getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Applications for Android - Page 4

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


92 software options

Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

With detailed visibility over user behavior, permissions, security states, and more, you can ensure your data is protected from internal and external threats.

Read more about Lepide Data Security Platform

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden offers complete identity cybersecurity in a single package - ensuring that user, application, machine, AI, and cloud identities across your entire IT landscape are protected under a single pane.

Read more about Securden

Users also considered
FileFlex logo

Zero Trust Data Access Overlay Service

learn more
FileFlex Enterprise is a zero trust overlay service that governs, restricts and manages remote access and sharing of unstructured data across your entire hybrid-IT multi-domain environment of on-premises, cloud-hosted and SharePoint storage.

Read more about FileFlex

Users also considered
Clario logo

One Clario app. Complete cybersecurity.

learn more
Clario is a cybersecurity app that combines VPN, data breach monitoring, antivirus, ad blocker, and other great security tools. It helps users secure their devices and online identity from viruses, hacking, ID theft, or spying - all in real-time. One Clario account easily protects up to three iOS, Android, or macOS devices.

Read more about Clario

Users also considered
Panzura logo

Award-winning hybrid, multi-cloud data management

learn more
Award-winning hybrid, multi-cloud data management platform. Panzura's cloud product suite includes CloudFS, Data Services, Smart Apps, and Global Services. Panzura solves all your most critical cloud data management challenges.

Read more about Panzura

Users also considered
zScan logo

Cloud-based application development and cybersecurity tool

learn more
zScan helps app developers create and deploy mobile software applications by managing comprehensive aspects of the software development cycle. Key attributes include IT risk management, compliance control, audit management, alert notifications, legal risk assessments, and CAPA.

Read more about zScan

Users also considered
BlackCloak logo

Protect Your Executives Personal Lives, Protect Your Company

learn more
BlackCloak helps reduce enterprise risk by providing online privacy protection, home network security, device security, identity theft protection, and cybersecurity incident response to executives in their personal digital lives.

Read more about BlackCloak

Users also considered
remote.it logo

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
DAtAnchor logo

Cloud-based cybersecurity solution

learn more
Anchor is a cloud-based data security solution that provides businesses with a comprehensive solution to defend against insider threats, cyber-attacks, and data loss. Anchor protects data by providing a high level of encryption with AES 256-bit military-grade encryption and real-time tracking of sensitive data. Anchor also offers multi-factor access controls to provide greater visibility into who has access and when they accessed files.

Read more about DAtAnchor

Users also considered
Flusk Vault logo

Software for securing and monitoring the Bubble app

learn more
Flusk Vault monitors your Bubble app round the clock for your secrets and sensitive data. The platform automatically catches leaks and mistakes, helping users build a secure and compliant app.

Read more about Flusk Vault

Users also considered
ShadowHQ logo

Out-of-band collaboration platform used during Cyber Attacks

learn more
ShadowHQ is a communications and document storage platform that is deployed the moment a cyber attack is initiated.

It provides:
- secure communications [instant text, mass text, recorded video],
- war rooms [IT, PR, Shareholders, Sales], and
- secure document storage [playbooks, press releases].

Read more about ShadowHQ

Users also considered
HighGround logo

Governance, risk & compliance (GRC) solution

learn more
HighGround offers a suite of functionality and services that enables businesses to manage and control all elements of their cyber security providing what they need and when they need it. HighGround provides management dashboards with KPIs for IT teams and business leaders to measure their cyber posture in a way the board understands and with easy-to-action solutions.

Read more about HighGround

Users also considered
CTM360 logo

Global Digital Risk Protection Platform

learn more
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered
Redamp.io logo

Simplified protection for mobile, desktop and server devices

learn more
Redamp.io revolutionizes digital safety, safeguarding endpoints, networks, and privacy. With our apps, users protect devices, ensure network security, and stay updated. We verify physical device security and monitor app safety.

Read more about Redamp.io

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
CalQRisk logo

An Integrated Modular Software Solution, Tailored to you

learn more
CalQRisk is a modular Governance, Risk & Compliance (GRC) software solution, with pick and choose modules and customisable risk registers to suit your business needs.


CalQRisk allows teams to focus on the important tasks, saving you time and money.

Read more about CalQRisk

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered