Best Mobile Threat Defense Software in Asia - Page 2

Find and compare the best Mobile Threat Defense software in Asia in 2025

Use the comparison tool below to compare the top Mobile Threat Defense software in Asia on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Whalebone Reviews
    Whalebone's mission is to bring cybersecurity to 1 billion everyday people. Whalebone therefore provides millions of everyday internet users unyielding protection without the need for them to download anything. We already protect millions of users in real-time with our continuously improving next-gen threat intelligence. Whalebone AI uses massive data from our telco customers and combines it with carefully chosen external sources to deliver game-changing cyber security and stay one step ahead. Since all of our products operate on the network DNS level, we can protect all the connected devices, including the IoT and other devices that are otherwise difficult or impossible to protect. On top of that, all of this happens in the simplest possible way, so that everyone gets a chance to be seamlessly protected. Whalebone is a zero disruption cybersecurity product for telcos, ISPs, and corporations that provides millions of everyday internet users unyielding protection from malware, phishing schemes, ransomware, and other malicious digital attacks without the need for them to download anything.
  • 2
    Trellix Mobile Security Reviews
    In contrast to cloud-dependent mobile security solutions that depend on app sandboxing or traffic tunneling, Trellix Mobile is installed directly on mobile devices, ensuring continuous protection regardless of how a device connects—whether through a corporate network, a public Wi-Fi hotspot, a cellular network, or even when offline. By utilizing machine learning algorithms, it detects anomalies in device behavior to reveal signs of compromise and effectively pinpoint sophisticated attacks targeting devices, applications, and networks. This solution enhances oversight and management of mobile devices from the same interface that administers OS-based endpoints, servers, containers, and IoT devices. It allows employees to use their devices freely while addressing the human element, all without sacrificing user experience or infringing on privacy. Trellix Mobile is compatible with both Android and iOS platforms, including iPhones and iPads, ensuring comprehensive security coverage across various devices. With such a robust solution in place, organizations can confidently protect their mobile assets in an increasingly connected world.
  • 3
    AdaptiveMobile Security Reviews
    Our services in security and business intelligence leverage ongoing supervised machine learning alongside seasoned security expertise, facilitating managed threat detection, response, analysis, and valuable insights. We continuously monitor and evaluate evolving suspicious activities across our global operations, ensuring vigilance 24/7 on every continent. The combination of our mobile and security expertise forms the bedrock of our capabilities, safeguarding mobile services both now and into the future. We provide ongoing real-time security enforcement through advanced distributed artificial intelligence and machine learning policy decision engines, enabling seamless protection against attacks for all subscribers. Our cutting-edge threat detection and mitigation strategies are driven by pioneering research and collaborative efforts within the industry. Renowned for being first to market in the telecommunications sector, we offer innovative security defenses, proactive threat discovery, and comprehensive managed cyber and telecom security solutions, setting new standards for safety and reliability. This commitment to excellence positions us at the forefront of the industry's evolving landscape.
  • 4
    Symantec Endpoint Protection Mobile Reviews
    Threat defense solutions that integrate a combination of vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling, and transport security technologies are essential for safeguarding mobile devices and applications against sophisticated threats. Mobile devices extend beyond mere small computers; they are constantly active and perpetually connected to the Internet, necessitating innovative strategies to ensure data integrity while promoting user productivity. To address these unique challenges, Symantec developed a risk-based mobile security framework within its Mobile Threat Defense, designed explicitly to confront a wide array of threats that jeopardize business data through exposure, theft, and manipulation—all while prioritizing user privacy and an optimal mobile experience. By harnessing both on-device and cloud-based machine learning capabilities, the system is equipped to detect a multitude of threats efficiently. This approach allows for real-time analysis, detection, and protection at a scale that meets the demands of modern mobile environments, ensuring users can work confidently without compromising security.
  • 5
    SEAP Reviews

