or jailbreak
- Out-of-date operating systems
- Device configuration risks
- Man-in-the-middle attacks
- Host certificate hijacking
- SSLStrip attacks
- TLS protocol downgrades
- Lack of compliance with customizable policies set by MES administrator
- Device, apps, network, or firmware identified as risky by Lookout Security Cloud
- Vertical specific risks from apps accessing and sharing regulated content
MobeliIron Threat Defense…
With MobileIron Threat Defense you will fully secure both corporate and employee-owned devices so users can be more productive and mobile devices are protected against advanced threats. MobileIron’s non-intrusive approach to securing Android and iOS devices provides comprehensive protection around the clock without impacting the user experience or violating their privacy.
MobileIron Threat Defense delivers unparalleled mobile security that enables enterprises to monitor, manage, and secure devices against mobile – device, network and application (DNA) – cyberattacks. With one application, known and zero-day threats can be stopped on-device, even without network connectivity, before they cause damage. Users are not required to take any action to deploy or activate the application, and they cannot uninstall the protection. There is no disruption to their productivity, and mobile devices are prevented from impacting the corporate network and risking data loss.
Capabilities
For timely detection and remediation of device, network, and app attacks on mobile devices, enterprises can protect their company data with the MobileIron Threat Defense solution.
- Proactive Detection of Threats and Attacks
- Timely Remediation
- Greater Visibility
- Easy Management
MobileIron Access…
- Establish user trust using multiple factor authentication
- Correlate user trust with other factors such as endpoint, app, network, and more
- Apply adaptive, risk-based policies that match the user’s environment
Benefits Zero sign-on Verify critical signals – user, device, apps, networks, and threats – before granting access. Multi-factor authentication Replace expensive and cumbersome hard tokens with a secure MFA solution that’s easy to deploy and use. Secure your cloud Protect access to all of your critical productivity apps and services, including Salesforce, OneDrive, and more. MobileIron Access provides this new security framework so organizations can confidently adopt mobilecloud technologies to drive user productivity while reducing the risk of data breaches.
With capabilities such as multi-factor authentication (MFA), seamless single sign-on (SSO), and an advanced policy engine, organizations have the right security platform to meet the growing information security and compliance requirements.
MyAUDIT…
Maximum effectiveness through combination with the ProAUDIT Suite
The conduct of measurement campaigns and audits is supported holistically by the OTARIS ProAUDIT management suite. From the panel management to the individual definition of key performance indicators (KPIs) and the roll-out of the audit to the defined participant groups, the entire workflow of an audit is represented with the suite. The suite supports panel management, provisioning, data collection, analysis and monitoring. With the help of the integrated reporting studio, PowerPoint presentations can be created easily. The suite also includes a module for addressing large customer groups via email or SMS. The acquired qualitative data can, if necessary, be related to company data.Technical features
The Customer Experience is captured on the customer’s smartphone using the MyAUDIT app. No special hardware is required for this. The customer simply has to install the app and accept the participation. The app is already available from Android Version 2.2. Also for Symbian, BlackBerry and iOS the app is available with a defined functionality. For iOS, only the QoE module is currently available for enterprise use. The MyAUDIT app can be ordered on request with the CI adaptations. In this case, the app is designed according to specifications or the corporate design of the customer. The recorded measurement data is encrypted securely by an asymetric method and sent to the backend via http/s. The data upload takes place in the idle mode of the device and thus does not interfere with normal usage. The APN for the data upload can be configured as required.Features
- Telephony (MOC, MTC)
- Browser Usage
- App Usage (inter alia YouTube, Facebook, Marketplace oder General Usage)
- Non Service Related Modul (2/3G und LTE)
- QoE module
- User Benefit Module (Speedmeter, App observer, system information)
- Analyzer (diagnostic Analysis of the hardware)
NowSecure Platform…
One Portal to Ensure the Security and Privacy of Mobile Apps You Build and Use
Automated NowSecure Analysis Engine Enables Accurate, Repeatable Testing Execute rapid automated static, dynamic and interactive analysis of Android (.apk) and iOS (.ipa) binaries on real devices and connected APIs, completing pen testing strength coverage in minutes on pre-prod and/or published apps.- Dynamic Binary Analysis
- Interactive Binary Analysis
- Static Binary Analysis
- API Testing
- CVSS Security Score
- Compliance Checks
- Findings Descriptions
- Remediation Instructions
- Popular CI/CD build tools, like Cloudbees Jenkins, Microsoft Azure DevOps, CircleCI and GitLab.
- Issue tracking systems like Jira.
- Vulnerability management systems like Brinqa and ThreadFix.
- MDM/EMM software to continuously monitor app risk and enforce whitelist/blacklist.
OneLogin Trusted Experience Platform…
Take a leap forward in your digital transformation
The OneLogin Trusted Experience Platform™ is the foundation to build simple and secure experiences between people and technology. Manage and secure digital identities for your workforce and your customers so you can get back to business. CONNECT As organizations grow, the technology puzzle pieces multiply: more apps, users, and devices. OneLogin simplifies identity and access management. ANALYZE In the past year, there has been nearly a twelve-fold increase in the number of cyberattacks using artificial intelligence and machine learning (AI/ML) capabilities. Fight fire with fire. Vigilance AI™ uses AI/ML to gather data across the OneLogin Trusted Experience Platform™ and identify potential threats. ACT Not all login attempts are created equal. SmartFactor Authentication™ offers flexible authentication requirements based on contextual insights, including modular login flows as well as step-up and step-down multi-factor authentication (MFA) requirements. Security when you need it, simplicity when risk is low.Key OneLogin Trusted Experience Platform™ services
Cloud directory The center of the platform is the OneLogin cloud directory: a single source of truth from which you manage access. No need to rip and replace your current directories. OneLogin’s pre-built integrations work seamlessly with your existing on-prem and cloud directories, like Microsoft Active Directory, LDAP, Workday, and more. Single Sign-On OneLogin’s Single Sign-on (SSO) platform gives users one-click access to all their apps, in the cloud or behind the firewall, anywhere and anytime. With an extensive app catalog and a secure portal, users can always see and access their apps. OneLogin Desktop extends SSO to MacOS or Windows machines. OneLogin Access extends identity management to legacy apps on-prem and hosted remotely. Authentication It’s all about secure authentication. OneLogin adds multi-factor authentication (MFA). Implement personal security questions, biometrics, OTP, pins, and more. You define the rules, OneLogin enforces them. OneLogin’s SmartFactor Authentication uses machine learning for state-of-the-art MFA. It takes context into account, like location, IP addresses, and time of day, to identify and challenge abnormal login attempts. Identity and lifecycle management With OneLogin’s identity management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchronization. Streamline entitlements through powerful rules to enforce intelligent access policies based on user location, role, privilege level, and more. Reporting and intelligence Stay compliant with sophisticated reporting and a centralized audit trail. The information you need to meet compliance requirements or assess cyber threats is at your fingertips. No more coordinating with multiple systems and people for reports. OneLogin’s dashboard is supplemented by a state-of-the-art reporting engine for drilling down to users, apps, and events. Developer tools An identity solution that isn’t extensible isn’t a scalable solution. Built to be developer-first, OneLogin’s API is based on RESTful principles, secured by OAuth 2.0, and provides JSON messages, search, pagination, sorting, and filtering. With OneLogin, you can integrate your custom apps and third-party apps, and extend the system to fit your workflows.OneSpan Mobile Security Suite…
Mobile Security Suite
Natively integrate mobile authentication, mobile application security, and e-signatures, with our ready-to-use suite of SDKs- Mobile Authentication. Combine multiple authentication methods, including the latest biometric authentication
- E-Signatures. Accelerate the customer journey by enabling customers to e-sign documents on any device
- Compliance. Fulfill strict regulatory requirements and prove due diligence to auditors
- Mobile App Security. Take action against growing mobile threats to protect your institution, apps, and users
- Customer Experience. Optimize user experience with transparent mobile app security and the right authentication at the right time
- Streamlined Development. Reduce development cost and time-to-market with a complete set of developer tools
How it Works
Trusted by over half of the world’s top 100 global banks See how financial institutions use OneSpan’s Mobile Security Suite to deliver convenient and secure mobile offerings by natively integrating mobile app security, biometric authentication, e-signatures, and transaction signing into their Android and iOS apps. Phase-out passwords while simplifying and securing the mobile experience Maintain trust without impacting the customer experience through sophisticated mobile app shielding technology, biometric authentication, and the ability to step-up authentication only when necessary. The OneSpan Mobile Security Suite enables this through:- A wide array of authentication methods
- Easy, safe roll-out for multiple users
- Multi-channel authentication via the mobile device
- Online and offline activation options
- Invisible, always-on mobile app security
Openpath Platform…
Powerful and convenient
Openpath’s feature set is robust yet easy to use. Take advantage of cloud-based access control to streamline your administrative tasks across every entry point of all your buildings. Native integrations Connect your access control to the tools you already use. Openpath’s webhooks allow you to easily connect with security, video, and productivity software. Detailed reporting Keep detailed, privacy-compliant logs of each entry, receive real-time notifications from the cloud, and maintain a system of record of who’s coming and going through your buildings. Lockdown Create custom lockdown plans for each location that can be activated remotely in an emergency situation using any method, and notify emergency responders instantly. Security Openpath's cloud-based software is constantly and automatically updated against security threats and vulnerabilities without ever interrupting your workflow. Reduced costs User-friendly and intuitive software eliminates the need for a dedicated administrative person. Cloud-based software means you always have the latest features without the expense of costly upgrades. Scalability With support for unlimited sites, doors, users, roles, and groups, Openpath scales with your business. Cloud architecture provides unparalleled flexibility compared to legacy server systems. Cloud-based ingenuity- Manage from anywhere. Access Openpath’s multi-site management platform on any web-enabled device to easily administer credentials, revoke access, and customize entries across all locations.
