• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Mobile Threat Defense

Mobile Threat Defense Reviews and Ratings

What is Mobile Threat Defense?

Mobile threat defense (MTD) products protect organizations from malicious threats on iOS and Android devices, at the device, network and application levels. To successfully attack a mobile device, mobile malware must circumvent the controls built into mobile OSs, such as those for app store curation and native mobile OS hardening. MTD products tend to focus on preventing and detecting anomalous behavior by collecting and analyzing indicators of compromise, as well as expected behavior. MTD products gather threat intelligence from the devices they support, as well as from external sources, and use an analysis engine that resides in the cloud, on-premises or on an MTD app installed on devices.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of IBM Security MaaS360
IBM Security MaaS360
Logo of Singularity Mobile
Singularity Mobile
Logo of Aurora Endpoint Security
Aurora Endpoint Security
For 50M-1B USD Companies
Logo of Singularity Mobile
Singularity Mobile
Logo of GlobalProtect
GlobalProtect
Logo of Lookout Mobile Endpoint Security
Lookout Mobile Endpoint Security
For Asia/Pacific
Logo of Singularity Mobile
Singularity Mobile
Logo of Sophos Intercept X for Mobile
Sophos Intercept X for Mobile
Logo of GlobalProtect
GlobalProtect
Integration & Deployment
Logo of Cortex XDR
Cortex XDR
Logo of Singularity Mobile
Singularity Mobile
Logo of Sophos Intercept X for Mobile
Sophos Intercept X for Mobile

Product Listings

Filter by

Products 1 - 20 of 40
Sort by
Logo of Harmony Mobile

Harmony Mobile

By Check Point Software Technologies

4.4
(194 Ratings)

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details
Logo of Singularity Mobile

Singularity Mobile

By SentinelOne

4.6
(159 Ratings)

SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.

Show More Details
Logo of Lookout Mobile Endpoint Security

Lookout Mobile Endpoint Security

By Lookout

4.6
(92 Ratings)

Lookout, Inc. is the data-centric cloud security company purpose-built for the intersection of enterprise and personal data. Lookout safeguards data across devices, apps, networks and clouds through our unified, cloud-native security platform — a solution that's as fluid and flexible as the modern digital world. By giving organizations and individuals greater control over their data, Lookout enables them to unleash its value and thrive. Lookout is trusted by enterprises of all sizes, government agencies and millions of consumers to protect sensitive data, enabling them to live, work and connect — freely and safely.

Show More Details
Logo of GlobalProtect

GlobalProtect

By Palo Alto Networks

4.4
(84 Ratings)
customers choice 2025

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Show More Details
Logo of Symantec Endpoint Protection Mobile

Symantec Endpoint Protection Mobile

By Broadcom

4.2
(75 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Sophos Intercept X for Mobile

Sophos Intercept X for Mobile

By Sophos

4.4
(64 Ratings)

Sophos is a global provider of advanced cybersecurity solutions. Their main focus is the delivery of an extensive range of security technologies including Managed Detection and Response (MDR), incident response services, as well as endpoint, network, email, and cloud security systems. These products and services are designed to help organizations combat various cyber threats such as active adversaries, ransomware, phishing, and malware. The company offers fully-managed, turnkey security solutions, providing cybersecurity-as-a-service to organizations worldwide. Moreover, Sophos hosts a cloud-based management console, known as Sophos Central, and supports the Sophos X-Ops, a cross-domain threat intelligence unit. The unit enriches the Sophos Adaptive Cybersecurity Ecosystem by optimizing its centralized data lake with a powerful set of open APIs. Sophos' operations are globally distributed and the company's headquarters are in Oxford, U.K.

Show More Details
Logo of CrowdStrike Falcon

CrowdStrike Falcon

By CrowdStrike

4.5
(59 Ratings)

CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.

Show More Details
Logo of Zimperium Mobile Threat Defense (MTD)

Zimperium Mobile Threat Defense (MTD)

By Zimperium

4.4
(58 Ratings)

Zimperium provides enterprise mobile security solutions that protect both applications and devices across iOS and Android platforms.

Using machine learning and behavioral analysis, Zimperium’s technology helps organizations identify and mitigate mobile threats such as phishing, malware, app vulnerabilities, and device compromise.

The solutions are designed to operate without reliance on cloud-based detection, enabling secure, real-time threat prevention while supporting compliance and risk management across mobile environments.

Show More Details
Logo of Microsoft Defender for Endpoint

Microsoft Defender for Endpoint

By Microsoft

4
(51 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of IBM Security MaaS360

IBM Security MaaS360

By IBM

4.5
(31 Ratings)

IBM is a well-established entity focused on technology and development. The primary mission revolves around fostering technological growth and enhancing infrastructure, achieved through focused developments and consulting services. By encouraging inventiveness and innovation, it is geared towards facilitating the transition of theoretical ideas into practical realities, thus improving global functionalities. IBM brings about transformation by creating advanced solutions that reshape and redefine the world.

