View

Sorting

Products found: 12

logo
Offer a reference bonus
0.00

Better Mobile Security MTD

In order to have effective mobile security, organizations need visibility, to apply policies, and to have a solution that fits cleanly into existing workflows by integrating with existing mobile management and security solutions. How it Works? BETTER Shield (App) Lightweight mobile agent that provides endpoint protection. Deploy it in minutes via EMM. BETTER Console (Web) Streamlined admin console gives immediate visibility, intelligence and control over device risks and threats. The console provides rich information and easy policy management, but our goal is to keep you from ever needing to use it. Deep Thinker (AI) We have built one of the most advanced machine learning platforms and focused it on mobile threat detection. With our global mobile sensor network feeding rich intelligence into Deep Thinker, a cloud-based AI engine, BETTER MTD provides highly accurate detection of risky apps, anomalous behavior, and network threats. Features:
  • Apps. Prevent risky and leaky apps from putting sensitive data at risk with app scanning technology powered by machine learning.
  • Web and Content. Employees are more likely to get phished on their phone than their computer. Protect them from all sources of malicious links (texting, WhatsApp, iMessage, Snapchat, Facebook, etc.)
  • Device / OS. Mobile device OS vulnerabilities must be mitigated. Users need defense against advanced jailbreak attacks and risky device configurations. Get control of device versions, including CVEs based on Android patch levels and iOS versions.
  • Network. Risky Wi-Fi hotspots are everywhere. How do you know if a man-in-the-middle attack is in place? Prevent the full range of advanced network-based threats with detection powered by our cloud-based global visibility.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
11
logo
Offer a reference bonus
0.00

Lookout Mobile Endpoint Security

Many organizations are now embracing the use of smartphones and tablets to increase productivity in the workplace, and as more sensitive data goes mobile, your organization’s security policies must extend to your mobile endpoint devices. Lookout Mobile Endpoint Security makes it easy to get visibility into the entire spectrum of mobile risk, apply policies to measurably reduce that risk, and integrate into your existing security and mobile management solutions. Lookout Mobile Endpoint Security delivers Protection from app-based risks Apps are the predominant way that sensitive data is accessed on mobile devices, with risks spanning across both iOS and Android. Lookout’s app analysis technology is powered by intelligence from over 50 million iOS and Android apps, giving you visibility into app-based risks such as:
  • Trojans and spyware that can exfiltrate data from the device
  • Vulnerabilities in app data transfer and storage
  • Risky app behaviors that pose a compliance risk
  • Sideloaded apps that bypass official app stores
Protection from device-based risks If the device is compromised with software vulnerabilities, the built-in security of the operating system can be bypassed. Lookout creates a fingerprint of each mobile device and compares it against the 170 million devices in our security platform to identify anomalies and risks, such as:
  • Behavioral anomalies
  • Advanced root or jailbreak
  • Out-of-date operating systems
  • Device configuration risks
Protection from network-based risks Often taking the form of a man-in-the-middle attack, these network threats are typically executed by spoofing a Wi-Fi hotspot to intercept network traffic and decrypt sensitive data. By analyzing network connections from our global sensor network, we effectively mitigate false positives while detecting high impact threats, including:
  • Man-in-the-middle attacks
  • Host certificate hijacking
  • SSLStrip attacks
  • TLS protocol downgrades
Protection for corporate data Access to corporate data should be granted based on an assumption of zero trust and the continuous assessment of an endpoint’s health. Lookout Continuous Conditional Access works behind the scenes, dynamically monitoring the health of the endpoint while the user is connected to the enterprise. Lookout allows only trusted devices to connect to enterprise infrastructure and data, for both managed and unmanaged deployments. Protect access to your enterprise when devices are out of compliance due to:
  • Lack of compliance with customizable policies set by MES administrator
  • Device, apps, network, or firmware identified as risky by Lookout Security Cloud
  • Vertical specific risks from apps accessing and sharing regulated content
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
3
logo
Offer a reference bonus
0.00

MobeliIron Threat Defense

What if you could protect your company from data loss in the event of any mobile threat so you are not cleaning up after an attack? In the world of modern work, your users would be delighted and productive, and your organization would be innovating and growing. Organizations are challenged with visibility into malicious threats, meeting compliance and regulatory security guidelines, and lack complete control over employee-owned devices. Users want instant access to corporate data on a device of their choice anytime, anywhere.
With MobileIron Threat Defense you will fully secure both corporate and employee-owned devices so users can be more productive and mobile devices are protected against advanced threats. MobileIron’s non-intrusive approach to securing Android and iOS devices provides comprehensive protection around the clock without impacting the user experience or violating their privacy.
MobileIron Threat Defense delivers unparalleled mobile security that enables enterprises to monitor, manage, and secure devices against mobile – device, network and application (DNA) – cyberattacks. With one application, known and zero-day threats can be stopped on-device, even without network connectivity, before they cause damage. Users are not required to take any action to deploy or activate the application, and they cannot uninstall the protection. There is no disruption to their productivity, and mobile devices are prevented from impacting the corporate network and risking data loss.

Capabilities
For timely detection and remediation of device, network, and app attacks on mobile devices, enterprises can protect their company data with the MobileIron Threat Defense solution.
  • Proactive Detection of Threats and Attacks
Protect your corporate network and data against known and zero-day malicious threats with sophisticated machine learning and behavior-based detection ondevice.
  • Timely Remediation
Limit time of exposure for possible exploitation and stop zero-day attacks with policy-based compliance actions that provide alerts of risky behaviors, proactively shut down attacks on-device without network connectivity required, isolate compromised devices from your network, and remove malicious applications and their content.
  • Greater Visibility
Gain visibility and awareness into device, OS, network, and application risks, and receive actionable information to respond more quickly and effectively to threat vectors.
  • Easy Management
From one application, provide granular policy and compliance actions to easily manage corporate and employee-owned devices with automatic deployment and activation, no user action required.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
13
12
logo
Offer a reference bonus
0.00

MobileIron Access

Protecting your mobile and cloud resources from unauthorized or malicious access is one of the biggest challenges organizations face today — and password-only security is no longer up to the task. In fact, in 2018, stolen user credentials are the top cause of enterprise data breaches. In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to:
  • Establish user trust using multiple factor authentication
  • Correlate user trust with other factors such as endpoint, app, network, and more
  • Apply adaptive, risk-based policies that match the user’s environment
MobileIron Access introduces zero sign-on technology that evaluates a comprehensive set of attributes before granting access to your enterprise resources — without ever requiring a password.

Benefits Zero sign-on Verify critical signals – user, device, apps, networks, and threats – before granting access. Multi-factor authentication Replace expensive and cumbersome hard tokens with a secure MFA solution that’s easy to deploy and use. Secure your cloud Protect access to all of your critical productivity apps and services, including Salesforce, OneDrive, and more. MobileIron Access provides this new security framework so organizations can confidently adopt mobilecloud technologies to drive user productivity while reducing the risk of data breaches.
With capabilities such as multi-factor authentication (MFA), seamless single sign-on (SSO), and an advanced policy engine, organizations have the right security platform to meet the growing information security and compliance requirements.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
9
7
logo
Offer a reference bonus
0.00

MyAUDIT

The use of mobile services is judged by the customer according to what arrives at the end of the device. The satisfaction is determined by the specific expectation and the complex technical interaction of all system components. The OTARIS MyAUDIT App is a solution for the acquisition of Quality of Experience (QoE) and Quality of Service (QoS). The app measures the technical quality with commercial end devices, where and when end users use mobile services: whether at home, in the leisure park, stadium, store or at work. The technical measurement of network and service quality is done passively and in the background. In addition, the MyAUDIT app can also interact with the customer in a parameterized manner and, through targeted questions, capture the perceived quality. The quality is assessed as the customer perceives it directly.

