Best IT Security Apps for iPad - Page 21

Compare the Top IT Security Apps for iPad as of November 2025 - Page 21

  • 1
    DDP Mobile Edition
    Today employees, partners and vendors alike work any time, anywhere, using any device to download and share files. Personally owned smartphones and tablets, like desktops and laptops, have become a standard work tool. Accordingly, most organizations are embracing the bring your own device movement, recognizing it helps to both reduce equipment costs and increase productivity. But without proper encryption and password enforcement, data accessed on mobile devices, whether from a corporate server or a public cloud, is unprotected. If the device is lost or stolen, or if data is accessed through an open wireless hotspot, it could be hijacked, putting companies in jeopardy of a security breach and compliance violations. IT teams are struggling to strike a balance between protecting data and impeding worker productivity by restricting data access. Dell Data Protection | Mobile Edition helps to put IT back in control of data security by enabling you to protect data.
  • 2
    BlackBerry UEM

    BlackBerry UEM

    BlackBerry

    With diverse endpoints that include smartphones, tablets, laptops and other devices with different ownership models and running different operating systems, it’s essential for organizations to have control and visibility across the entire ecosystem. BlackBerry® offers solutions to open up choice for your employees while maintaining security. Employees are increasingly looking for the flexibility to use their smartphone of choice for work. When done securely, this can reduce costs and boost morale. A comprehensive Mobile Device Management strategy needs to deliver flexibility that can evolve with your changing mobility needs. BlackBerry solutions can allow you to deploy MDM securely and in a way that meets your business needs.
  • 3
    Symantec VIP
    Your key to one swipe two-step authentication. Two-factor authentication is easy to enable and prevents attacks. With just a swipe of a finger, or use of a security code, your information is secure. Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap.
  • 4
    Work Safe Online (WSO)

    Work Safe Online (WSO)

    Prospecta Software

    Occupational Health & Safety (OHS) practitioners commonly face disparate systems and collection processes, varying policies and procedures across different sites and locations, all of which lead to poor information for decision making. Establishment of management systems, policies and effective mobile technology can help support Regulatory and Corporate compliance and reporting. An effective workplace health and safety solution coupled with best practice processes support OHS personnel to focus on training and implementing safe work practices into organizational culture. Work Safe Online (WSO) is a comprehensive, integrated Occupational Health and Safety solution to better manage OH&S compliance, risks and stakeholders. It is completely scalable allowing customers the flexibility to change with their business needs.
    Starting Price: $15 per user per month
  • 5
    NetMotion

    NetMotion

    NetMotion Software

    The only remote access solution that includes patented technologies that stabilize and enhance the network, built specifically for the mobile and remote worker. A more intelligent way to deliver secure remote access, protecting users from risky content and securing enterprise resources from unapproved access. Get deep insights on remote workers, visualized in real-time dashboards. Diagnose issues, identify opportunities and take action to improve the employee experience. Your workforce is more distributed than ever, relying on the cloud to get work done from anywhere. You need security solutions that reflect the new normal, offering zero trust at the edge without ignoring the requirements of today. Get the best of VPN and the best of ZTNA in a single platform. No matter which OS or device mix your environment supports, and whether your strategy is primarily on-premise or in the cloud, you’ll be able to deploy it exactly in the way that suits you.
  • 6
    Transmit Security

    Transmit Security

    Transmit Security

    The Future of Authentication Is Passwordless. Agile. Instant. Versatile. Eliminate passwords to deliver powerful identity experiences that delight you and all your users. Wherever, whenever. Strong and seamless customer authentication from any device or channel. Use the mobile as the authenticator. Powered by a network of trust to identify each and every user. This is instant technology and installation that gives the ultimate experience and impact. Turn complex authentication, authorization and risk policy decisions into simple journeys. Enjoy flexible policy orchestration engine for all applications and channels. Protect your workplace and workforce whether in the office or remote. No matter what location or device enjoy the benefits of risk based technology that provides impenetrable security. Go passwordless and keep your enterprise secure.
  • 7
    Knomi

