Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

30 Coolest Mobile Device Management And Security Companies: 2019 Mobility 100

We've rounded up the leading security vendors focused on mobile threats to businesses, along with the top providers of mobile device management solutions.

Back 1   2   3   ... 12 Next
photo

Check Point Software Technologies

Top Executive: Gil Shwed, CEO

Headquarters: San Carlos, Calif., and Israel

Check Point has sought to bring a comprehensive approach to mobile security with solutions including SandBlast Mobile (mobile threat defense for Android and iOS devices), Capsule Workspace (for securing business environments on mobile) and SandBlast Agent endpoint protection (which offers unified management and policy enforcement across Windows and macOS). Meanwhile, Check Point's Infinity architecture includes threat intelligence that can be shared with mobile devices.

photo

Citrix Systems

Top Executive: David Henshall, CEO

Headquarters: Fort Lauderdale, Fla.

Citrix Endpoint Management, formerly known as XenMobile, is a unified endpoint management solution for managing all devices within an organization including laptops, smartphones and tablets. The solution also offers mobile app management along with configuration and management of shared devices and apps.

photo

Comodo

Top Executive: Melih Abdulhayoglu, CEO

Headquarters: Clifton, N.J.

Comodo's mobile device management offering provides automated enrollment and configuration of iOS and Android devices, along with enforcement of BYOD policies. Key capabilities include lifecycle management for devices and data; configuration of application whitelists and blacklists; and requiring devices to be encrypted and compliant before corporate email can be accessed.

 
 
Back 1   2   3   ... 12 Next

sponsored resources