Best IT Security Apps for iPad - Page 14

Compare the Top IT Security Apps for iPad as of November 2025 - Page 14

  • 1
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this, Identité™ has introduced its NoPass™ Employee MFA solution, a lightweight feature that enhances the overall security and is adaptable with the leading authentication protocols that are in the market.
    Starting Price: $2
  • 2
    Privakey

    Privakey

    Privakey

    Privakey’s transaction intent verification provides a secure channel to streamline high risk exchanges between services and their users. Now available as a cloud service. Fraud is everywhere yet so is your competition. Enterprises are constantly seeking to delight their customers while balancing experience and security. It’s a challenging problem that’s getting tougher every year. So how can you securely engage with your customers, and gain their trust of you during sensitive exchanges, in a way that doesn’t add frustration to the process? The answer is Privakey. Transaction intent verification (TIV) is the combination of strong identity assurance and contextual response into one intuitive user experience. Common examples of TIV include payment confirmations, wire transfer approvals and account update acknowledgements. Our solution utilizes asymmetric cryptography, mobile biometrics and secure notifications to ensure the integrity of every exchange.
  • 3
    Belkasoft Remote Acquisition
    Belkasoft Remote Acquisition (Belkasoft R) is a new digital forensic and incident response tool developed specifically for remote extraction of hard and removable drives, RAM, connected mobile devices, and even specific types of data. Belkasoft R will be useful in cases when an incident response analyst or a digital forensic investigator needs to gather evidence quickly and the devices in question are situated in geographically distributed locations. With Belkasoft R, there is no longer need to interrupt an employees' daily routine or draw excessive attention to your investigation. Belkasoft R saves your time and money doing a forensically sound remote acquisitions: no more excessive costs and extra time for travels. No more geographical challenges and expensive trips. No need in having trained specialists in all locations of your organization’s offices.
  • 4
    ImageWare CloudID
    ImageWare CloudID® is a highly modular, software platform that enabled rapid development and deployment of highly secure, yet flexible biometric identity management solutions. ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures. Two innovations differentiate this biometric identity platform, virtually any biometric modality and algorithm from any vendor can be quickly incorporated into the system, and the system can be easily scaled to satisfy the requirements of small organizations or entire counties, providing ultra-scalable real-time solutions. ImageWare CloudID’s server platform is a set of configurable, server-based software modules designed to add or enhance biometric identity management and credential issuance capabilities to existing applications or support the development of these capabilities in new end-to-end applications.
  • 5
    PXL Vision

    PXL Vision

    PXL Vision

    PXL Vision revolutionizes digital identity verification, automating customer onboarding and KYC processes to increase conversion rates. As the Swiss market leader for digital identity verification, our flexible solutions utilize efficient, AI-based ID checks as a SaaS or on-premise solutions. With our patented technologies, we ensure fast, reliable, and user-friendly identification processes that seamlessly integrate into existing workflows. Our Auto-ID adapts to various customer needs, offering customizable deployment, branding options, and security levels. Since 2017, we have empowered numerous partners and customers to save costs, boost revenue, and enhance user experience.
  • 6
    Regula

    Regula

    Regula

    Regula is a global developer of forensic devices and identity verification solutions. With 30+ years of experience in forensic research and the largest library of document templates in the world, Regula creates breakthrough technologies in document and biometric verification. Regula hardware and software solutions allow over 1,000 organizations and 80 border control authorities globally to provide top-notch client service without compromising safety, security or speed.
  • 7
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 8
    FaceTec

    FaceTec

    FaceTec

    The FaceTec interface makes 3D Liveness Detection and 3D Face Matching fast, easy, and incredibly secure for everyone, regardless of their device. During onboarding, FaceTec’s two-second video-selfie verifies 3D liveness, matches the user’s 3D Face to their Photo ID, OCRs the text on their ID, and sets up their new account. Every time they return, FaceTec’s ongoing user authentication again proves 3D Liveness and compares their new 3D FaceMap to the one stored from onboarding. If they match, they get instant access; no password required! Login from any smartphone, tablet, PC or Laptop, and unlock everything from your car door to your bank account. Real users gain access easily, but bad actors, bots and hackers are rebuffed by level 1&2 anti-spoofing certified by NIST/NVLAP. FaceTec is the 3D face matching market leader and provides more security, flexibility, and convenience than any other biometric modality.
  • 9
    Smart Eye Technology

