Loading...
Browse 289 device security tools
Cross-platform SDK for integrating endpoint security capabilities into products
Endpoint resilience platform with self-healing apps and device recovery
Device mgmt platform extending Google Admin Console for Chromebooks & mixed envs
Automates endpoint recovery and restoration after IT or cyber incidents.
MDM solution for managing Android and Apple devices alongside other endpoints
Mobile security app for Android devices with malware scanning and anti-theft
Endpoint management solution for device controls, firewall policies, and encryption
Security app for individuals/families protecting devices from online threats
Mobile security app for iOS with VPN, web protection, and privacy features
Phishing-resistant MFA platform with passwordless auth and device trust
Agentless device security platform for BYOD, managed, and external devices.
Mobile security solution for Android and iOS devices with MDM capabilities
Enterprise workspace platform providing secure access and DaaS solutions
ZTNA solution providing identity-based access to private apps
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.
Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
A next-generation network scanner for identifying security configuration weaknesses in devices like routers, firewalls, and switches.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.
Get strategic cybersecurity insights in your inbox