Compare Top Mobile Application Security Software

Get to know the strength and weaknesses of top vendors in Mobile Data Security Software market. Compare vendors against their competitors on the basis of criteria, the scores of which are derived by ratings from buyers, industry experts, MnM analysts and vendors. Set comparison preferences option allows you to decide features which are important to you and evaluate vendors considering them as your parameters.

EVALUATION CRITERIA

3.94
3.87
3.83
  • Support and Services

    • Pre-Sales Support Activities

      Software Requirement Specification (SRS) | Proof of Concept | Product Demos | Dedicated Account Manager (DAM) |
    • Frequency of Support Service

      Monthly | Quarterly | Bi-Annually | Annually | Others Please specify |
    • Delivery of Support Services

      On-Site Support | Remote Support |
  • Product Features and Functionality

    • Type of Integration

      Integrated Development Environment (IDE) | Bug Tracking Systems | Build Servers | Mobile Device Management (MDM) Solutions | Governance, Risk, and Compliance (GRC) Solutions | Web Application Firewalls (WAFs) | Quality Assurance (QA) Tools | others please specify |
    • Scanning and Reporting Features Offered

      Behavioral Analysis | Analysis of Commercial Apps from App Stores | Testing of browser-based mobile apps (HTML 5 applications) | Proactive Testing | Binary Code Analysis | Vulnerability Risk Ratings | Testing of Back-End Interface of Mobile Apps | APIs for Integration | Jailbreak & Root Detection | Application Hardening | Device Binding | Interactive Dashboards | others, please specify |
    • Platform Supported

      iOS | Android | Blackberry | Windows | PhoneGap | Apache | other please specify |
  • Delivery

    • Mode of Delivery

      Full Time Equivalent | Subscription / Licensing | Per User / Device Basis |
    • End-User Catered

      Information Security Specialists | Application Development Team | Quality Assurance Team | Testing Specialists | Others, Please Specify |
    • Deployment

      On-Premise | Hosted / On-Cloud |
    • DAST and/or SAST solutions Delivery

      Directly | Through Partners / Third-Party Vendors |
  • Breadth and Depth of Product Offering

    • Type of Testing Offered

      Static Application Security Testing (SAST) | Dynamic Applications Security Testing (DAST) | Interactive Application Security Testing (IAST) |
    • Services Offered

      Education & Training | Support & Maintenance | Managed Security Services | Application Security Assessment | Source Code Security Assessment | Device Security Management | Vulnerability Assessment | Network Assessment | Penetration Testing | Consulting Services | Compliance & Risk Management | Others please specify |
    • Add-on-Products Offered

      Application Firewall | Backup and Recovery | Mobile Device Management (MDM) | Others, please specify |
  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Offices - North America

    • Sales Offices - Europe

    • Sales Offices - Asia-Pacific

    • Sales Offices - Middle East and Africa

    • Sales Offices - Latin America

    • Indirect Presence - North America

    • Indirect Presence - Europe

    • Indirect Presence - Asia-Pacific

    • Indirect Presence - Middle East and Africa

    • Indirect Presence - Latin America

  • Channel Strategy and Fit

    • Partner Ecosystem

      Distributors | System Integrators | Value Added Resellers (VAR) | Consultants | Others please specify |
  • Breadth of Applications Served

    • Industry Verticals Catered

      Government & Defense | Banking, Financial Services & Insurance (BFSI) | IT & Telecom | Healthcare & Life Sciences | Retail & eCommerce | Transportation | Energy & Utilities | Manufacturing | Education | Media and Entertainment | Travel & Hospitality | Other, please specify |
Can I help you with something?