+
+

Related Products

  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • DataDome
    223 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • Iru
    1,470 Ratings
    Visit Website
  • Jscrambler
    33 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website

About

Enterprises face growing threats from malicious Wi-Fi hotspots and millions of apps on employee-owned devices. These apps can include malware and “riskware” – apps that might not be overtly malicious but exhibit behavior that puts enterprise data at risk. Enterprises face growing threats from malicious Wi-Fi hotspots and millions of apps on employee-owned devices. These apps can include malware and “riskware” – apps that might not be overtly malicious but exhibit behavior that puts enterprise data at risk. Together, these threats expose enterprise users to data leakage, credential theft, and the exfiltration of private information that can be used to target specific employees in advanced attacks. Enterprise users casually access Wi-Fi hotspots and give these riskware apps sweeping permissions, not realizing that their personal and corporate data may be sent to remote servers and advertising networks all over the world, where it can be mined by cyber criminals.

About

Use iVerify to manage the security of your iOS device and detect modifications to your smartphone. iVerify makes it easy to manage the security of your accounts and online presence with simple instructional guides. Stay ahead of vulnerabilities by securing your team’s mobile devices, metrics allow you to see completion of security guides, up-to-date OS, signs of compromise, and more. iVerify helps you keep your devices and online accounts secure from vulnerabilities and it detects compromise by monitoring for signs that iOS security has been degraded by an exploit and by checking for known bad files and folders. It detects most cases of compromise but cannot detect all of them. It's still important to limit your exposure to attacks and limit the sensitive data available on your phone and online accounts.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT professionals and anyone searching for a solution to optimize their security

Audience

Anyone looking for an enterprise mobile security solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$3 per user per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Proofpoint
Founded: 2002
United States
www.proofpoint.com/us/resources/datasheets/mobile-defense

Company Information

iVerify
United States
www.iverify.io

Alternatives

Alternatives

Harmony Mobile

Harmony Mobile

Check Point
Certo Mobile Security

Certo Mobile Security

Certo Software
RiskWare

RiskWare

PAN Software

Categories

Categories

Application Security Features

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Okta

Integrations

Okta
Claim Proofpoint Mobile Defense and update features and information
Claim Proofpoint Mobile Defense and update features and information
Claim iVerify and update features and information
Claim iVerify and update features and information