+

Related Products

  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • Jscrambler
    38 Ratings
    Visit Website
  • Omnilert
    26 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website

About

Threat defense tools that use a mix of vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling and transport security technologies to help defend mobile devices and applications from advanced threats. Mobile devices are more than just small computers in continuous use with perpetual connections to the Internet. The operating paradigm of these devices calls for new approaches to help ensure the data processed by them remains secure while maintaining productivity. Symantec designed the risk-based mobile security approach in Mobile Threat Defense from the ground up to defend against all detected threats that put business data at risk of exposure, theft, and manipulation while respecting users’ need for privacy, productivity, and a great mobile experience. Detect the most threats with on-device and in-cloud machine learning elements. Benefit from real-time processing, detection, and protection–at scale.

About

Zimperium Mobile Threat Defense (MTD) – formerly known as zIPS- is a privacy-first mobile security solution that provides comprehensive mobile security for organizations. Zimperium protects an employee’s corporate-owned or BYOD from advanced persistent threats without sacrificing privacy or personal data. Zimperium MTD can help organizations identify which mobile devices have risky or banned apps by pinpointing what servers these apps are connecting to and blocking these apps and browsers from sending data off the device to the domains to which the app connects. By leveraging zero-touch activation, Zimperium MTD can automatically enforce conditional access controls as part of a zero-trust strategy, which prevents the use of enterprise apps and access to sensitive corporate data while these banned apps are installed.

About

Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end-user has a seamless experience when accessing their corporate data and personal apps. Our zero-trust philosophy ensures personal data protection is not bypassed while protecting the enterprise. Ijura Enterprise has 3 patents pending pertaining to securing any connected device through the telecom operator's endpoints by directly integrating with an operator through its data servers. Ijura Enterprise inspects every data packet for various vulnerabilities such as phishing, malware, botnets, etc.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and individuals seeking a software solution to predict, detect, and prevent mobile cyber attacks

Audience

Enterprise organizations interested in a machine learning-based, on-device mobile security application solution

Audience

Enterprises in need of a cloud-deployed solution to protect end-user devices and IoT in the data network

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/info/endpoint-security/protection-mobile

Company Information

Zimperium
Founded: 2010
United States
www.zimperium.com/mtd/

Company Information

ijura
Founded: 2017
United States
www.ijura.com

Alternatives

CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Alternatives

Alternatives

zDefend

zDefend

ZIMPERIUM
zDefend

zDefend

ZIMPERIUM
BETTER Mobile

BETTER Mobile

Better Mobile Security
Zimperium MAPS

Zimperium MAPS

Zimperium

Categories

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IoT Features

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

Integrations

Amazon Web Services (AWS)
BlackBerry Access
Citrix Endpoint Management
Facebook
Google
IBM MaaS360
Jamf Now
LinkedIn
Microsoft 365
Microsoft Azure
Microsoft Intune
Pinterest
SOTI MobiControl
Salesforce
Symantec Advanced Threat Protection
Symantec Web Security Service
VMware Cloud
Workspace ONE
X (Twitter)
YouTube

Integrations

Amazon Web Services (AWS)
BlackBerry Access
Citrix Endpoint Management
Facebook
Google
IBM MaaS360
Jamf Now
LinkedIn
Microsoft 365
Microsoft Azure
Microsoft Intune
Pinterest
SOTI MobiControl
Salesforce
Symantec Advanced Threat Protection
Symantec Web Security Service
VMware Cloud
Workspace ONE
X (Twitter)
YouTube

Integrations

Amazon Web Services (AWS)
BlackBerry Access
Citrix Endpoint Management
Facebook
Google
IBM MaaS360
Jamf Now
LinkedIn
Microsoft 365
Microsoft Azure
Microsoft Intune
Pinterest
SOTI MobiControl
Salesforce
Symantec Advanced Threat Protection
Symantec Web Security Service
VMware Cloud
Workspace ONE
X (Twitter)
YouTube
Claim Symantec Endpoint Protection Mobile and update features and information
Claim Symantec Endpoint Protection Mobile and update features and information
Claim Zimperium Mobile Threat Defense (MTD) and update features and information
Claim Zimperium Mobile Threat Defense (MTD) and update features and information
Claim ijura and update features and information
Claim ijura and update features and information