Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ESET PROTECT Advanced Reviews & Ratings
    2,051 Ratings
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    374 Ratings
  • ManageEngine EventLog Analyzer Reviews & Ratings
    159 Ratings
  • ConnectWise SIEM Reviews & Ratings
    186 Ratings
  • Safetica Reviews & Ratings
    358 Ratings
  • Criminal IP Reviews & Ratings
    11 Ratings
  • Fraud.net Reviews & Ratings
    56 Ratings
  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
  • Source Defense Reviews & Ratings
    7 Ratings
  • Omnilert Reviews & Ratings
    26 Ratings

What is Symantec Endpoint Protection Mobile?

To effectively protect mobile devices and applications from advanced threats, it is crucial to utilize threat defense solutions that amalgamate various technologies, including vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling, and transport security. Mobile devices are not just compact computers; they are continuously active and permanently connected to the Internet, which calls for creative approaches to maintain data integrity while enhancing user productivity. In response to these specific challenges, Symantec created a risk-based mobile security framework within its Mobile Threat Defense, specifically designed to tackle a diverse range of threats that could endanger business data through exposure, theft, or manipulation—all while ensuring user privacy and a seamless mobile experience. By leveraging both on-device and cloud-based machine learning capabilities, this system can swiftly identify numerous threats. This innovative method facilitates real-time analysis, detection, and protection at a scale that aligns with the needs of contemporary mobile environments, thereby enabling users to operate with confidence without sacrificing security. Ultimately, the integration of these advanced technologies is vital for adapting to the evolving landscape of mobile cybersecurity.

What is Symantec Advanced Authentication?

Strengthen your security measures and promote growth with Symantec's Advanced Authentication solutions. Our cutting-edge technology ensures real-time protection for both online and mobile environments. By utilizing our innovative methods, we can effortlessly confirm the identities of employees, partners, or contractors while maintaining a seamless login experience. This function enables authorized users to access their accounts from anywhere at any time, which helps build trust and loyalty towards your brand. Experience a flexible and scalable system that combines strong multi-factor authentication with risk-based strategies such as device identification, geolocation tracking, and monitoring user behavior. Given the daily occurrence of severe cyber incidents, we empower you to effectively safeguard your organization. Additionally, by providing a smooth and user-friendly experience for your customers, you can enhance their trust and dedication. Moreover, harnessing precise data allows you to distinguish more easily between legitimate interactions and fraudulent ones, significantly enhancing your overall security framework. In this way, you not only protect sensitive information but also create a safer digital environment for all stakeholders involved.

Media

Media

Integrations Supported

AuthControl Sentry
BMC AMI Ops Automation for Capping
BMC Helix Cloud Cost
BeyondCorp Enterprise
Check Point IPS
Comarch Business Intelligence
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Wealth Management
Delinea Cloud Access Controller
EV Observe
Elevate Security
Fasoo Data Radar
Intercede MyID
SSL2BUY
SecureW2
SquaredUp
ThreatAware
iTalent

Integrations Supported

AuthControl Sentry
BMC AMI Ops Automation for Capping
BMC Helix Cloud Cost
BeyondCorp Enterprise
Check Point IPS
Comarch Business Intelligence
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Wealth Management
Delinea Cloud Access Controller
EV Observe
Elevate Security
Fasoo Data Radar
Intercede MyID
SSL2BUY
SecureW2
SquaredUp
ThreatAware
iTalent

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/info/endpoint-security/protection-mobile

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/info/authentication

Categories and Features

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Popular Alternatives

CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike

Popular Alternatives

Comodo MDR Reviews & Ratings

Comodo MDR

Comodo
zDefend Reviews & Ratings

zDefend

ZIMPERIUM
Q-scout Reviews & Ratings

Q-scout

Quokka
Secfense Reviews & Ratings

Secfense

Secfense