    Knomi

    Aware

    Biometrics and multi-factor authentication have emerged as the gold standard when confirming identity. Aware identity verification and management solutions are Bringing Biometrics to Life™ in a variety of environments, from law enforcement and healthcare to financial services and on-site enterprise security. Aware biometrics solutions can capture a range of biometric factors—everything from fingerprints and retina scans to voice and full facial recognition. And the Aware modular architecture makes the system easy to configure for virtually any biometric identity management application. This is the present and the future of identity verification. The Knomi framework provides secure and convenient facial and speaker recognition for mobile, multifactor authentication. From small, customized solutions to large-scale enterprise implementations, Aware’s ABIS offerings are aligned to virtually any customer need.
  • 8
    Group-IB Unified Risk Platform
    The Unified Risk Platform strengthens security by identifying the risks your organization faces. The platform automatically configures your Group-IB defenses with the precise insights required to stop attacks by threat actors, thereby making it less likely that an attack will be successful. Group-IB's platform monitors threat actors at all times in order to detect advanced attacks and techniques. The Unified Risk Platform quickly and accurately identifies early warning signs before attacks develop, fraud occurs or your brand is damaged, which reduces the risk of undesirable consequences. The Unified Risk Platform counters threat actors with insight into their modus operandi. The platform leverages a variety of solutions and techniques to stop attacks that target your infrastructure, endpoints, brand and customers, reducing the risk that an attack will cause disruption or recur.
  • 9
    Cachatto

    Cachatto

    Maddox

    Access, manage, connect and secure your entire corporate database on-premise and or on the cloud to any device, anytime and anywhere with Cachatto. No data stored on the device while ensuring DLP. Prevents security breaches in event of theft. Ensure mobile security while you are on the go. With only one virtualized server, sever cost of special hardware and experience simple configuration. Work anywhere and anytime while preventing data leakage and ensuring computer security. No major changes to the existing corporate system. No changes to firewall settings necessary.
  • 10
    Deep Instinct

    Deep Instinct

    Deep Instinct

    Deep Instinct is the first and only company to apply end-to-end deep learning to cybersecurity. Unlike detection and response-based solutions, which wait for the attack before reacting, Deep Instinct’s solution works preemptively. By taking a preventative approach, files and vectors are automatically analyzed prior to execution, keeping customers protected in zero time. This is critical in a threat landscape, where real time is too late. With the aim of eradicating cyber threats from the enterprise, Deep Instinct protects against the most evasive known and unknown cyberattacks with unmatched accuracy, achieving highest detection rates and minimal false positives in tests regularly performed by third parties. Providing protection across endpoints, networks, servers, and mobile devices, the lightweight solution can be applied to most OSs and protects against both file-based and fileless attacks.
  • 11
    Kaymera

    Kaymera

    Kaymera Technologies

    Protect your trade secrets, business assets, and digital privacy to enjoy the freedom of mobility - minus the risk. High-end off-the-shelf mobile devices powered by a custom-built OS for ultimate usability. Protect your data - keep your favorite apps. Do the right thing. We put ultimate trust in our employees and partners to act with integrity and honesty. Backed by talented security researchers, developers, and devoted team members, we create a great environment for professional and personal growth, as well as build a solid product. Protecting companies & individuals, and securing their private and business assets from damaging cyber attacks to keep their daily operations running smoothly. We use data-driven and innovative approach to mobile security, and ensure secure communications to protect our clients’ business interests. Our success lies in the trust and long-term reliable business relationships we build with our partners.
  • 12
    Citrix Workspace

    Citrix Workspace

    Cloud Software Group

    Employee experience is everything—get it right with an intelligent workspace. Power a smarter, more flexible way to work. You hired the best. Let them be their best. Redefine what it means to work better with Citrix Workspace. Increase employee productivity and engagement through simpler IT. Simplify the way you manage and secure apps, devices, users, and networks so you can deliver the best employee experience. Transition employees back to the office seamlessly. Realize the full potential of your cloud strategy. Replace traditional VPNs with a zero trust approach.
  • 13
    SmartSearch

    SmartSearch

    SmartSearch

    SmartSearch is here to make AML, KYC and Identity Verification compliance easy. The most comprehensive features from an AML Provider. By simply entering the individual’s name, address and date of birth, SmartSearch will complete a full AML/KYC check - including automatic worldwide Sanction and PEP screening - giving you a clear pass or refer result in a matter of seconds. International verification is challenging due to regulatory, cultural and technological differences between countries. But thanks to our unique ability to integrate multiple data sources, we can verify international individuals and businesses. After initial AML/KYC checks have been completed, we continue to monitor all clients daily, alerting you if their Sanctions or PEP status changes. We can also complete retrospective checks on clients to ensure your firm remains compliant at all times.
  • 14
    CHEQ