    SEAP

    XTN Cognitive Security

    SEAP® for Mobile serves as an SDK that seamlessly integrates into the customer's application without the need for special permissions, while SEAP® for Web utilizes JavaScript to function within the web browser environment, eliminating the requirement for agent installation. This innovative system identifies malware threats across both mobile and web platforms, including sophisticated attacks such as man-in-the-browser, man-in-the-app, remote access trojans (RAT), web injections, overlay attacks, SMS grabbing, memory tampering, and various forms of injection attacks. Additionally, SEAP® is capable of detecting and reporting technological vulnerabilities on devices, such as jailbreaking, rooting, attempts at reverse engineering, binary tampering, and repacking. For certain device conditions detected, the app can activate countermeasures through dedicated RASP APIs. Furthermore, SEAP® also identifies fraudulent activities that compromise existing user accounts by employing behavioral biometrics and device identity verification methods, ensuring enhanced security for users. This comprehensive approach to threat detection not only safeguards applications but also fortifies user trust in digital environments.
  • 6
    zDefend Reviews
    Zimperium’s zDefend enables mobile apps to detect and protect themselves proactively against runtime threats and attacks. With this runtime protection capability, mobile apps can assess device risk posture in real-time and dynamically prevent access or disable high-risk functionality to minimize fraud and theft attempts on end-user devices proactively. The security policy and associated mitigations reside in-app allowing the actions can be taken even in the absence of any network connectivity, making the protections extremely difficult to circumvent. The ability to detect threats and attacks on-device across the install base provides Security Operations (SOC) teams with real-time threat telemetry. Detailed threat forensics help isolate and automate downstream mitigation activities across other enterprise. In-app security policies are set and managed centrally via the console but are communicated in real-time to the entire install base without needing to publish a new version. This practical and scalable approach allows Enterprises to react promptly to new threats and vulnerabilities discovered. Zimperium’s unique approach to runtime defense also protects against advanced on-device compromise and exploitation techniques.
  • 7
    Malwarelytics Reviews
    Protect your app users against mobile malware and other threats to their devices. Find out what malware is currently running on your users' devices and which users have insecure devices. Then, help them to fix the problem configuration as soon as you notice it. Mobile malware and cyber attackers have become extremely sophisticated. They are constantly looking for new ways of hacking your mobile apps and causing damage. They can steal personal data and even money by stealing your users' money or using mobile operating system features to gain an advantage. These are the most serious consequences. Your business reputation is at risk! Malwarelytics®, which prevents the most common threats mobile apps face these days, helps your company stay compliant and safe. Jailbreaking or rooting a device on the mobile operating system disables security features and opens it up to attackers.
  • 8
    AppSuit Reviews
    AppSuit Premium serves as a comprehensive mobile app security solution, employing advanced app obfuscation and anti-tampering technologies to guard against a range of hacking threats. Its effectiveness has earned the trust of numerous financial institutions and other organizations in Korea, where it has received validation for its safety. The service includes beta testing for new devices and operating systems prior to their official release, ensuring that it stays ahead of emerging cyber threats through regular updates. Clients benefit from prompt and precise technical support and maintenance services as well. The client application's build process begins after the AppSuit plug-in is integrated and the gradle settings are configured within the client’s app development environment. Once uploaded into the build system, AppSuit is automatically applied to the client APK/IPA, which operates as a web service. The requirement of this build system ensures seamless application of AppSuit to the client's files. Furthermore, AppSuit has consistently been recognized as a top-tier product in various evaluations, including POC and BMT assessments conducted by financial firms and major corporations, solidifying its reputation in the market. Over time, its proven reliability continues to attract new clients looking for robust app security solutions.
  • 9
    Webroot Internet Security Plus Reviews
    WiFi security relies heavily on the combination of a VPN and antivirus software, making both essential for maintaining online safety. While antivirus programs shield your devices from malware, a VPN secures your internet connection by ensuring your browsing activities remain confidential. Together, they enhance your overall security and privacy whether you’re working, sharing information, banking, or simply browsing the web. Webroot SecureAnywhere® Internet Security Plus offers robust, cloud-based defenses against various online threats across all your devices, ensuring you remain protected regardless of your connection method or location. Notably, it features rapid scanning capabilities, consumes minimal system resources, and provides real-time protection by swiftly detecting and neutralizing emerging threats. This dual approach to security not only safeguards your personal information but also enhances your online experience.
  • 10
    BlackBerry Protect Reviews
    AI proactively identifies and mitigates potential threats before they can be executed, ensuring that users are protected from accessing URLs or phony webpages that imitate those of credible sites. This technology not only detects and prevents attacks but also addresses sophisticated malicious threats at both the device and application levels. By employing application sandboxing, code analysis, and app-security testing, it effectively identifies malware and grayware. Each application is thoroughly scanned and verified prior to being deployed to users or devices seeking access. All mobile endpoints managed by BlackBerry UEM are shielded from zero-day vulnerabilities without placing the burden on users to install, log in to, or manage third-party applications or manually adjust settings. Opt for a centralized connectivity solution that simplifies the process: download once and distribute locally. Furthermore, hybrid deployment enhances security-related communications between cloud services and local infrastructure while safeguarding your network from exposure to potential threats. This comprehensive approach not only boosts security but also streamlines the user experience by minimizing manual intervention.
