Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Regain authority over your applications by effectively monitoring and identifying mobile security threats. With Promon INSIGHT™, you can safely oversee, identify, and swiftly address both familiar and unfamiliar dangers. The reporting capabilities are designed to gather insights regarding the app’s operational environment and particular security vulnerabilities. Promon INSIGHT™ allows you essential time to respond to potential threats as they arise. Its capability to report discreetly back to servers ensures that cybercriminals executing targeted attacks remain oblivious to their detection. Gain a comprehensive understanding of your app's execution context and security health. Promon INSIGHT™ offers reliable reporting techniques that can be counted on, in contrast to other technologies that may be easily compromised, rendering their reports unreliable. By employing thorough monitoring methods that surpass what standard APIs can offer, Promon INSIGHT™ is adept at recognizing irregularities that other reporting solutions may overlook. This level of insight significantly enhances your app's defense mechanisms against potential threats.

Description

In contrast to cloud-dependent mobile security solutions that depend on app sandboxing or traffic tunneling, Trellix Mobile is installed directly on mobile devices, ensuring continuous protection regardless of how a device connects—whether through a corporate network, a public Wi-Fi hotspot, a cellular network, or even when offline. By utilizing machine learning algorithms, it detects anomalies in device behavior to reveal signs of compromise and effectively pinpoint sophisticated attacks targeting devices, applications, and networks. This solution enhances oversight and management of mobile devices from the same interface that administers OS-based endpoints, servers, containers, and IoT devices. It allows employees to use their devices freely while addressing the human element, all without sacrificing user experience or infringing on privacy. Trellix Mobile is compatible with both Android and iOS platforms, including iPhones and iPads, ensuring comprehensive security coverage across various devices. With such a robust solution in place, organizations can confidently protect their mobile assets in an increasingly connected world.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

OneSpan Identity Verification

Integrations

OneSpan Identity Verification

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Promon

Founded

2006

Country

Norway

Website

promon.co/software-security-solutions/data-reporting/

Vendor Details

Company Name

Trellix

Founded

2022

Country

United States

Website

www.trellix.com/products/mobile-security/

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Product Features

Alternatives

Alternatives

BETTER Mobile Reviews

BETTER Mobile

Better Mobile Security
Acunetix Reviews

Acunetix

Invicti Security
GlobalProtect Reviews

GlobalProtect

Palo Alto Networks
K2 Security Platform Reviews

K2 Security Platform

K2 Cyber Security