- Sync users automatically. Import and update Openpath users using your preferred identity provider, including G Suite, Azure, and Okta.
- Troubleshoot hardware online. Monitor hardware statuses and perform remote diagnostic actions anytime, anywhere.
- Customize users schedules and entry states. Create dynamic permissions schedules for users and groups to limit who has access and when, and configure default entry states to allow specific credential types.
- Granular and site'level permissions. Landlords can share access to common areas while still giving tenants control over their own office access, with instant virtual zoning for fast subleasing turnaround.
Perimeter 81 Zero Trust Network Access…
Fully Customizable, Zero Trust Networking
Perimeter 81’s Zero Trust Network Access it is a suite of networking capabilities service designed to assure the security and integrity of organization’s network. Multi-Regional Deployment Deploy private gateways in different locations to ensure your network can best serve international branches and employees with reduced latency and optimal speed. Policy-Based Segmentation Easily segment network access with our group creation and G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP Identity Provider integration. Built-In Two Factor Verification Add an extra layer of security, prevent remote attacks and ensure regulatory compliance with SMS notifications, Google Authenticator and Duo Security authentication. Precise Split Tunneling Control whether you tunnel all your network traffic, or specific subnets, from our single-click client applications to Perimeter 81’s multi-tenant Network as a Service. Site-to-Site Interconnectivity Interconnect your cloud environments, including AWS, Azure, and Google Cloud, or create a secure communication link between two different networks located at different sites. Network Auditing & Monitoring Gain more insight into your network’s health, activity and security, including visibility into group and server creation, team member authentication, password changes and more. Defining Zero Trust for Your Network- Segment Your Network. Network segmentation allows organizations to define internal trust boundaries to granularly control traffic flow, enable secure network access and implement network monitoring.
- Establish Trust Zones. Trust zones are comprised of distinct pockets of infrastructure where resources operate at the same trust level and similar functionality, minimizing pathways and limiting malicious threats.
- Manage Your Infrastructure. Efficiently monitor the network via centralized management capabilities, allowing data to be processed by tools that may further enhance network visibility, detect unknown threats, or support compliance reporting.
PerimeterX Platform…
Why PerimeterX
Works With Your Existing Infrastructure The cloud-native PerimeterX Platform seamlessly integrates into your existing infrastructure and automatically scales to meet demand — no changes or migration required. Over forty pre-built PerimeterX Enforcer integrations support a wide range of content delivery networks (CDNs), load balancers, web servers and application servers. The out-of-band mode of operation is compatible with any cloud-based, appliance-based or serverless infrastructure. Low Latency Architecture The cloud-native PerimeterX Platform features an out-of-band low latency architecture that preserves your online customer experience without sacrificing page load performance. By leveraging a common JavaScript Sensor and a globally distributed Detector, you can protect your website from multiple security threats and distractions that interfere with your users’ path to purchase and improve operational efficiency. The Detector is replicated on multiple points of presence (PoPs) around the world including the Asia Pacific and European regions to protect applications globally at scale at the edge. Future-proof Application Security The Platform is designed to handle evolving threats and zero-day threats with a lightweight JavaScript Sensor that collects and sends hundreds of client-side signals to the Detector for analysis. The inline Enforcer applies dynamic threat response policies without requiring any analysis on the server side. The out-of-band cloud-based Detector uses over 120 machine learning (ML) algorithms and over 160 ML models to continuously learn new behaviors, detect attacks and apply in-production updates to the Sensor with new intelligence without requiring downtime. Features:- Sensor. The Sensor collects and sends hundreds of client-side indicators and signal to the Detector. These signals are used for validation of human versus bot activity, identification of suspicious script activity and malicious browser extensions to create the device, browser and browser extension fingerprints and script baselines. The same Sensor collects the signals asynchronously for the entire PerimeterX portfolio.
- Detector. The machine learning (ML) based Detector continuously learns the common characteristics of human interactions, correlates it with customer-defined policies and updates the Sensor with new intelligence. The Detector maintains a repository of known attacks, shared with all customers, so malicious actions can be blocked quickly. The Detector frequently updates its data set and augments its ML features based on internal and external data. The Detector processes billions of events every day to provide best-in-class detection.
