• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Mobile Threat Defense

Mobile Threat Defense Reviews and Ratings

What is Mobile Threat Defense?

Mobile threat defense (MTD) products protect organizations from malicious threats on iOS and Android devices, at the device, network and application levels. To successfully attack a mobile device, mobile malware must circumvent the controls built into mobile OSs, such as those for app store curation and native mobile OS hardening. MTD products tend to focus on preventing and detecting anomalous behavior by collecting and analyzing indicators of compromise, as well as expected behavior. MTD products gather threat intelligence from the devices they support, as well as from external sources, and use an analysis engine that resides in the cloud, on-premises or on an MTD app installed on devices.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of IBM Security MaaS360
IBM Security MaaS360
Logo of Singularity Mobile
Singularity Mobile
Logo of Aurora Endpoint Security
Aurora Endpoint Security
For 50M-1B USD Companies
Logo of Singularity Mobile
Singularity Mobile
Logo of Lookout Mobile Endpoint Security
Lookout Mobile Endpoint Security
Logo of IBM Security MaaS360
IBM Security MaaS360
For Asia/Pacific
Logo of Singularity Mobile
Singularity Mobile
Logo of CrowdStrike Falcon
CrowdStrike Falcon
Logo of GlobalProtect
GlobalProtect
Integration & Deployment
Logo of Singularity Mobile
Singularity Mobile
Logo of Cortex XDR
Cortex XDR
Logo of Sophos Intercept X for Mobile
Sophos Intercept X for Mobile

Product Listings

Filter by

Products 1 - 20 of 40
Sort by
Logo of Harmony Mobile

Harmony Mobile

By Check Point Software Technologies

4.4
(195 Ratings)

Harmony Mobile is a software developed by Check Point that provides threat prevention and security for mobile devices within an organization. The software offers protection against malware, phishing, and network attacks aimed at mobile endpoints. Harmony Mobile monitors device activity and evaluates applications to detect malicious behaviors and safeguard sensitive business data. The software facilitates compliance with corporate security policies and integrates with existing mobile device management solutions to streamline administration. By identifying and mitigating security risks on mobile devices, Harmony Mobile addresses business concerns related to unauthorized data access and potential cyber threats, helping organizations maintain secure mobile operations.

Show More Details
Logo of Singularity Mobile

Singularity Mobile

By SentinelOne

4.6
(159 Ratings)

Singularity Mobile is a software designed to provide comprehensive endpoint protection for mobile devices. It utilizes behavioral artificial intelligence to identify and respond to security threats such as malware, phishing, and network vulnerabilities across Android and iOS platforms. The software supports device management functions, enabling organizations to monitor compliance and enforce security policies remotely. Singularity Mobile integrates with enterprise security frameworks to deliver unified threat visibility and streamline incident response processes. Its features are designed to address business challenges associated with securing corporate data, maintaining regulatory compliance, and minimizing risk from mobile-centric attacks within an organization’s technology environment.

Show More Details
Logo of Lookout Mobile Endpoint Security

Lookout Mobile Endpoint Security

By Lookout

4.6
(92 Ratings)

Lookout Mobile Endpoint Security is a software designed to protect mobile devices by identifying and mitigating security threats such as malware, phishing, and network attacks. The software offers real-time threat detection and security intelligence to monitor mobile endpoints and safeguard sensitive data. It enables organizations to set security policies, detect vulnerabilities, and respond to incidents across both iOS and Android platforms. Through integration with enterprise mobility management systems, the software helps maintain compliance and ensures that mobile devices used for business purposes are protected against emerging risks. The solution addresses the need for securing mobile endpoints in environments where bring-your-own-device practices and remote work are prevalent.

Show More Details
Logo of GlobalProtect

GlobalProtect

By Palo Alto Networks

4.4
(84 Ratings)
customers choice 2025

GlobalProtect is a software that enables organizations to secure their network perimeter by extending protection to remote users, mobile devices, and branch locations. It integrates with existing firewall infrastructure to provide consistent security policies across on-premises and remote environments. The software features advanced capabilities such as threat prevention, secure access, and encrypted communications, supporting zero trust network access principles. GlobalProtect addresses business challenges related to maintaining secure connectivity for distributed workforces, managing device compliance, and ensuring visibility and control over network traffic regardless of the user’s location. It is designed to help organizations reduce the risk of unauthorized access and data breaches by enforcing security standards for all endpoints.