    Smart Eye Technology

    Smart Eye Technology

    Smart Eye Technology protects businesses that share highly sensitive files such as financials, legal contracts, wiring instructions, employee information, new innovation ideas, and more. Whether sharing internally with employees – working on-site or remotely, or externally with vendors or customers, Smart Eye Technology provides unprecedented data and information security. Fraudsters impersonating vendors are requesting wiring changes through email costing businesses upwards of 500 billion dollars a year. Our enterprise-level private communication platform only allows those companies you approve of to send or receive files from your organization. This puts an end to fraudulent wire changes sent by unapproved individuals or companies, saving your organization thousands of dollars. No matter what size your organization is, intellectual property is your most valuable asset.
  • 10
    CleanBrowsing

    CleanBrowsing

    CleanBrowsing

    A modernized approach to DNS-based content filtering and security. Easily decide what should, and should not, be allowed on your internet. Effective for our kids, powerful for our business. CleanBrowsing is a DNS-based content filtering service that offers a safe way to browse the web without surprises. It intercepts domain requests and filter sites that should be blocked, based on your filtering needs. Our, free, family filter, for example, blocks porn, obscene, and adult content, while still allowing Google, Youtube, Bing, DuckDuckGo and the rest of the web to load safely. Our free filters are comprised of three predefined filters for global consumption (Security, Adult, and Family). The Family filter blocks adult / obscene content and applies Safe Search filters to Google, Bing, Yandex, etc. The security filter, however, only focuses on restricting access to malicious activity.
    Starting Price: $59.99
  • 11
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked.
  • 12
    Sophos Intercept X for Mobile
    Intercept X for Mobile protects users, their devices, and corporate data from known and never-before-seen mobile threats by leveraging our market leading Intercept X deep learning engine. It is all managed seamlessly through Sophos Central, alongside the entire Sophos portfolio of next-generation cybersecurity solutions. Sophos Intercept X for Mobile continuously monitors device health and notifies you if a device is compromised so you can take remediating action or automatically revoke access to corporate resources. Device security advisors detect jailbreaking or rooting and can inform the user and admin of necessary operating system updates. Establish a first line of defense at the mobile network level on Android and iOS. Network connections are examined in real time to check for suspicious characteristics that may identify an attack. This helps mitigate the risk of Man-in-the-Middle (MitM) attacks. Web filtering and URL checking stops access to known bad sites on mobile devices.
  • 13
    Traced Trustd MTD
    Traced Trustd MTD for businesses delivers groundbreaking MTD (mobile threat defense) that gives you immediate visibility and analysis of mobile threats. Every personal and business-owned mobile device is a gateway to business data and a route to your network. The Traced app protects your mobile devices and Traced Trustd MTD gives your IT and security teams the tools they need to protect your business. Traced protects employee devices from application, network and device-based threats including malware, phishing, rogue WiFi, unauthorized screen, camera and microphone access, permissions abuse and device exploits. The Traced Deep Learning engine detects both known and unknown malicious apps and provides you with crucial information for your analysis, investigation and response. WiFi protection alerts both the device and in Traced Trustd MTD when a user connects to a compromised or insecure WiFi network.
    Starting Price: £9/device/year
  • 14
    Comodo Antivirus
    Complete protection for all of your devices at only $29.99 per device includes an award-winning firewall, host intrusion prevention, sandbox for untrusted software, anti-malware, and buffer overflow protection to tackle today’s diverse threats. Simply put, our antivirus program has everything you and your family need to safely browse the internet and use your device. Our free download offers basic protection for your PC but depending on your needs, that may not be enough. Complete Antivirus actively protects you while you shop online, offers web filtering and unlimited product support! We are offering the best value on the market because we strongly believe in creating a cyber-safe environment for everyone. We are a company that develops the most advanced cyber-security solutions for enterprise businesses, and we use that same technology to protect homes across the world with Comodo Antivirus.
    Starting Price: $29.99 per year
  • 15
    PrivacyGuard

    PrivacyGuard

    PrivacyGuard

    PrivacyGuard is an identity monitoring service that can help you maintain control over your most valuable credit and identity information.
    Starting Price: $19.99 per month
  • 16
    Modiverse
    Modiverse is a mobile device management platform which provides a web based managemant portal and a mobile application. You can securely manage your devices by defining user-profile based rules, configurations and definitions. Modiverse is a cloud based enterprise-grade mobile device management platform. It provides services for full customization of a mobile device based on the enterprise needs. Our platform turns an Android device into a mobile device dedicated to business needs instead of personal devices. which enables verticalization based on business needs and use cases. Our platform turns Android devices into a piece of hardware to serve by any varieties and aid the owner the way they need. Essential and Basic packages run functionalities through the Modiverse application installed on the mobile device. You can control any Android or iOS mobile devices. Advanced package offers deep security functionalities from hardware to the application with our software agent .
    Starting Price: $1.5 per month
  • 17
    Alviere Hive
    Alviere’s embedded finance platform allows any organization to seamlessly integrate financial products and services into their existing offerings, and provide customers and partners with the most comprehensive embedded financial solution on the market. Alviere’s platform offers an extensive range of customizable branded products and services that include FDIC-insured virtual accounts and physical card issuing, payments, digital global money transfers, and crypto/web3 products, all through one API integration. Alviere is a fully licensed and regulated financial institution, and provides comprehensive compliance, risk management, fraud/AML montioring and security to ensure long-term program success.
    Starting Price: $0
  • 18
    Revoke

