Best IT Security Apps for iPad - Page 18

Compare the Top IT Security Apps for iPad as of November 2025 - Page 18

  • 1
    Trusona

    Trusona

    Trusona

    Trusona, the pioneering leader of passwordless authentication for digital businesses, provides a phishing-resistant alternative to passwords and SMS OTPs. Trusona Authentication Cloud is a passkey-as-a-service platform, offering the simplest, quickest and least expensive way to add passkeys to your website. It improves business growth and profitability with sign-ins that delight your customers, mitigating top threats like phishing and account takeovers (ATOs) while providing a UX designed for the way people live. Organizations in iGaming, travel, financial services, healthcare and more, trust Trusona for their passwordless authentication initiatives.
  • 2
    Human Defense Platform
    HUMAN is a leading cybersecurity company committed to protecting the integrity of the digital world. We verify that digital interactions, transactions, and connections are authentic, secure, and human. The Human Defense Platform safeguards the entire customer journey with high-fidelity decision-making that defends against bots, fraud, and digital threats. Each week, HUMAN verifies 20 trillion digital interactions, providing unparalleled telemetry data to enable rapid, effective responses to even the most sophisticated threats. Recognized by our customers as a G2 Leader, HUMAN continues to set the standard in cybersecurity.
  • 3
    Payatu

    Payatu

    Payatu

    Eliminate security threats through our innovative and extensive security assessments. Our comprehensive cybersecurity services not only help organizations to assess, build, and manage their cybersecurity capabilities, but also enable them to respond to incidents and crises. Extensive/comprehensive testing of all IoT products. Prevent and combat security vulnerabilities related to hardware, firmware, mobile apps, cloud, and others. Measure how your systems, applications, and security controls can withstand online and offline risks. Get counter measures suitable for all your security needs. Ensure that you save time and effort in security bug fixing and patching cycle. Mitigate potential threats to your products. Completely secure your products. Secure your AI application against esoteric and potentially severe security and privacy threats. Extensive audit techniques sweep every corner of your system to discover potential attack surfaces.
  • 4
    CentreStack

    CentreStack

    CentreStack

    CentreStack boosts workforce mobility with cloud file sharing and mobile access, while retaining security permissions and familiar user experiences from file servers. With Active Directory and permissions inherited, no other solution better unites existing IT infrastructure's on premise security with cloud mobility. CentreStack enhances file servers to enable productivity and collaboration for mobile workers who use multiple devices, such as smartphones and media tablets, in addition to PCs. CentreStack can either enhance an existing file server to enable mobile access or it can migrate existing file server data and security permissions to a user defined cloud. In either case, the product is focused on maintaining a familiar file server experience with enhanced usability, security, compliance and data control. Enterprises can opt to maintain existing security and compliance, by keeping their data in on-premise file servers without cloud replication.
  • 5
    Authentic8 Silo
    Silo delivers secure anywhere, anytime web access, managed by policy and protected by rigorous controls. By shifting the exploit surface away from potential points of risk, Silo establishes trusted access to the web. Silo shifts your risk to an isolated cloud-native environment that you control. Silo can be configured specifically to meet your most demanding requirements. The Silo Web Isolation Platform is a secure, cloud-native execution environment for all web-based activity. Silo is built on the principles that all web code and critical data should be isolated from the endpoint, and that browsing capabilities should be configurable and auditable — like any other enterprise workflow. A cloud-based solution that deploys in seconds — whether it’s for a single user or thousands. Silo doesn’t require infrastructure investment; its ability to easily scale lets IT focus on solving business problems, not managing procurement.
  • 6
    iboss

    iboss

    iboss

    iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust Secure Access Service Edge platform designed to protect resources and users in the modern distributed world. Applications, data, and services have moved to the cloud and are located everywhere, while users needing access to those resources are working from anywhere. The iboss platform replaces legacy VPN, Proxies, and VDI with a consolidated service that improves security, increases the end-user experience, consolidates technology, and substantially reduces costs. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, Browser Isolation, CASB, and Data Loss Prevention to protect all resources via the cloud instantaneously and at scale. The iboss platform includes ZTNA to replace legacy VPN, Security Service Edge to replace legacy Proxies, and Browser Isolation to replace legacy VDI. This shifts the focus from protecting
  • 7
    Sertainty