Maximum effectiveness through combination with the ProAUDIT Suite

The conduct of measurement campaigns and audits is supported holistically by the OTARIS ProAUDIT management suite. From the panel management to the individual definition of key performance indicators (KPIs) and the roll-out of the audit to the defined participant groups, the entire workflow of an audit is represented with the suite. The suite supports panel management, provisioning, data collection, analysis and monitoring. With the help of the integrated reporting studio, PowerPoint presentations can be created easily. The suite also includes a module for addressing large customer groups via email or SMS. The acquired qualitative data can, if necessary, be related to company data.

Technical features

The Customer Experience is captured on the customer’s smartphone using the MyAUDIT app. No special hardware is required for this. The customer simply has to install the app and accept the participation. The app is already available from Android Version 2.2. Also for Symbian, BlackBerry and iOS the app is available with a defined functionality. For iOS, only the QoE module is currently available for enterprise use. The MyAUDIT app can be ordered on request with the CI adaptations. In this case, the app is designed according to specifications or the corporate design of the customer. The recorded measurement data is encrypted securely by an asymetric method and sent to the backend via http/s. The data upload takes place in the idle mode of the device and thus does not interfere with normal usage. The APN for the data upload can be configured as required.

Features

  • Telephony (MOC, MTC)
  • Browser Usage
  • App Usage (inter alia YouTube, Facebook, Marketplace oder General Usage)
  • Non Service Related Modul (2/3G und LTE)
  • QoE module
  • User Benefit Module (Speedmeter, App observer, system information)
  • Analyzer (diagnostic Analysis of the hardware)
With the OTARIS MyAUDIT app, the Customer Experience can be easily captured by questionnaires. To do this, the app is configured to respond (trigger) to specific events (time, location, use of a service). Here, usage data, terminal information and network data are collected, aggregated and processed. The collected QoE, QoS and network data can be correlated.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
3
13
logo
Offer a reference bonus
0.00

NowSecure Platform

Scale comprehensive security and privacy testing with automation Continuously test mobile binaries as you build them to keep pace with Agile and DevOps software development timelines. Monitor apps in production to confidently meet rapidly evolving mobile enterprise needs while building bridges across dev, security, GRC and mobile center of excellence (MCOE) teams. Streamline modern testing practices NowSecure Platform is tailored to meet the unique needs and complex infrastructure of the modern mobile SDLC, providing security and privacy testing solutions, including API testing, that are continuous, customizable, and accurate. Maximize visibility across teams with accurate results In one unified approach, test binaries of the apps you build and use, then publish results to the tools that teams know best. Connect directly to mobile app security and privacy experts NowSecure team members help with a broad array of mobile appsec needs, such as mobile app penetration tests, enterprise risk assessments for apps on employee devices, developer training, and more.

One Portal to Ensure the Security and Privacy of Mobile Apps You Build and Use

Automated NowSecure Analysis Engine Enables Accurate, Repeatable Testing Execute rapid automated static, dynamic and interactive analysis of Android (.apk) and iOS (.ipa) binaries on real devices and connected APIs, completing pen testing strength coverage in minutes on pre-prod and/or published apps.
  • Dynamic Binary Analysis
  • Interactive Binary Analysis
  • Static Binary Analysis
  • API Testing
  • CVSS Security Score
  • Compliance Checks
  • Findings Descriptions
  • Remediation Instructions
Plugins for Out-of-the-Box Integrations Integrate with:
  • Popular CI/CD build tools, like Cloudbees Jenkins, Microsoft Azure DevOps, CircleCI and GitLab.
  • Issue tracking systems like Jira.
  • Vulnerability management systems like Brinqa and ThreadFix.
  • MDM/EMM software to continuously monitor app risk and enforce whitelist/blacklist.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
8
logo
Offer a reference bonus
0.00