    CHEQ

    CHEQ AI Technologies

    CHEQ FOR PPC Save significant wasted ad-spend and lower your CPA's across all major PPC buying channels with the world's No. 1 click-fraud prevention platform for advertisers PROTECT YOUR ENTIRE MARKETING SPEND The only solution covering all your paid search and paid social buying channels REMOVE BOTS FROM YOUR AUDIENCES The only solution that excludes invalid audiences, protecting your remarketing and lookalikes NEVER BLOCK REAL PAYING CUSTOMERS The only real-time cyber-driven solution that blocks all the bad traffic, but never the good traffic
  • 15
    Lepide Data Security Platform
    Intelligent Threat Detection. Faster Response. 98% of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast. Protect Sensitive Data from Rogue Users and Compromised User Accounts. We enable you to detect and investigate threats to your most sensitive data in ways no other vendor can. Bringing together data discovery and classification with threat detection enables you to investigate all events, changes, actions and anomalies with context. End to end visibility of Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, Box, Dropbox and more. Detect and Respond to Security Threats 10x Faster. Investigate threats as they emerge in Active Directory and track movement
  • 16
    Fireblocks

    Fireblocks

    Fireblocks

    Build, run and scale a profitable digital asset business. Fireblocks is an all-in-one platform to store, transfer, and issue digital assets across your entire ecosystem. With the Fireblocks DeFi API and Browser Extension, you can now securely access the full range of DeFi protocols for strategies like decentralized exchange (DEX) trading, lending/borrowing, staking, and yield farming. Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Move and settle assets 24/7 using the first & only institutional asset transfer network. Maximize your balance sheet, reduce counterparty risk, and unlock new revenue opportunities. Enjoy peace of mind with the only insurance policy that covers assets in storage, transfer and E&O. SOC 2 Type II and regular pen testing from ComSec and NCC Group.
  • 17
    Cyware

    Cyware

    Cyware

    Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally. Cyware offers a full-stack of innovative cyber fusion solutions for all-source strategic, tactical, technical and operational threat intelligence sharing & threat response automation. Cyware’s Enterprise Solutions are designed to promote secure collaboration, inculcate cyber resilience, enhance threat visibility and deliver needed control by providing organizations with automated context-rich analysis of threats for proactive response without losing the element of human judgment. Cyware solutions are pushing the boundaries of current security paradigms by utilizing advances in Machine Learning, Artificial Intelligence, Security Automation & Orchestration technologies to empower enterprises in adapting to the evolving threat landscape.
  • 18
    ZenKey

    ZenKey

    ZenKey

    ZenKey is a customer identity and access management (CIAM) solution that delivers a higher level of security by using data derived from wireless carriers secure customer identities and provide flexibility to manage the data users share. That means you can now offer a simple user experience to increase conversions and improve customer satisfaction.
  • 19
    CENTRI Protected Sessions

    CENTRI Protected Sessions

    CENTRI Technology

    Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud.
  • 20
    Yoti

    Yoti

    Yoti

    We’ve partnered with Post Office to provide accessible and inclusive identity services across the UK. The Yoti app is your secure digital ID. It’s the safe place to store your personal details, encrypted so only you can access them. When you need to prove your age, identity or other details about yourself, you can securely share just the details required without revealing everything about yourself. Give your customers a safe way to prove who they are with your business. Our verification solutions can be integrated into your website, app, terminal or managed through our custom platforms. Our systems are built in a way that means we cannot mine or sell data to third parties. Once we’ve completed our security checks, we can’t access any user details. We’re trusted by regulators for adhering to the highest standards of security. Yoti was founded on a strong set of principles that we uphold to ensure we continue to only build tech for good.
  • 21
    Chimpa

    Chimpa

    Chimpa

    It takes just a few minutes to activate Chimpa and its ease of use makes it suitable even for inexperienced users. Chimpa supports iOS, iPadOS, tvOS and Android operating systems. The MDM is generally a distribution of a combination of applications and configurations on the device, company policies and certificates and back-end infrastructure, in order to simplify and improve the IT management of end-user devices. In modern corporate IT environments, the number and variety of managed devices (and user behavior) is the basis of MDM solutions that allow the management of devices and users in a coherent and scalable way. The general role of MDM is to increase the user-friendliness, security and functionality, while maintaining a certain flexibility for the user. Kiosk mode, security functions, blocking, remote initialization. Collection of analytical data on the use of the App and the network.
  • 22
    CounterMail

    CounterMail

    CounterMail

    CounterMail is a secure and easy to use online email service, designed to provide maximum security and privacy without any unnecessary complexity. You can access your email account at any time, from anywhere in the world. Your account will always be encrypted and anonymous. CounterMail's encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail's secure email! We are using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
  • 23
    Secuve Q Authentication
    SECUVE Q Authentication is a unique and simple mobile authentication technology that can be applied to a wide range of applications including identification services, Fintech, online banking, etc. Authenticates users with secure authentication code generated by the combined operation of both one-time secure random value transmitted over the additional secure channel, and 'QR code'. Easy-to-use authentication by letting users touch or scan the QR code enclosing secure authentication code, or enter the numeric secure authentication code in SMS.
  • 24
    Silent Circle

    Silent Circle

    Silent Circle

    Joining Silent Circle puts your organization in an exclusive network – the SCircle. You’ll be joining the many other like-minded businesses, NGOs, and governments who have committed to preserving their secrets, their reputation, their intellectual property, and the privacy of their users. Using Silent Phone, your team’s users can contact others in the SCircle with complete peace of mind that your communications are secure. Once your team has joined Silent Circle, other organizations in the SCircle can contact your team’s users if they know your usernames. To make it possible for others to find your users by searching by name, you can make your users public in the SCircle Directory. When your team’s users are managed by Silent Manager, they are never searchable by name in the SCircle Directory. However, these users can contact and be contacted by users in other organizations by knowing each other’s username.
  • 25
    Safenet MobilePASS
    Evolve your authentication infrastructure to include One Time Password (OTP) solution, as well as advanced security applications. With a Mobile Pass permits a user to use one set of login credentials to access multiple applications. Automated processes, over-the air activation and installation for software tokens, and intuitive self-service tools ensure extensive support for end users and lower Helpdesk costs. Our Authentication Suite is filled with every tool you will need to manage the security of your business from Two-Factor Authentication (2FA) to Single Sign-On (SSO) and much, much more. The success of your organization depends on your ability to give authorized customers, partners and employees access to online applications, corporate networks, and business portals from anywhere.
  • 26
    CryptoSentry

    CryptoSentry

    SentryBay

    CryptoSentry stops ransomware. Once installed on your employees’ devices, it will constantly monitor for suspicious encryption activity. Ransomware is the fastest growing cyber threat in recent years and it will affect your business unless you take action to stop the encryption of files before you are targeted. News headlines are frequently dominated by the damaging consequences of the latest ransomware attack from WannaCry, Petya and CryptoWall to CryptoLocker and Locky, and other less known variants which have had a significant impact on productivity and finance. Because ransomware is an attack on the availability of data, our CryptoSentry solution is designed to prevent it from getting access to data so it can encrypt files. Once installed on your employees’ devices, it will constantly monitor for suspicious encryption activity. If its algorithms determine a threat, it will proactively prevent file encryption.
  • 27
    GBS iQ.Suite
    The use of collaboration tools and meeting platforms from vendors such as Microsoft and CISCO is constantly increasing, and with it the security measures that need to be taken. As more and more channels, more complex IT infrastructures and a large part of the platforms run entirely in the cloud, new gateways and attack vectors are emerging. While most organizations are constantly increasing their email security measurements, they often tend to overlook protection against malicious files, that enter the company via SharePoint or messenger, for example. The security capabilities currently available are often limited and ineffective. The platforms helps companies respond promptly to the dynamic and ever-changing threat landscape with a centralized cloud solution that fits both enterprises and small companies.
  • 28
    Facia

    Facia

    Facia.ai

    Founded in 2022, Facia specializes in biometric authentication and facial recognition technology. We leverage advanced AI and ML algorithms to deliver secure solutions for businesses. Our 3D liveness detection technology offers rapid responses in under a second, achieving a 0% False Acceptance Rate (FAR) with an FRR below 1% to prevent unauthorized access. Our services include 1:1 Photo ID Verification, 1:N Face Search, and Age Verification. We offer customizable API and SDK integration options for seamless compatibility. Our system provides real-time 3D face verification, ensuring speed and precision without compromising security. We protect against print and mask-based spoofing. Facia is dedicated to advancing biometric authentication, providing secure identity verification solutions for businesses.
  • 29
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility.
  • 30
    PreEmptive Protection for iOS
    PreEmptive Protection for iOS (PPiOS) protects all Objective-C iOS applications, greatly reducing the risk of piracy, intellectual property theft and tampering. PreEmptive is proud to support open-source software, and PPiOS is available at no cost on Github. We do offer commercial support for PPiOS provided you have licensed one of our other products – Dotfuscator or DashO. With PPiOS support, you gain access to our live world-class team. PreEmptive is a trusted global leader of protection tools for Desktop, Mobile, Cloud, and Internet of Things (IoT) applications. We help organizations make their applications more resistant and resilient to hacking and tampering, protecting intellectual property, sensitive data and revenue.