Loading...
Browse 142 device security tools
Automates endpoint recovery and restoration after IT or cyber incidents.
Automates endpoint recovery and restoration after IT or cyber incidents.
MDM solution for managing Android and Apple devices alongside other endpoints
MDM solution for managing Android and Apple devices alongside other endpoints
Personnel, access, and device compliance management platform
Personnel, access, and device compliance management platform
Mobile security app for Android devices with malware scanning and anti-theft
Mobile security app for Android devices with malware scanning and anti-theft
Endpoint management solution for device controls, firewall policies, and encryption
Endpoint management solution for device controls, firewall policies, and encryption
Security app for individuals/families protecting devices from online threats
Security app for individuals/families protecting devices from online threats
Mobile security app for iOS with VPN, web protection, and privacy features
Mobile security app for iOS with VPN, web protection, and privacy features
Google's zero trust implementation for secure access without VPN
Google's zero trust implementation for secure access without VPN
Phishing-resistant MFA platform with passwordless auth and device trust
Phishing-resistant MFA platform with passwordless auth and device trust
Cloud-based ZTNA solution for secure app access without VPNs
Agentless device security platform for BYOD, managed, and external devices.
Agentless device security platform for BYOD, managed, and external devices.
Mobile security solution for Android and iOS devices with MDM capabilities
Mobile security solution for Android and iOS devices with MDM capabilities
Enterprise workspace platform providing secure access and DaaS solutions
Enterprise workspace platform providing secure access and DaaS solutions
ZTNA solution providing identity-based access to private apps
ZTNA solution providing identity-based access to private apps
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.
A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.
Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.
Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
A next-generation network scanner for identifying security configuration weaknesses in devices like routers, firewalls, and switches.
A next-generation network scanner for identifying security configuration weaknesses in devices like routers, firewalls, and switches.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.
An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.
Fleet is an open-source endpoint management platform that provides device management, vulnerability reporting, and security monitoring capabilities for IT and security teams managing large computer environments.
Fleet is an open-source endpoint management platform that provides device management, vulnerability reporting, and security monitoring capabilities for IT and security teams managing large computer environments.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance