Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Android
    • Android
    • Apple
    • Cloud
    • Cybersecurity
    • Innovation
    • IT Management
    • Mobile

    Top Vendors: Mobile Device Security Providers

    Written by

    Samuel Greengard
    Published December 6, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Mobile technology has arrived at the center of the enterprise. Almost every business process, workflow and task intersects with mobility in some way. What’s more, as the internet of things (IoT) takes shape and Industry 4.0 technologies take hold, the need for secure mobile devices and systems grows.

      Protecting devices and data is no simple task, however. Organizations must address an array of issues, including device management, authentication, malware, encryption, data management, wireless protocols, and app security. There are also key issues involving network design and topology.

      Matching an organization’s requirements with mobile security technology is at the center of a more protected enterprise. Here are 10 of the top mobile security vendors—all of which scored high in eWEEK’s estimation. Other sources included IT Business Edge, Gartner Peer Insights, G2 Crowd, GetApp, eSecurity Planet and vendor websites.

      Better Mobile Security

      Headquarters:  New York, NY
      Security solutions: Mobile Threat Defense, EMM/MDM, Mobile Phishing

      Protecting mobile devices, particularly Android phones and tablets, is a serious concern for an enterprise. A device can serve as an entry point for malware or an intrusion. Better Mobile Security offers a suite of products designed to protect devices and networks. Its Mobile Threat Defense solution identifies apps that could leak data or cause a breach. It also spots suspicious links at websites and in messaging apps, detects Wi-Fi hotspots that could lead to a man-in-the-middle attack, and ensures that devices are configured correctly and have the latest security patches installed.

      The EMM/MDM product provides tools for managing devices across an enterprise. This includes deploy, configure and wipe tools. It also includes device authentication and single sign-on (SSO) that links to policy. The company has partnerships with leading tech providers, including Microsoft, IBM, VMware and Citrix. Users report that the solutions deliver strong protection in an easy-to-use package.

      Hexnode

      Headquarters:  Walnut, Calif.
      Security solution: Hexnode MDM

      The company has established itself as a leader in MDM and mobile security by delivering enterprise-level unified endpoint management through a single console. The application spans iOS, Android and Microsoft Windows devices. Key features include summary panes on BYOD and compliance, enrollment and policy shortcuts, an activity feed, user location information and geofencing, remote lock and wipe, remote application installation and configuration, auto compliance, and numerous other device management and mobile security features.

      Users report that the application delivers strong device management and security capabilities. Users rate the solution high for an intuitive and ease-of-use interface, strong built-in controls along with a high level of flexibility, excellent security features, attractive pricing and strong customer support.

      Read user reviews of Hexnode

      Jamf

      Headquarters:  Minneapolis, Minn.
      Security solutions: Jamf Pro, JAMF Now

      The enterprise mobile device management (MDM) solutions, including Jamf Pro and Jamf Now, allow organizations and their IT professionals to deploy, manage and secure Apple devices, including iPads and iPhones. It includes robust asset management tools, network controllers and an array of other tools and services. These include: inventory management, configuration, patch management, controls over features and functions within apps, passcode and fingerprint locks, the ability to assign and reassign licenses over the air, and the ability to download non-authorized apps and data.

      Another powerful and popular feature allows administrators and security teams to create profiles based on groups or teams. Users give the solution high marks for ease-of-use, features, value and customer support.

      Read user reviews of Jamf

      Lookout

      Headquarters: San Francisco, Calif.
      Security solutions: Mobile Endpoint Security, Phishing and Content Protection, App Defense

      Lookout takes aim at device security by focusing on protecting data in a “post-perimeter world.” It adopts a zero-trust approach that spans devices and networks. The vendor focuses on monitoring risk at the endpoint and providing conditional access to data, based on a company’s policies. This helps a business identify and understand the spectrum of mobile risk and devote resources to the task more effectively. The vendor’s products also aid in identifying and blocking malware, eliminating vulnerabilities related to data transfer, and finding behavioral anomalies that can lead to a breach or breakdown.

      Lookout Mobile Endpoint Security identifies devices with out-of-date operating systems, configuration risks and devices that have undergone a “jailbreak.” It addresses network-based risks, including host certificate hijacking, SSLStrip attacks, TLS protocol downloads and Man-in-the-Middle attacks. Users rate the company high for strong security, ease of use and good support.

      Read user reviews of Lookout

      ManageEngine (Zoho Corp.)

      Headquarters: Pleasanton, Calif.
      Security solutions: Mobile Device Manager Plus, AD SelfService Plus

      Mobile Device Manager Plus is a mobile device management solution (MDM) that handles device enrollment, setup, configuration, automation and other tasks for iOS and Android mobile devices. Its app management feature offers control over which apps a user installs and what data they are allowed to send and receive. The solution also delivers specific mobile security features by imposing stringent user passcodes, offering remote locking and wipe capabilities for lost, stolen or compromised devices, and using geofencing.