OneLogin Trusted Experience Platform

Take a leap forward in your digital transformation

The OneLogin Trusted Experience Platform™ is the foundation to build simple and secure experiences between people and technology. Manage and secure digital identities for your workforce and your customers so you can get back to business. CONNECT As organizations grow, the technology puzzle pieces multiply: more apps, users, and devices. OneLogin simplifies identity and access management. ANALYZE In the past year, there has been nearly a twelve-fold increase in the number of cyberattacks using artificial intelligence and machine learning (AI/ML) capabilities. Fight fire with fire. Vigilance AI™ uses AI/ML to gather data across the OneLogin Trusted Experience Platform™ and identify potential threats. ACT Not all login attempts are created equal. SmartFactor Authentication™ offers flexible authentication requirements based on contextual insights, including modular login flows as well as step-up and step-down multi-factor authentication (MFA) requirements. Security when you need it, simplicity when risk is low.

Key OneLogin Trusted Experience Platform™ services

Cloud directory The center of the platform is the OneLogin cloud directory: a single source of truth from which you manage access. No need to rip and replace your current directories. OneLogin’s pre-built integrations work seamlessly with your existing on-prem and cloud directories, like Microsoft Active Directory, LDAP, Workday, and more. Single Sign-On OneLogin’s Single Sign-on (SSO) platform gives users one-click access to all their apps, in the cloud or behind the firewall, anywhere and anytime. With an extensive app catalog and a secure portal, users can always see and access their apps. OneLogin Desktop extends SSO to MacOS or Windows machines. OneLogin Access extends identity management to legacy apps on-prem and hosted remotely. Authentication It’s all about secure authentication. OneLogin adds multi-factor authentication (MFA). Implement personal security questions, biometrics, OTP, pins, and more. You define the rules, OneLogin enforces them. OneLogin’s SmartFactor Authentication uses machine learning for state-of-the-art MFA. It takes context into account, like location, IP addresses, and time of day, to identify and challenge abnormal login attempts. Identity and lifecycle management With OneLogin’s identity management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchronization. Streamline entitlements through powerful rules to enforce intelligent access policies based on user location, role, privilege level, and more. Reporting and intelligence Stay compliant with sophisticated reporting and a centralized audit trail. The information you need to meet compliance requirements or assess cyber threats is at your fingertips. No more coordinating with multiple systems and people for reports. OneLogin’s dashboard is supplemented by a state-of-the-art reporting engine for drilling down to users, apps, and events. Developer tools An identity solution that isn’t extensible isn’t a scalable solution. Built to be developer-first, OneLogin’s API is based on RESTful principles, secured by OAuth 2.0, and provides JSON messages, search, pagination, sorting, and filtering. With OneLogin, you can integrate your custom apps and third-party apps, and extend the system to fit your workflows.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
4
5
logo
Offer a reference bonus
0.00

OneSpan Mobile Security Suite

Mobile Security Suite

Natively integrate mobile authentication, mobile application security, and e-signatures, with our ready-to-use suite of SDKs
  • Mobile Authentication. Combine multiple authentication methods, including the latest biometric authentication
  • E-Signatures. Accelerate the customer journey by enabling customers to e-sign documents on any device
  • Compliance. Fulfill strict regulatory requirements and prove due diligence to auditors
  • Mobile App Security. Take action against growing mobile threats to protect your institution, apps, and users
  • Customer Experience. Optimize user experience with transparent mobile app security and the right authentication at the right time
  • Streamlined Development. Reduce development cost and time-to-market with a complete set of developer tools

How it Works

Trusted by over half of the world’s top 100 global banks See how financial institutions use OneSpan’s Mobile Security Suite to deliver convenient and secure mobile offerings by natively integrating mobile app security, biometric authentication, e-signatures, and transaction signing into their Android and iOS apps. Phase-out passwords while simplifying and securing the mobile experience Maintain trust without impacting the customer experience through sophisticated mobile app shielding technology, biometric authentication, and the ability to step-up authentication only when necessary. The OneSpan Mobile Security Suite enables this through:
  • A wide array of authentication methods
  • Easy, safe roll-out for multiple users
  • Multi-channel authentication via the mobile device
  • Online and offline activation options
  • Invisible, always-on mobile app security
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
0
logo
Offer a reference bonus
0.00