    Sertainty

    Sertainty Corporation

    Sertainty Corporation is a Nashville based technology company offering software architects, developers and IT administrators an easy way to embed intelligence into data-files empowering data with an ability to act and react to protect itself. Our goal is to prevent theft of intellectual property, proprietary and confidential information. Data is passive and inert. Data loss and theft is a symptom of the problem. The solution to the problem is to give data the ability to control its own fate and mitigate risk. Monetize valuable information, lower the cost of compliance, and mitigate risk in real-time with Self-Protecting-Data. Sertainty Self-Protecting-Data is breakthrough technology that gives data the awareness to act and react, enabling security directly at the data layer. The Sertainty Platform makes it possible to trust your data to mitigate its own risks, take protective action and record those actions, enhancing compliance, simplifying security, and reducing cost.
  • 8
    OARO Identity
    We connect people to their identities using advanced facial recognition, simplifying processes for leading enterprise-sized businesses across all verticals. OARO IDENTITY is an end-to-end solution enabling user authentication and authorization across devices, business lines, and organizational boundaries – reducing cost and complexity while improving overall user experience and security. Identity management and the safeguarding of data are critical functions of all organizations. Traditional solutions are increasingly incapable of providing both the user experience and level of security required by today’s business environment. This trend is evidenced by the growing frequency of massive data breaches among industry leaders and the public sector. OARO IDENTITY is an end-to-end solution enabling our clients to authenticate and authorize users across devices, business lines and organizational boundaries, while reducing complexity, cost and improving user experience and security.
  • 9
    ONTO

    ONTO

    Ontology

    One-step management of decentralized identity and data. Self-sovereign Verifiable Credentials powered by Ontology Network. It is a statement to confirm a claim made by one entity about another. The claim is accompanied by a digital signature that can be used by other entities for authentication. ONT Score is a decentralized review system for ONT ID user trust and can assess ONT ID users from multiple dimensions, including identity information, verification information, digital assets, and behavioral features. ONTO helps users create a decentralized digital identity built on Ontology blockchain which fully protect their privacy data through an encryption algorithm, aiming to provide a safe and convenient one-stop service for users worldwide.
  • 10
    IDnow

    IDnow

    IDnow

    It takes customers just a few minutes to conveniently register for your services. You need a quick and easy identity verification solution, available anytime and anywhere, while not comprising on security and usability? A blend of modern AI and machine learning, trained on millions of datasets and backed by the expertise of a network of top identity and fraud specialists, gives you the best of both worlds. KYC identification in just a few minutes. Available anytime, anywhere in 195 countries and 30+ languages. Excellent usability, desktop, tablet, IDnow mobile app or SDK and POS processes. Confirmed by very good user ratings. Modern AI and machine learning technology trained on millions of datasets. All data centers, ident centers and ident specialists are completely located in the European Union to ensure a high level of data protection for our platform. IDnow AutoIdent verifies documents anytime and anywhere.
  • 11
    Verified.Me

    Verified.Me

    Verified.Me

    Verified.Me, by SecureKey Technologies Inc., is the new and secure way to help you verify your digital identity, so you can quickly get access to the services and products you want online, in person and on the phone. Verified.Me offers a secure and convenient way to help Canadians verify their digital identities. Verified.Me is a digital identity verification network offered by SecureKey Technologies Inc. The Verified.Me service was developed in cooperation with seven of Canada’s major financial institutions – BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank and TD. The Verified.Me network continues to evolve, with plans of adding new digital identity providers and service providers to make your life easier. SecureKey’s Verified. Me digital identity verification service is now available in an easy-to-use, browser-based version.
  • 12
    GlobaliD

    GlobaliD

    GlobaliD

    Portable, private, and secure identity. Claim your GlobaliD, get verified, create and join groups, communicate, pay and get paid online. At GlobaliD, we’re building a universal identity solution that is easy to use, ties users to unique names and transcends borders and institutions. We build a self-sovereign identity platform that enables everyday action for people and businesses. GlobaliD's privacy and security solutions help you protect your customers and win their trust, without compromising experience. Our platform delivers a convenient onboarding and single sign-on experience, while empowering users to build digital reputations and to maintain consent-based control over their personal data. Our solutions free our partners from the burden of data storage and security, while providing data integrity and maintaining compliance. From identity management to data security to messaging, GlobaliD’s full-fledged platform does it all.
  • 13
    V-OS Face Biometrics and eKYC
    Optimized face biometric deployment options, at the highest level of security. Remote biometric registration. Detects and evaluates face and facial features in real time. Detects head poses, closed eyes, eye gaze, open mouth and spectacles. National identity tokenization. V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app, and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. V-OS App Protection solution can detect and protect the mobile app from threats, such as reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code-injection, debugging and more. In an insecure OS environment when the phone is compromised, apps integrated with V-OS Application Protection have rooted and jailbreak detection mechanisms that allows a mobile app to run smoothly.
  • 14
    ImageWare Authenticate

    ImageWare Authenticate

    ImageWare Systems

    Increase the fidelity of user access management with biometrics. Simple to use and easy to deploy, Authenticate provides true user assurance across your enterprise applications and end customer base. Add your existing environments and its self-enrollment feature to quickly get users up and running. For simple passwordless login, the users can choose the most convenient option from the enabled modalities. When a more secure authentication is needed, you can enforce use of two or more modalities to reach a higher level of security. Facial Authentication: using a mobile phone or laptop webcam, users look at the camera similar to taking a selfie. Highest level of authentication, particularly when combined with the NIST compliant Biointellic Anti-Spoofing technology. Voice Recognition: users speak a randomized phrase, typically using a mobile phone.
  • 15
    BioID

    BioID

    BioID

    BioID Web Service (BWS) is a cloud-based online service providing powerful multimodal biometric technology. User presence is verified through highly accurate face, eye and voice recognition, strongly secured by liveness detection. Our biometric authentication is as intuitive and user-friendly as taking a selfie and as trustworthy as a face-to-face transaction. Implemented as ‘Biometrics as a Service’ it can enhance the security of existing infrastructures in an easy way, avoiding costly redesign and reimplementation. BWS enables advanced, enterprise-grade biometric recognition available to everyone, on any device, anytime, anywhere, with dynamic scaling for reliable performance and availability.
  • 16
    Password Boss
    The largest security threat that a managed service provider’s (MSP) customers and IT professionals face is from lacking or missing password security. Further help your customers close this gap by providing the security they need from their trusted advisor. Password Boss gives you a complete end-to-end solution for your customer’s passwords and helps them to increase security while reducing their risks from security breaches. Assign different roles to your team members to setup, manage and access your customers' passwords. Centralized dashboards and reports on customers and individual security scores, usage and audit logs.
  • 17
    SolidPass

    SolidPass

    SolidPass

    SolidPass is a leader in next-generation strong authentication, and protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software. Solidpass converts mobile phones, internet browsers, and desktop applications into robust security tokens. By eliminating the need for hardware tokens, SolidPass brings the highest levels of security at a fraction of the cost, and without the hassle of traditional, physical two-factor authentication tokens. SolidPass has bridged the traditional trade-off between usability and stronger security, and makes Challenge-Response (CR) and Transaction Data Signing (TDS) simple to use by incorporating advancements such as barcode scanning. Barcode scanning-based authentication can be used for Challenge-Response (CR) and Transaction Data Signing (TDS). Barcode scanning adds usability and convenience.
  • 18
    UnifyID

    UnifyID

    UnifyID

    Use UnifyID's authentication platform to remove passwords and one-time passcodes (OTP) from your user experience while improving security and consumer convenience. UnifyID offers Multi-Factor Authentication services that combine deterministic, behavioral biometric and environmental attributes using machine learning to uniquely identify users. Applies advanced machine learning to behavioral biometrics and environmental factors to create a secure digital fingerprint of the user. Passive authentication eliminates painful user experiences, causing poor adoption for Multi-Factor Authentication programs. Say goodbye to annoying passcodes, security questions or even passwords altogether. Our patent-pending technology leverages dynamic user attributes, such as motion and environment, which are neither known by the user nor remotely observable by an attacker; eliminating phishing and bot threats. We designed our solution with developers in mind.
  • 19
    NuDetect

    NuDetect

    NuData Security

    Our solution combines the power of our four integrated layers of security to verify users based on their inherent behavior. Used by major global brands, this solution protects online environments from login to logout. Don’t miss anything during a session. NuDetect is placed at different points across the environment to monitor users from the moment they enter your website until they leave. Find anomalous activity before it results in fraud. With our real-time solution, threats get blocked as they try to access your environment. Protect your customers passively. By looking at behavioral and device-based information, protect your users while they seamlessly enjoy your environment. No friction added. Evolve without lifting a finger. As we gather billions of data points, NuDetect for Continuous Validation learns to recognize your trusted customers, even as their online habits change. Machine learning capabilities adapt to user changes for higher recognition accuracy.
  • 20
    Blokada