      Users report that the solution is simple to set up and use, and it offers strong integration and deployment tools. The vendor’s AD SelfService Plus product addresses password reset management, SSO and account lockout issues. Users give the company high marks for service and support.

      Read user reviews of ManageEngine

      MobileIron

      Headquarters: Mountain View, Calif.
      Security solutions: MobileIron Access, MobileIron Application Management, MobileIron Mobile Device Management, MobileIron Threat Defense, MobileIron Secure Mobile Content Management, MobileIron Secure Office 365, MobileIron Unified Endpoint Management

      Workers are increasingly turning to mobile devices to accomplish tasks outside the walls of the enterprise. MobileIron addresses this challenge by delivering an array of products and solutions that focus on protecting and locking down data. This includes MDM, endpoint security, cloud security and threat and malware detection. The vendor’s endpoint solution, for example, provides a console for view devices across iOS, Android and Windows, it separates personal and business information, and it provides tools for managing devices—including provisioning, deprovisioning and remote wipe.

      Enterprise users generally rank the company’s products high for functionality and flexibility. Gartner rates the MobileIron Enterprise Mobility Management Platform a “Customers’ Choice’ for 2018.

      Read user reviews of MobileIron

      Scalefusion (formerly MobiLock Pro)

      Headquarters: Nagar, Pune, India
      Security solutions: MobileLock Pro

      MobiLock Pro delivers a cloud-based MDM solution for Android, iOS and Microsoft devices. It provides a suite of features to manage and control devices—and groups of users—along with commercial and in-house apps. This includes instant updates to devices when making configuration or other changes. Key features include: location tracking, web filtering (blacklisting and whitelisting), asset tracking, network management and device restrictions (including the use of buttons, camera, recording and voice assistants).

      The application also offers a multi-app kiosk mode that allows access to the specific set of apps and restricts access to all other apps. Similarly, it aids in mobile content management by creating a security framework based on specific file formats. Finally, MobiLock Pro addresses remote content copy and deletion tasks. Users report that the application is simple to use and that it performs well.

      Okta

      Headquarters: San Francisco/San Jose, Calif.
      Security solutions: Okta Single Sign-On, Okta Lifecycle Management, Okta Multi-Factor Authentication

      Identity management is a key component of effective mobile security. It allows organizations to manage credentials and simplify IT management within a single sign on (SSO) environment. As the number of devices swell, the need to confirm identities and simplify tasks such as password management becomes more complex. Okta delivers on-demand identity and access management that protects applications and data, on-premises, in devices and in the cloud. This includes products that handle device lifecycle management and multi-factor authentication.

      Users report that the platform offers a high level of scalability and flexibility—with near zero need for customization. They also say that Okta offers excellent value and pricing. The product earned Gartner 2018 Customers’ Choice award.

      Read user reviews of Okta

      Wandera

      Headquarters: San Francisco, Calif.
      Security solutions: Mobile Security, Data Management

      Detecting threats on mobile platforms requires deep visibility into apps, devices and services. Wandera provides insight into various conditions and behaviors, including password leaks, risky hotspots, insecure credentials, sideloaded apps, and outdated versions of apps and operating systems. It also identifies phishing attempts and blocks compromised devices from using outbound connections to send data to intruders.

      The vendor’s data management tool provides security protections through content filtering and enforcing acceptable use policies. Users report that the vendor offers highly effective tools and a strong customer focus.

      Read user reviews of Wandera

      Zimperium

      Headquarters: Dallas, Tx.
      Security solutions: zIPS Device Protection, z3A Advanced App Analysis, zIAP In-app Protection, zANTI Diagnostic

      Zimperium’s Mobile Threat Defense platform delivers a suite of products and tools that address device security, app security and network protection. The zIPS product delivers mobile intrusion prevention for iOS and Android devices. It checks the health of devices by detecting both known and unknown threats using OS statistics, CPU and other system parameters. The z3A tool monitors for app risk across devices and finds code, app behavior and other vulnerabilities that can lead to a breach or breakdown.

      The zIAP product addresses other threats, including authentication requirements, invalidated sessions and logouts, unwanted data residing in caches, potential fraud and managing content, including reducing certain functions to read-only. Enterprise users give the company top grades for implementation, usability and customer support.

      Read user reviews of Zimperium

      Vendor Overview

      Samuel Greengard
      Samuel Greengard
      Samuel Greengard is a business and technology writer based in West Linn, Oregon. He is author of The Internet of Things (MIT Press) and Virtual Reality (MIT Press).

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×