Openpath Platform

Powerful and convenient

Openpath’s feature set is robust yet easy to use. Take advantage of cloud-based access control to streamline your administrative tasks across every entry point of all your buildings. Native integrations Connect your access control to the tools you already use. Openpath’s webhooks allow you to easily connect with security, video, and productivity software. Detailed reporting Keep detailed, privacy-compliant logs of each entry, receive real-time notifications from the cloud, and maintain a system of record of who’s coming and going through your buildings. Lockdown Create custom lockdown plans for each location that can be activated remotely in an emergency situation using any method, and notify emergency responders instantly. Security Openpath's cloud-based software is constantly and automatically updated against security threats and vulnerabilities without ever interrupting your workflow. Reduced costs User-friendly and intuitive software eliminates the need for a dedicated administrative person. Cloud-based software means you always have the latest features without the expense of costly upgrades. Scalability With support for unlimited sites, doors, users, roles, and groups, Openpath scales with your business. Cloud architecture provides unparalleled flexibility compared to legacy server systems. Cloud-based ingenuity
  • Manage from anywhere. Access Openpath’s multi-site management platform on any web-enabled device to easily administer credentials, revoke access, and customize entries across all locations.
  • Sync users automatically. Import and update Openpath users using your preferred identity provider, including G Suite, Azure, and Okta.
  • Troubleshoot hardware online. Monitor hardware statuses and perform remote diagnostic actions anytime, anywhere.
  • Customize users schedules and entry states. Create dynamic permissions schedules for users and groups to limit who has access and when, and configure default entry states to allow specific credential types.
  • Granular and site'level permissions. Landlords can share access to common areas while still giving tenants control over their own office access, with instant virtual zoning for fast subleasing turnaround.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
12
1
logo
Offer a reference bonus
0.00

Pradeo Security Systems Mobile Threat Defense

Pradeo developed an advanced Artificial Intelligence process delivering the most accurate threat detection technology of the market. Through the years, the Pradeo intelligence center has collected billions of mobile security data, implemented thousands of security rules and detected millions of severe mobile threats and billions of leaky behaviors. APPLICATION SECURITY Most mobile threats do not have viral signatures. In order to detect and prevent zero-day attacks, Pradeo’s mobile application scanning capability accurately identifies all mobile applications behaviors and vulnerabilities. Then, it contextualizes information to avoid false-positive alerts and only blocks applications that represent a real threat. Key Features:
  • Unknown, known and advanced threats detection
  • Static and dynamic analysis
  • Zero false positive
  • Automatic blocking of applications
  • Vulnerabilities detection
  • Remediation of risky behaviors
NETWORK SECURITY As the amount of public hotspots keeps increasing and people tend to connect to several ones a day, Pradeo Security screens in real-time network configuration and parameters. As a result, it prevents network-related attacks such as Man-In-The-Middle. Key Features:
  • Man In the Middle detection
  • Network access control
  • SSL certificates check
  • Secure browser
DEVICE SECURITY A device that is jailbroken, rooted, running on an outdated operating system, etc. is vulnerable to device-related attacks and thus, represents a security flaw in the mobile chain. Pradeo Security monitors device integrity by inspecting all its potentially defective aspects. Key Features:
  • OS vulnerabilities detection
  • Root / jailbreak exploitation detection
  • Identification of system takeover
  • Abnormal battery consumption detection
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
15
10
logo
Offer a reference bonus
0.00