    Blokada

    Blokada

    Blokada is the popular ad blocker and privacy app for Android and iOS. It's being supported and actively developed by the amazing open source community. If you want to efficiently block ads, trackers, malware, save on your data plan, speed up your device and protect your privacy with just one application, then Blokada is for you. It is free, secure and open source. For ultimate privacy protection, upgrade to Blokada Plus and connect through our VPN. We use WireGuard®, the most advanced VPN protocol, to encrypt your network activity and hide your IP address. Blokada Slim is a lightweight version of the app, and it only contains features allowed by the Google Play policy. Blokada is not only the privacy app. It is also the community of people who care about their digital privacy and wellbeing. You will find us on our forum, where you can ask any questions you may have. We are also present on other social media and chats.
  • 21
    Trellix Mobile Security
    Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, Trellix Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier, and even offline. Machine learning algorithms analyze device behavior deviations to uncover indicators of compromise and accurately identify advanced device, application, and network-based attacks. Extend visibility and control of mobile devices from the same console managing OS-based endpoints, servers, containers, and embedded IoT devices. Leave employees to their own devices and accommodate the human factor, without compromising the user experience or violating privacy. Trellix Mobile secures Android and iOS devices, including iPhones and iPads.
  • 22
    Symantec Endpoint Protection Mobile
    Threat defense tools that use a mix of vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling and transport security technologies to help defend mobile devices and applications from advanced threats. Mobile devices are more than just small computers in continuous use with perpetual connections to the Internet. The operating paradigm of these devices calls for new approaches to help ensure the data processed by them remains secure while maintaining productivity. Symantec designed the risk-based mobile security approach in Mobile Threat Defense from the ground up to defend against all detected threats that put business data at risk of exposure, theft, and manipulation while respecting users’ need for privacy, productivity, and a great mobile experience. Detect the most threats with on-device and in-cloud machine learning elements. Benefit from real-time processing, detection, and protection–at scale.
  • 23
    BlackBerry Protect
    AI detects and prevents attacks before they can execute, preventing users from opening URLs or visiting spoofing pages mimicking those of legitimate websites. It prevents, detects and remediates advanced malicious threats at the device and application levels. Malware and grayware are identified by application sandboxing and code analysis, plus app-security testing. All applications are scanned and validated before being pushed to the device or the user seeking access. All mobile endpoints BlackBerry UEM manages are protected from zero-day threats without reliance on end users to install, log in or maintain third-party apps or configure settings manually. Choose a single-point connectivity solution. Download once, distribute locally. Hybrid deployment facilitates security-related communication between the cloud and local infrastructure without exposing your network.
  • 24
    Malwarelytics
    Protect your app users from mobile malware and other device-related threats. Learn what malware is currently active on your users' devices, see which specific users have insecure devices, and actively help them fix their smartphone's problematic configuration as soon as it shows up on your radar. Mobile malware and cyber attackers became extremely sophisticated. They are looking for new ways to hack your mobile apps and cause damage. By misusing the mobile operating system features, they can gain an advantage and steal your users’ personal data or even money. Avoid these devastating consequences. After all, your business reputation is at stake! Malwarelytics® prevents the most common threats that mobile apps are facing these days and helps your organization stay safe and compliant. Device rooting or jailbreak disables security features provided by the mobile operating system, which opens the device to the attackers.
  • 25
    uCertify

    uCertify

    uCertify

    uCertify courses can be delivered in self-paced for IT professionals, mentor-guided for competency based educator, and instructor-led mode for schools and colleges. It begins with pre-assessment, interactive lessons, practice tests, lab and finally the post-assessment. Additionally, you can gauge your performance by test history and performance analytics. Our courses and lab are JAWS (Job Access with Speech) compliant. We provide enhanced accessibility to students with features such as option to change the font, size, and color of the course content, text-to-speech, interactive videos and how-to-videos with interactive transcripts and voice-overs. Our courses are highly interactive with virtual lab, simulations, and 50+ interactive items. Over 60 interactive items include true/false, multiple choice single or many option(s) correct, drag and drop, create a list & create and order list, hot spot, fill in the blank, performance-based, essay (manually graded), match lists, etc.
  • 26
    Avira Cloud Sandbox
    The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide.
  • 27
    Joe Sandbox

    Joe Sandbox

    Joe Security

    Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST).
  • 28
    Meeco

    Meeco

    Meeco

    Increase trust, reduce friction through transparent personal data enabled services. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. Data breaches, identity theft and data malpractice have taken trust to an all-time low.​ Individuals are calling for a new social contract with businesses. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. The Meeco Labs program provides organisations an opportunity to test hypotheses and prove business value prior to making substantial investments. It is a custom designed process and pathway to new products, services, experiences and business models. Utilising the Meeco Platform and API suite, consent exchanged customer or citizen data is mapped directly to internal CRM, ERP or enterprise systems.
  • 29
    Password Safe

    Password Safe

    Password Safe

    Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work).
  • 30
    VU Security

    VU Security

    VU Security

    We are a cybersecurity company specialized in fraud prevention and identity protection. Our mission is to provide secure digital experiences without friction, both for citizens and businesses, during the digital transformation process. We use different technologies applied for people recognition, based on their physiological or behavioral characteristics. Once the data has been captured, the system extracts a unique pattern for each individual, which will be used to make comparisons in the future. Transactional analysis of user behavior and channels for fraud detection and prevention. Secure, fast-response exchange of sensitive data through references to a vault of encrypted data. We provide a multi-channel fraud prevention solution that uses machine learning to create intelligent profiles and detect potentially fraudulent operations based on user behavior.