Define: Mobile security?
Mobile security, or more specifically mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones.
(Source)
Top Mobile device security Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Mobile device security solutions. We selected these companies for exceptional performance in one of these categories:
- Innovation
- Innovative ideas
- Innovative route to market
- Innovative product
- Growth
- Exceptional growth
- Exceptional growth strategy
- Management
- Societal impact
Data sourced from Crunchbase and SemRush.
Neohapsis
Crunchbase | Website | Twitter | Facebook | Linkedin
Neohapsis provides mobile and cloud security services to enterprises and government agencies. It offers application security services, including application assessment, architecture design assessment, threat modeling, secure software development lifecycle assessment, and product security assessment; and cloud security services, including rapid secure cloud application deployment, cloud application assessments, cloud data compliance, and cloud infrastructure assessment.
It also assists clients with various compliance requirements, including payment card industry data security standard, the U.S. state data protection and data privacy, HIPAA/HITECH, NERC CIP, and DIACAP.
In addition it provides IT risk management and governance, third-party risk management, cloud computing strategy, mobile security, and on-site advisory; mobile application, mobile infrastructure, mobile device security, mobile strategy, policy, and risk management services; and network and endpoint security services, including network archite…. .
Graphite Software
Crunchbase | Website | Twitter | Facebook | Linkedin
Graphite’s team has extensive experience building strong and easy to use security solutions for consumer devices and has been influential in this market. We see an opportunity in the BYOD market for Android phones and tablets where dual persona solutions are insecure, cumbersome to use and do not benefit the device owner.
It easy to create solutions that are either easy to use, or super secure. But enterprises and consumers want both.
As veterans in the device security business, we are re-defining mobile device security. Join us and together let’s make a difference when it comes to the next generation of secure computing..
BluePoint Security™
Crunchbase | Website | Twitter | Facebook | Linkedin
BluePoint Security, Inc. is a privately held device security software development firm headquartered in Palo Alto, California.
BluePoint specializes in mobile device security with a focus malware prevention in the enterprise, government and energy sector. BluePoint Security has launched 4 successful products to date.
BluePoint Security Enterprise MDM – Cross platform mobile, desktop and server unified security platform focused on preventing the normally unpreventable threats (targeted, zero day, samples never seen before etc). BluePoint Security Mobile – Consumer product available in mobile markets targeted at mobile users.
Worlds first mobile cloud AV solution. BluePoint Security Personal – Consumer product available online and several storefront retailers targeted at personal desktop users.
AdTrap – Simply put, AdTrap is a small, zero configuration hardware device that removes ads from your internet connection before they reach any of your home devices. Video, music streams and mobile apps and websites, all ad free..
GSMK Cryptophone
Crunchbase | Website | Twitter | Facebook | Linkedin
GSMK is a leader in mobile voice and message security. Located in Berlin, Germany, the company develops, produces and markets the first mobile, satellite and desktop phones that provide strong end-to-end voice encryption with full source code published for review.
GSMK CryptoPhones were the first products to take advantage of the fact that the CPU performance of portable consumer devices, like mobile phones and PDAs, is now sufficient for strong real-time voice encryption. The processing power that is available today in every pocket now makes it possible to effectively counter rampant telecommunications surveillance and targeted attacks on your sensitive information.
They envision a day when strong, verifiable and trustworthy voice encryption in all mobile devices will be commonplace, just like strong encryption is in Internet routers today. Recent technological advances now finally allow every one of us to regain some of the privacy they lost.
Widespread, uncontrolled wiretapping and privacy violations are currently threatening the business environment, civil liberties, and the very future of democratic societies. There seems to be no realistic way to stem by political process alone the current flood of intrusive communication surveillance, industrial espionage, and the risk for democratic institutions that comes with it.
With the advent of GSMK CryptoPhones, strong cryptographic protection of confidential voice calls and messages has finally become available to a wide range of individuals, corporations, and institutions. GSMK CryptoPhones mean voice and message encryption you can trust.
From its very first secure mobile phone, the first product world-wide to encrypt mobile telephone calls in real time by taking advantage of the CPU performance of modern mobile devices, GSMK has created groundbreaking products that have defined the industry. – Voice encryption: GSMK was the first and still is the only company world-wide that can deliver strong voice encryption products based on modern mobile device platforms that come with full published source code and allow communications across network boundaries.
AlertBoot
Crunchbase | Website | Twitter | Facebook | Linkedin
AlertBoot Full Disk Encryption & Mobile Security Managed Services.
Savid Technologies
Crunchbase | Website | Twitter | Facebook | Linkedin
Savid Technologies provides specialized IT security services in the United States and internationally. It offers advisory services such as strategy assessment and management services; and application and mobile device security, compliance, penetration testing, and risk management services.
The company also provides technical services such as black and white box testing, policy and procedure audits, and IT security technology deployments; and configuration and system hardening, database, secure software development life cycle, application security, wireless security, VoIP, employee security awareness, business continuity management plan, PCI compliance, and HIPAA and FISMA compliance assessments. The company serves the financial services, insurance, critical infrastructure, healthcare, retail, and education industries as well as government clients.
Savid Technologies was founded in January 2014 and is based in Tinley Park, Illinois.. .
CMDSP
Crunchbase | Website | Twitter | Facebook | Linkedin
A CMDSP credential shows employers that the individual can manage the mobile devices for a workforce within an enterprise in a secure manner. Their certified professionals are committed to protecting that institutional data, information, and knowledge even while the devices are mobile.
Mobility can mean more risk – but the CMDSP program and credential mitigates the risk of allowing an organization to utilize smartphones and tablets within an enterprise.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.