XTN Mobile Operative Risk Evaluator

MORE® is a “plug & play” solution able to know if a transaction was securely executed and if the users really are who they say they are, providing stronger identification of advanced cyber attacks; it is capable of analyzing whether a device is compromised and can correlate its behavioural and biometric analysis with the user’s business and multi-device data (if the customer uses multiple devices to interact with the service) in order to provide a wider, more sophisticated range of protection. MORE® is composed of a cloud-based, server-side component, and a library (SDK). These two elements exchange data in order to evaluate risks with the aim of identifying suspicious or malicious behaviour correlated to a misuse of a device or to user profiling anomalies. Thanks to biometric probes and user-based behavioural analyses, together with a set of specifically developed controls, MORE® is able to evaluate and identify operative risks. The collected information is securely sent to the backend and processed by the core engine that applies behavioural analyses. By continuously profiling users across layers, MORE® identifies anomalies, risks and fraud attempts, using invisible technologies which can indicate abuse or system-compromise. Key Benefits: Mobile threat prevention Enforcement through a Dynamic Policy-Driven Mobile App which reports the current threat level in real-time. Sensitive data protection A vulnerable app can be used as a vector of cyber-attacks that can negatively affect the adoption and/or user acceptance of the app. MORE® mitigates this risk. Reducing risks Reducing costs by reducing the risk of mobile threats consequences (reputational, business and sensitive data loss incidents). Monitoring MORE® monitors and identifies mobile threats, allowing the customer to take countermeasures that really matter. Easy and fast implementation Thanks to SaaS delivery MORE® provides up-front and predefined costs, shortened implementation lead times and a scalable architecture. MORE® is a risk score solution which uses biometric probes as a tool for verifying identities in an interconnected business security environment. Sensors in MORE® are focused on identifying the user’s behaviour. No sensitive data is handled on the device itself and user recognition occurs by cross-referencing different information from the device, the environment and user’s habits. Feature
  • Web Console with dashboard and analysis tool
  • Behavioral Risk Engine
  • Business Transaction Monitoring Engine
  • APIs for backend integration
  • Lightweight SDK for the main mobile platforms
... Learn more
-
ROI-calculator
Configurator
ROI-
-
7
0
logo
Offer a reference bonus
0.00

Zimperium's zIPS

Zimperium’s zIPS™ is the world’s first mobile intrusion prevention system app that provides comprehensive protection for iOS and Android devices against mobile network, device and application cyber attacks. Security health checks for mobile devices Much like a doctor can diagnose an illness by analyzing the symptoms your body is exhibiting, zIPS™ can detect both known and unknown threats by analyzing the behavior of your mobile device. By analyzing slight deviations to the mobile device’s operating system’s statistics, memory, CPU and other system parameters, z9™ detection engine can accurately identify not only the specific type of malicious attack, but also the forensics associated with the who, what, where, when, and how of an attack occurrence. Zimperium developed the innovative and award-winning z9™ engine by training it over many years on proprietary machine-learning algorithms that distinguish normal from malicious behavior on Android and iOS devices. Unlike cloud-based mobile security solutions that employ app sandboxing or tunnel traffic through the cloud, the z9™ engine sits directly on the mobile devices within the zIPS™ app, in order to provide complete protection around the clock. Zimperium's zIPS functions:
  • Detect. Uses the on-device z9™ detection engine to monitor the whole device for malicious behavior, and to dynamically detect known and unknown threats in real time
  • Analyze. Leverages machine learning to analyze deviations to device behavior and make determinations about indicators of compromise to accurately identify specific types of attacks and classify zero-day attacks
  • Remediate. Implements quick incident-response recommendations and decisions when malicious activity is discovered
Mobile Vulnerability Management To address enterprise-specific mobile security vulnerabilities, Zimperium also provides a risk-based approach to mobile security management. View. Enable Security Administrators to continuously monitor and manage the health of all mobile devices from a real-time threat dashboard with the ability to trigger automated response. Understand. Unmatched network, device and malware forensics data lets security administrators view and understand each mobile security incident, including the who, what, where, when and how of an occurrence. Enforce. Define and enact risk-based policies to continuously protect your organization from mobile attacks.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
12
10

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.