Save to My Lists
Unclaimed
Unclaimed

Top Rated SecurityMetrics Mobile Alternatives

SecurityMetrics Mobile Reviews & Product Details

Verified User in Real Estate
AR
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about SecurityMetrics Mobile?

The ease of which it integrated with our current systems. Review collected by and hosted on G2.com.

What do you dislike about SecurityMetrics Mobile?

Could be a little more use friendly but overall it's great. Review collected by and hosted on G2.com.

What problems is SecurityMetrics Mobile solving and how is that benefiting you?

Securing our mobile devices Review collected by and hosted on G2.com.

SecurityMetrics Mobile Overview

What is SecurityMetrics Mobile?

Find vulnerabilities, secure devices, and protect your data. Use mobile security to protect your business and customer's data from threats with SecurityMetrics Mobile.

SecurityMetrics Mobile Details
Show LessShow More
Product Description

Find vulnerabilities, secure devices, and protect your data. Use mobile security to protect your business and customer's data from threats with SecurityMetrics Mobile.


Seller Details
Year Founded
2000
HQ Location
Orem, US
Twitter
@SecurityMetrics
3,819 Twitter followers
LinkedIn® Page
www.linkedin.com
268 employees on LinkedIn®

Recent SecurityMetrics Mobile Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
3.5 out of 5
"increased our security"
The ease of which it integrated with our current systems.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

SecurityMetrics Mobile Media

Answer a few questions to help the SecurityMetrics Mobile community
Have you used SecurityMetrics Mobile before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of SecurityMetrics Mobile for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Jamf Pro Logo
Jamf Pro
4.8
(1,863)
A complete Apple management solution for IT pros to empower users and simplify the deployment, inventory, and security of Macs, iPads, and iPhones. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro (formerly Casper Suite) is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.
2
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.5
(63)
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
3
Jamf Protect Logo
Jamf Protect
4.6
(46)
Jamf Protect provides a complete endpoint protection solution to maintain endpoint compliance, monitor for, respond to, and remediate security incidents on macOS. With intuitive dashboards, real-time alerts, and extensive reporting, you’ll be the first to know when suspicious activities occur on your Apple computers. And, to minimize the use of device resources and maintain employee privacy expectations, Jamf Protect leverages the infrastructure of macOS and its Endpoint Security Framework.
4
Prey Logo
Prey
4.6
(45)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
5
Symantec Mobile Threat Defense Logo
Symantec Mobile Threat Defense
4.1
(45)
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
6
Harmony Mobile Logo
Harmony Mobile
4.5
(44)
Harmony Mobile offers enterprise mobile security that protects against threats to the OS, apps and network. Leveraging Check Point’s best-of-breed threat prevention technology, SandBlast Mobile offers the highest threat catch rate in the industry without impacting device performance or user experience.
7
Appdome Logo
Appdome
4.7
(34)
The mobile industry’s only mobile application Cyber Defense Automation platform.
8
Trend Micro Mobile Security Logo
Trend Micro Mobile Security
4.0
(28)
Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks.
9
Check Point Mobile Access Logo
Check Point Mobile Access
4.3
(28)
Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.
10
Digital Guardian Secure Collaboration Logo
Digital Guardian Secure Collaboration
4.2
(15)
Digital Guardian Secure Collaboration enables businesses of all sizes to easily secure, track and share any digital information across all platforms and devices.
Show More