  • 11
    Webroot Internet Security Complete Reviews
    WiFi security, encompassing both VPN and antivirus solutions, is essential for maintaining a safe online experience. Utilizing both tools is crucial, as antivirus software safeguards your devices while a VPN secures your connection and ensures your browsing remains confidential. Together, they create a robust layer of security and privacy that is invaluable for activities such as working, sharing information, banking, and browsing the internet. Webroot stands out by shielding your usernames, account numbers, and sensitive personal data from various online threats. Its innovative cloud-based protection is designed to keep you and your family secure with every internet connection. Recognized for being one of the fastest and most lightweight antivirus solutions available, Webroot provides peace of mind whether you are at home or on the move. You can effortlessly access your files on your mobile device without compromising your safety. Additionally, it serves as a privacy protection and system maintenance tool, capable of erasing your past online activities to further enhance your privacy. This dual approach ensures comprehensive protection against the myriad of digital threats present today.
  • 12
    SlashNext Reviews
    SlashNext's solutions for anti-phishing and incident response effectively combat threats in mobile, email, and web environments, significantly minimizing the chances of data breaches, cyber extortion, and theft. They safeguard users on iOS and Android devices against phishing attacks tailored for mobile platforms through a compact, cloud-enhanced agent. Employees are also protected from real-time phishing attempts thanks to cloud-based browser extensions compatible with all leading desktop browsers. By leveraging live threat intelligence, organizations can transform their current network security measures into a proactive, multi-faceted defense against phishing attacks. The process of managing phishing incidents and conducting threat hunting can be automated with precise, on-the-fly assessments of suspicious URLs whenever needed. Attackers often utilize targeted strategies to hijack individual accounts or impersonate specific users, employing deception tactics to coerce victims into revealing sensitive information for illicit purposes. Furthermore, malicious HTML, PDF, and Microsoft Office attachments are frequently deployed to extract credentials or install harmful software on unsuspecting systems. Awareness of these varied threats is crucial for developing effective defenses against evolving cyber risks.
  • 13
    NowSecure Reviews
    Automate the security and privacy testing processes for your mobile applications seamlessly through a user-friendly portal. Utilizing the NowSecure Platform, you can evaluate both pre-production and released iOS and Android binaries while keeping an eye on the applications that drive your organization. This allows for extensive security and privacy testing to be scaled through automation, enabling continuous testing of mobile binaries in alignment with the fast-paced Agile and DevOps development cycles. Additionally, you can oversee apps in production to adeptly address the swiftly changing requirements of mobile enterprises while facilitating collaboration among development, security, governance, risk, compliance (GRC), and mobile center of excellence (MCOE) teams. The NowSecure Platform is designed to address the specific challenges and intricate frameworks of today’s mobile software development lifecycle (SDLC), offering security and privacy testing solutions including continuous, customizable, and precise API testing. By enhancing transparency across teams with reliable results, you can ensure that your mobile applications remain secure and compliant, ultimately fostering trust and efficiency in your development processes.
  • 14
    Proofpoint Mobile Defense Reviews
    Businesses are increasingly confronted with the dangers posed by harmful Wi-Fi hotspots and the myriad of applications found on employee-owned devices. Among these applications are not only malware but also what is termed "riskware" – software that, while not directly harmful, can engage in activities that jeopardize the security of company data. These various threats collectively put enterprise users at risk of data leaks, identity theft, and the unauthorized transfer of sensitive information, which can be exploited to conduct sophisticated attacks targeting specific individuals. Employees often connect to public Wi-Fi networks and unwittingly grant extensive permissions to these riskware applications, failing to recognize that their personal and organizational information could be transmitted to distant servers and advertising platforms worldwide, creating opportunities for cybercriminals to exploit this data. As such, organizations must prioritize educating their employees about these risks to safeguard their sensitive information more effectively.
  • 15
    Corrata Reviews
    Mobile threat defense is more powerful, more sensitive to employee privacy, and easier to deploy than other solutions. Corrata operates quietly in the background, looking for signs of malware infection and quarantining any compromised devices. Our traffic inspection technology ensures that even the most sophisticated malware cannot hide behind our unique traffic inspection technology. Mobile phishing attacks account for 85% of all phishing attacks. Corrata monitors all incoming messages via SMS, WhatsApp, and other channels and scans them for phishing attempts and blocks malicious links. Corrata constantly checks the configuration of devices. If necessary, Corrata alerts employees to update operating system software or remove harmful applications. Poorly configured tablets and phones are not allowed to access business applications because of conditional access policies.