- Enforcer. The Enforcer is the gatekeeper for threat response policies generated by the Detector. It enriches and mitigates automated traffic according to business needs. The Enforcer also continuously learns and updates the Detector with relevant data. The Enforcer can be deployed inline into any existing web architecture. In the case where there is no requirement for enforcement on the server, the enforcement is done on the client-side.
- Portal. The cloud-based management Portal displays all activity -in real time- including attacks, blocked requests, traffic trends and top threat reports. Manage the configuration and settings for your PerimeterX products from a single pane of glass that features an intuitive admin interface. With it, you can investigate attacks and create custom reports. The portal also supports Security Assertion Markup Language (SAML) authentication, including out-of-the-box integrations with Google and Okta.
Pirean Authenticator…
- Enable passwordless authentication
- View and administer all users and device profiles
- Elevate security with strong authentication methods
- Enable and disable functions within Authenticator as required
- Modify access specific to customers, internal users and partners
- Invite and manage administrators to your Authenticator projects
- Specify the security policy of each service and application being accessed
- Control the appearance and behaviour of Authenticator for each of your security projects
Pradeo Security Systems Mobile Threat Defense…
- Unknown, known and advanced threats detection
- Static and dynamic analysis
- Zero false positive
- Automatic blocking of applications
- Vulnerabilities detection
- Remediation of risky behaviors
- Man In the Middle detection
- Network access control
- SSL certificates check
- Secure browser
- OS vulnerabilities detection
- Root / jailbreak exploitation detection
- Identification of system takeover
- Abnormal battery consumption detection
Prey…
- Advanced Tracking. Monitor your fleet’s location in time, check on your remote workforce’s devices, and delimit Control Zones for on-site devices to detect unwanted movements.
- Reactive Security. Ensure your company is ready to protect devices in movement with automatic triggers that react to theft or movement. Anti-theft will block and track your assets, while our data protection will help save key data.
- Simplified Management. Assign devices to employees, easily group them by usage, hardware, or area, and keep track of any hardware changes or odd behaviors like devices that have been offline for a while.
Privoro Platform…
- ExoComputer. SafeCase trusted hardware is the bedrock foundation for all other features and capabilities. It has been rigorously designed, developed and manufactured to a nation-state threat model across the entire system.
- Mobile hardening. Integrated within the SafeCase are verifiable protections against remote surveillance via the mobile device’s cameras and microphones.
- Policy management. Administrators can monitor SafeCase activity and set and enforce policies (including geofences) for the SafeCase; optional Mobile Device Management (MDM) integrations enable policy enforcement via paired mobile devices.
Prove & Run ProvenVisor…
- Help our customers design/build/develop secure software and/or integrate our COTS,
- Help our customers secure their existing architectures:
- Performing security analyses
- Revamping existing architectures for security with ad-hoc solutions: Secure Boot, secure Over-the-Air firmware update, firewalling, intrusion detection/protection solutions, authentication, secure storage, etc…
PSafe Technology dfndr security…
- Automatically check for viruses and threats. dfndr security detects and removes viruses and other threats from your phone automatically.
- Identity theft monitoring. Have your digital credentials monitored 24/7 and receive alerts in case they get leaked.
- Anti-hacking. Browse safely and receive advanced warnings about potentially infected links and phishing scams.
- Know if your password was leaked. Find out if your personal data such as e-mail address or password was leaked online.
- WhatsApp hacking alert. Be alerted if there is a WhatsApp hacking attempt.
- Quick Cleanup. Quickly clear your cache and remove junk files.
- Applock. Password protect individual apps containing sensitive data.
- Anti-theft protection. Recover your phone and secure its contents if it's lost or stolen.
- Safe app installer. Know if an app is safe to install.
Quadible authentication…
Why Quadible's authentication?
- AI-powered. Innovative AI-powered technology uniquely combines biometrics and behavioural traits
- Continuous authentication. At any point you know who is accessing your system
- Device independent. Your users can setup their profile on one device and keep using it on different devices
- Multi-biometric and behavioural. More than 10 biometrics and behavioural traits work together to authenticate the end-user
- Easy integration. The integration process is a piece of cake with only one line of code and you are ready to go
- User-friendly. Setup with only one selfie or passport; then your end-users do not need to actively do anything.
This is how we can help you
- User authentication. Know at any point that the person interacting with your system is exactly the person that they say they are
- Account sharing. Detect and prevent in real-time when users share their account among each other, reducing risks and data breaches
- Account takeover. Spot immediately when malicious users have taken over the account of your legitimate users, preventing fraud
Relution Mobile Device Management…
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.