Show More Details
Logo of Ivanti Neurons for Mobile Threat Defense

Ivanti Neurons for Mobile Threat Defense

By Ivanti

4.1
(27 Ratings)

Ivanti manages and secures Everywhere Work environments so that organizations and employees can improve their digital employee experience (DEX). Ivanti technology focuses on empowering IT and employees. Ivanti solutions let IT and employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive. Ivanti solutions find, manage and protect each IT asset and endpoint in an organization, no matter the OS. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency.

Show More Details
Logo of Jamf Protect

Jamf Protect

By Jamf

4.6
(26 Ratings)

Jamf is a company that specializes in managing and securing Apple at work. Known as a standard in its field, the company caters to businesses, education institutions, and government organizations. The firm achieves this through its software and with the assistance of Jamf Nation, which comprises over 100,000 members and is the world's most extensive community of Apple IT administrators. As of now, Jamf's services have been entrusted with over 31.3 million Apple devices by around 73,500 global customers. The company continues to expand in international markets.

Show More Details
Logo of Pradeo Security Mobile Threat Defense

Pradeo Security Mobile Threat Defense

By Pradeo

4.4
(23 Ratings)

Pradeo is a company that focuses on mobile security. With global operations, it delivers services aimed at safeguarding smartphones, tablets, and mobile applications. The firm's primary solution, Pradeo Security, employs advanced AI-based technology to offer robust defense against mobile threats. This technology helps to prevent data leakage and enhances compliance with data privacy regulations. The business caters to a diverse range of sectors including the public sector and private companies. Pradeo maintains a cooperative approach, developing integrations and joint solutions with enterprise mobility companies around the world.

Show More Details
Logo of Trend Micro Mobile Security

Trend Micro Mobile Security

By Trend Micro

4.5
(23 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Aurora Endpoint Security

Aurora Endpoint Security

By Arctic Wolf Networks

4.5
(14 Ratings)

Arctic Wolf envisions a future without cyber risk. Every organization should be so effective at security operations that both the likelihood and impact of a cyber attack is minimized to the point where risk is essentially zero. Arctic Wolf's Mission: End Cyber Risk.

Show More Details
Logo of Cortex XDR

Cortex XDR

By Palo Alto Networks

4.5
(13 Ratings)
customers choice 2025

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Show More Details
Logo of Corrata

Corrata

By Corrata

4.9
(10 Ratings)

Corrata delivers advanced threat detection and response for mobile endpoints. The core capabilities of its technology cater to the security needs of iOS and Android operating systems. Corrata's proprietary software detects and disarms malware, thwarts phishing attacks, and eliminates device and network vulnerabilities. Additionally, it ensures that compromised devices are blocked from accessing critical information whilst maintaining employees' right to privacy. The firm is a member of the Microsoft Intelligent Security Association and is compatible with FirstNet, a network specifically designed for first responders powered by AT&T.

Show More Details
Logo of Cisco Secure Endpoint

Cisco Secure Endpoint

By Cisco Systems

4.1
(7 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of Better Mobile Threat Defense

Better Mobile Threat Defense

By Better Mobile Security

5
(6 Ratings)
Show More Details
Logo of Trustd MTD

Trustd MTD

By Traced

4.3
(6 Ratings)

Traced is a firm that focuses on mobile security. It offers a mobile application, compatible with both Android and iOS devices, that aims to protect individual users from potential threats. In conjunction with this app, the company also provides a solution known as Mobile Threat Defense (MTD). This service offers businesses the ability to detect, analyze, investigate, and respond to security threats on mobile platforms.

Show More Details

Gartner Research

Market Guide for Mobile Threat Defense
Gartner Peer Insights 'Voice of the Customer': Mobile Threat Defense

Top Trending Products

Harmony MobileCrowdStrike FalconSymantec Endpoint Protection MobileSingularity Mobile

Popular Product Comparisons

Harmony Mobile vs Lookout Mobile Endpoint SecurityLookout Mobile Endpoint Security vs Zimperium Mobile Threat Defense (MTD)Harmony Mobile vs Zimperium Mobile Threat Defense (MTD)Harmony Mobile vs Singularity MobileLookout Mobile Endpoint Security vs Singularity MobileMicrosoft Defender for Endpoint vs Zimperium Mobile Threat Defense (MTD)Lookout Mobile Endpoint Security vs Symantec Endpoint Protection Mobile

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.