    Revoke

    Revoke

    We take your – and your customer’s – security very seriously, and go to great lengths to ensure privacy principles are maintained at all times. Communications are secured using advanced military grade encryption, ensuring that data remains inaccessible and unreadable by anybody except the intended recipient. As decryption of personal data can only occur through the secure key held on your customer’s mobile phone, the only person who will see any personal data you return, will be that customer. White-label data protection app for your customers. Data breach notifications for staff and customers Easy setup – no requirement for IT integration. Boost your reputation as a secure and ethical custodian of your customer data. Foster a positive reputation for ethical data management and transparency with your customers. Stop holding priceless customer data in insecure plain text.
  • 19
    Global Ledger

    Global Ledger

    Global Ledger

    The Global Ledger is a blockchain analytics company and crypto AML compliance toolset that allows government agencies, banks, fintech companies, and crypto startups to access AML risk assessment, surveillance, and investigations for blockchain-based assets. Global Ledger collaborates with organizations such as the UN Office on Drugs and Crime, The Global Coalition to Fight Financial Crime, and Ukrainian, Estonian, and Swedish government agencies to track blockchain transactions and combat illicit activities, including war financing and terrorist funding.
  • 20
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 21
    Cybrary

    Cybrary

    Cybrary

    Hands-on experiences to gain real-world skills. Guided career paths and role-based learning. Industry certification courses with practice tests. Dedicated mentors and professional networking. Cybrary is the fastest growing, fastest-moving catalog in the industry. By working with an elite community of instructors, experts, and thought leaders, as well as cutting edge hands-on learning providers, we deliver relevant and high-quality content that is accessible anytime, anywhere. Hands-on learning experiences provide the most engaging and effective way to learn real-world concepts and skills that you need to be successful. We build and aggregate over 1,000 secure, browser-based virtual labs, practice tests, and assessments in fields such as cybersecurity, IT, cloud technologies, data science, and more. Prepare for in-demand industry certifications with courses, virtual labs, and practice tests tied directly to the exam’s learning objectives.
    Starting Price: $19 per month
  • 22
    EnQualify
    EnQualify is a digital ID verification product, empowered by state-of-the-art ‘AI on Mobile’ technology. It redefines identity verification by seamlessly integrating advanced features. With a fully automated all-in-one KYC/KYB platform, it eliminates the hassles of traditional verification processes, offering businesses and individuals a seamless and secure way to verify identities anytime, anywhere. EnQualify completes identity verification, facial recognition, and liveness detection all within 5 seconds. AI-driven, self-service KYC solutions instantly detect and prevent deepfakes, ensuring businesses stay secure and compliant. With decentralized technology, EnQualify enhances security, speeds up validation processes, and gives individuals control over their personal data. Additionally, EnQualify's cutting-edge Virtual Audio Assistance revolutionizes the user experience of digital ID verification.
  • 23
    NordLayer

    NordLayer

    Nord Security

    NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. We help organizations of all sizes to fulfill scaling and integration challenges when building a modern secure remote access solution within an ever-evolving SASE framework. Quick and easy to integrate with existing infrastructure, hardware-free, and designed with ease of scale in mind, NordLayer meets the varying growth pace and ad-hoc cybersecurity requirements of agile businesses and distributed workforces today
    Starting Price: $8 per user per month
  • 24
    Cyclonis Password Manager
    Store all your passwords in one place and sync them across multiple devices. Log into your favorite websites automatically and fill in long and complicated online forms in a matter of clicks. Encrypt your passwords in your vault with 256-bit Advanced Encryption Standard (AES). Our goal is to help you manage your many website account passwords and other sensitive data while also keeping your data organized and accessible. Along with an encrypted vault that stores all your personal, payment, and login information, Cyclonis Password Manager gives you a helpful estimate of the strength and complexity of your passwords. Last but not least, it saves you precious time by working directly in your browser to let you access your data and log in to your website accounts whenever you need. To access your data, you just need your master password, it’s the key to unlocking all your stored website accounts.
    Starting Price: $3 per month
  • 25
    Avira Free Antivirus
    We offer ultra-light virus definition updates, with a footprint so small it doesn’t slow you down and hog your system’s resources. Avira is a member of IT Security Made in Germany, synonymous with quality and respect for your privacy. We don’t monitor what you do nor share your private info with 3rd parties. To stay ahead, our multi-layered security harnesses the power of cloud technology, machine learning, and artificial intelligence. And as all the analysis happens on our end, you get top protection with minimal system impact. Unlike most security vendors, Avira doesn't sell your data and never will. Nor do we share your data with 3rd parties such as government, Big Tech or advertising networks. Visiting websites and downloading files makes your computer or mobile device vulnerable to threats and attacks. Download free antivirus software for real-time protection. With Avira’s award-winning virus protection, hackers don’t stand a chance.
  • 26
    Quick Heal

    Quick Heal

    Quick Heal

    Quick Heal Technologies Ltd. is one of the leading IT security solutions companies. The solutions are well-integrated systems that simplify IT security management across the length and depth of devices and on multiple platforms. Over a span of 26 years the company's R&D has focused on computer and network security solutions. The current portfolio of cloud-based security and advanced machine learning-enabled solutions to stop threats, attacks and malicious traffic before it strikes. This considerably reduces the system resource usage. The security solutions are indigenously developed in India. Quick Heal Antivirus Solutions, Quick Heal Scan Engine and the entire range of Quick Heal products are proprietary items of Quick Heal Technologies Ltd. With our continuous innovation and simplicity, we are redefining enterprise IT security. Introducing Seqrite, our enterprise security portfolio's new identity.
  • 27
    NETGEAR Insight

    NETGEAR Insight

    NETGEAR Insight

    NETGEAR Insight is your gateway to easy networking and advanced services. Whether it's content filtering, business VPN or instant captive portal get the most of your network in the simplest and fastest way. Secure data traffic between work-from-home employees or between business locations, so that no unauthorized access can obtain your company’s information on Orbi Pro (SXK80, SXK50, SXK30). Insight business VPN seamlessly provides work-from-home employees the same network access and experience compared to while they are in office. For IT managers and MSPs, network management and configurations are handled easily with features including administering VPN access on a group level, managing VPN access for users or business sites and receiving reports and notifications on VPN downtime. Block access to undesirable and malicious websites may decrease work efficiency and be a threat to wired and wireless networks.
    Starting Price: $9.99 per year
  • 28
    Z1 SecureMail Gateway
    25% of the 100 German companies with the highest turnover choose Zertificon. Z1 SecureMail Gateway is our highly automated Enterprise Email Encryption solution for effortless, secure communications with anyone, anywhere. Your entire organization encrypts and decrypts, just as well manages & verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires minimal maintenance. And the browser-based admin interface needs no special skills. Keys are managed automatically & central policies enforce security. Integration is fast into your Cloud or On-premises email infrastructure. Your workflows and business are uninterrupted — no employee training needed plus frictionless experience for recipients. With Z1 SecureMail Gateway, encryption is centrally configurable and proofed against human error. You easily achieve and maintain compliance and the highest security standards. You also own all encryption keys and attain German-engineered data sovereignty with no backdoors.
    Starting Price: from $ 1.50 per user/per month
  • 29
    C2 Password

    C2 Password

    Synology C2

    Store passwords and other sensitive data such as addresses, banking information, and passport details while keeping everything organized through categories, tags, and favorites. Automatically generate and securely store passwords to simplify credential management across all your devices. Check the strength of passwords as you create them or let C2 Password generate complex combinations of letters, numbers, and symbols for you. Always have your credentials on hand when you need them, no matter what device you're using. Add items on one device and access them from anywhere through handy mobile apps, convenient browser extensions, or the C2 Password website. Easily share passwords and other items with family members, friends, and colleagues by inviting them to a shared vault via email. Items stored in each user’s personal vault are kept private. Send files securely to others by requiring authentication from the receiver, adding text or image watermarks.
    Starting Price: $4.99 per year
  • 30
    Arcules

    Arcules

    Arcules

    Arcules is the intuitive, cloud-based platform that unifies and makes sense of the data from your surveillance system for security and beyond. We are device-agnostic with a simple plug-and-play experience that sets up in minutes, saving both time and money while providing the flexibility to adapt as your business grows. Arcules is constantly updated with improvements and security patches as part of our affordable subscription model. Security is an important investment, but you shouldn’t have to buy into a whole new system of hardware and hire a specialist just to use it. Arcules is rapidly growing and baking even more security, simplicity, and flexibility goodness into our product than ever before. Imagine your entire organization at your fingertips from one interface. It’s possible! Remotely access any camera, from any device, at any time. You shouldn’t have to rip and replace to gain the benefits of integrated cloud security. Use your existing IP cameras and network gear.