More and more employees are using smaller and smaller devices with loads of applications to access corporate data. Complicating matters further, mobile users don't always take the same diligence in adhering to security standards as they might when working from a desktop. From data at rest in the device itself, to data accessed in the enterprise, to data in motion between the enterprise and the device – mobility introduces an array of challenges.
The offerings recognized in this category deal with not only a collapsing perimeter, but also consumer-owned and controlled devices that access corporate resources.
FINALIST | BEST MOBILE SECURITY SOLUTION
BLACKCLOAK CYBERSECURITY & PRIVACY PLATFORM
Company: BlackCloak
Noteworthy: Combining software and services for securing mobile devices, home networks and personal privacy, Blackcloak is designed specifically to help security teams protect the company by protecting its executives in their personal digital lives.
FINALIST | BEST MOBILE SECURITY SOLUTION
LOOKOUT SECURITY PLATFORM
Company: Lookout
Noteworthy: Telemetry in the Lookout Security Graph, the foundation of the platform, is based on the analysis of nearly 200 million devices, over 125 million apps and more than 4 million URLs daily.
FINALIST | BEST MOBILE SECURITY SOLUTION
MOBILE SECURE
Company: Data Theorem
Noteworthy: Leverages the Analyzer Engine, which continuously scans native code as well as third party open source and commercial SDKs while providing visibility to security issues and privacy flaws within.
FINALIST | BEST MOBILE SECURITY SOLUTION
ONESPAN MOBILE SECURITY SUITE
Company: OneSpan
Noteworthy: Used by 2,000-plus financial institutions, including more than 60 percent of the top 100 global banks, with 10,000-plus total customers in more than 100 countries and more than 300 million licenses sold.
FINALIST | BEST MOBILE SECURITY SOLUTION
VMWARE WORKSPACE ONE
Company: VMWare
Noteworthy: Enables employees to securely access their apps across a portal or mobile app, with single sign-on (SSO) capabilities and multi-factor authentication as an added layer of security.