Show More Details
Logo of Symantec Endpoint Protection Mobile

Symantec Endpoint Protection Mobile

By Broadcom

4.2
(75 Ratings)

Symantec Endpoint Protection Mobile is a software designed to safeguard mobile devices from a range of digital threats. The software identifies, analyzes, and mitigates risks including malware, network-based attacks, phishing, and device vulnerabilities. It uses machine learning and behavioral analysis to detect both known and unknown threats. The software offers real time protection and integrates with enterprise mobility management solutions to enforce security policies across smartphones and tablets. By providing visibility into mobile risk posture and automating threat response, the software helps organizations protect sensitive business data and support compliance requirements.

Show More Details
Logo of CrowdStrike Falcon

CrowdStrike Falcon

By CrowdStrike

4.5
(65 Ratings)

The CrowdStrike Falcon platform features a single lightweight agent that delivers cutting-edge, AI-powered real-time protection and visibility. Designed to defend endpoints and workloads both on and off the network, it stops threats before they become breaches. Backed by adversary-driven threat intelligence and AI, the Falcon platform processes trillions of global events weekly in real time, fueling an advanced security data platform accessible through a unified command console.

Show More Details
Logo of Sophos Intercept X for Mobile

Sophos Intercept X for Mobile

By Sophos

4.4
(64 Ratings)

Sophos Intercept X for Mobile is a software designed to provide security for mobile devices by protecting against malware, ransomware, phishing, and unauthorized access. The software features real-time scanning, anti-malware technology, and web protection to identify and block threats. It enables compliance management, monitors device health, and assesses risk to prevent data loss. Additional features include management support for device encryption, secure access to corporate resources, and the ability to remotely lock, wipe, or locate devices if stolen or lost. Sophos Intercept X for Mobile addresses the business problem of safeguarding sensitive information and maintaining operational security across mobile endpoints in organizational environments.

Show More Details
Logo of Zimperium Mobile Threat Defense (MTD)

Zimperium Mobile Threat Defense (MTD)

By Zimperium

4.4
(59 Ratings)

Zimperium Mobile Threat Defense is a software designed to identify, assess, and mitigate risks associated with mobile devices in enterprise environments. The software provides real-time detection of mobile threats such as malware, phishing attempts, and network attacks. It utilizes on-device machine learning to analyze device behavior and safeguard sensitive data without impacting user privacy. Zimperium Mobile Threat Defense integrates with existing mobile device management solutions and delivers actionable insights to administrators to support compliance requirements and minimize security incidents. The software addresses the business challenge of protecting organizational data from threats targeting mobile platforms in both managed and unmanaged device scenarios.

Show More Details
Logo of Microsoft Defender for Endpoint

Microsoft Defender for Endpoint

By Microsoft

4
(52 Ratings)

Microsoft Defender for Endpoint is an endpoint security software designed to detect, investigate, and respond to advanced threats across devices within an organization. The software provides protection against malware, ransomware, and other malicious activities by leveraging behavioral sensors, threat intelligence, and cloud-based analytics. It supports automated response and remediation actions, secures data through attack surface reduction, and integrates with other security solutions for centralized management. Microsoft Defender for Endpoint addresses business challenges related to protecting endpoints from evolving cyber threats, managing vulnerabilities, and maintaining compliance with organizational security policies.

Show More Details
Logo of IBM Security MaaS360

IBM Security MaaS360

By IBM

4.6
(32 Ratings)

IBM Security MaaS360 is a software designed for enterprise mobility management, providing organizations with tools to manage and secure mobile devices, applications, and content. It offers features including device enrollment, policy enforcement, threat management, and compliance monitoring across various operating systems. The software enables IT administrators to gain visibility into device status, configure security settings, and control data access to support organizational security policies. It addresses business needs related to protecting sensitive corporate data, managing a distributed mobile workforce, and ensuring regulatory compliance while facilitating mobile productivity.

Show More Details
Logo of Ivanti Neurons for Mobile Threat Defense

Ivanti Neurons for Mobile Threat Defense

By Ivanti

4.1
(27 Ratings)

Ivanti Neurons for Mobile Threat Defense protects and remediates against known and zero-day threats in motion and on device. Ivanti Neurons for Mobile Threat Defense (MTD) allows you to protect both corporate and employee-owned Android and iOS devices from advanced threats. It enables enterprises to monitor, manage and secure devices against attacks that occur at the device, network and application levels as well as prevent mobile phishing attacks.

Show More Details
Logo of Jamf Protect

Jamf Protect

By Jamf

4.6
(26 Ratings)

Jamf Protect is a software designed to provide endpoint security solutions for Apple devices in enterprise environments. The software offers features such as real-time monitoring, threat detection, incident response, and compliance management. Jamf Protect helps organizations to identify and address security vulnerabilities, prevent malware and unauthorized access, and ensure regulatory compliance across Mac endpoints. The software integrates with existing IT infrastructure, enabling security operations teams to manage device protection, analyze security data, and automate response actions efficiently. Jamf Protect addresses the business need for maintaining device security, safeguarding sensitive data, and supporting IT policies within Apple-focused environments.

Show More Details
Logo of Pradeo Security Mobile Threat Defense

Pradeo Security Mobile Threat Defense

By Pradeo

4.3
(23 Ratings)

Pradeo Security Mobile Threat Defense is a software that provides protection for mobile devices by detecting and analyzing threats such as malware, phishing, and network attacks. The software enables organizations to secure their mobile fleet by continuously monitoring installed applications, network connections, and device configurations. It offers features such as real-time threat detection, behavioral analysis, and compliance controls to mitigate risks associated with mobile usage. By identifying vulnerabilities and unauthorized data access, the software helps organizations maintain the integrity of their mobile infrastructure and ensure the confidentiality of sensitive information.

Show More Details
Logo of Trend Micro Mobile Security

Trend Micro Mobile Security

By Trend Micro

4.5
(23 Ratings)

Trend Micro Mobile Security is a software designed to protect mobile devices against security threats such as malware, viruses, phishing attempts, and fraudulent websites. The software provides real-time threat detection, privacy protection, and safeguards against unauthorized access to sensitive information stored on mobile devices. It helps maintain device security during web browsing, application usage, and network connections, allowing organizations and individuals to address concerns related to mobile device vulnerabilities and data breaches. The software includes features for managing app permissions, tracking lost devices, and securing personal data, supporting compliance with security policies for businesses and individual users.

Show More Details
Logo of Cortex XDR

Cortex XDR

By Palo Alto Networks

4.5
(15 Ratings)
customers choice 2025

Cortex XDR is a software developed by Palo Alto Networks that integrates data from network, endpoint, and cloud sources to detect, investigate, and respond to cyber threats. The software enables security teams to identify suspicious behavior, conduct root cause analysis, and respond to incidents through automated response capabilities. It provides analytics-driven threat prevention and leverages behavioral analytics to correlate alerts across different environments, helping organizations reduce risks from advanced attacks. Cortex XDR addresses challenges of fragmented security data and manual threat investigations by consolidating security operations into a single platform, allowing for more efficient detection and response workflows.

Show More Details
Logo of Aurora Endpoint Security

Aurora Endpoint Security

By Arctic Wolf Networks

4.5
(14 Ratings)

CylanceENDPOINT is an AI-based Endpoint Protection Platform (EPP) that leverages Cylance® 7th generation AI and machine learning capabilities to block cyberattacks and provides flexible controls for safeguarding against sophisticated threats even working offline. – No human intervention, internet connections, signatures files, heuristics, or sandboxes required. In addition, taking a comprehensive approach to be preventative-first CylanceENDPOINT aims to prevent the zero-day threat, and phishing attacks, effectively stopping ransomware in its tracks on every device you have.

Show More Details
Logo of Corrata

Corrata

By Corrata

4.9
(10 Ratings)

Corrata is a mobile security software designed to protect smartphones and tablets from online threats, unsecured connections, and unauthorized access to sensitive data. The software provides features such as threat detection, content filtering, application monitoring, and data loss prevention for mobile devices. Corrata aims to address business challenges related to mobile device security by enabling organizations to enforce compliance policies, manage internet usage, and block access to malicious or inappropriate content. It operates without requiring routing of traffic through an external gateway and is managed through a central console to provide administrators with visibility and control over mobile security risks within an enterprise environment.

Show More Details
Logo of Cisco Secure Endpoint

Cisco Secure Endpoint

By Cisco Systems

4.1
(7 Ratings)

Cisco Secure Endpoint is a software designed to provide advanced endpoint protection through threat detection, prevention, and response capabilities. The software integrates with security infrastructures to monitor endpoint activities, block malicious behavior, and contain threats. It enables centralized management, leveraging cloud and on-premises options for deployment. Cisco Secure Endpoint uses behavioral analytics, machine learning, and retrospective analysis to identify suspicious files and processes, helping organizations safeguard sensitive data and maintain compliance requirements. The software assists business teams in streamlining investigation and remediation workflows, reducing manual effort and improving operational efficiency for endpoint security management across diverse device environments.

Show More Details
Logo of Better Mobile Threat Defense

Better Mobile Threat Defense

By Better Mobile Security

5
(6 Ratings)
Show More Details
Logo of Trustd MTD

Trustd MTD

By Traced

4.3
(6 Ratings)

Trustd MTD is a software designed to protect mobile devices by identifying and mitigating security threats such as malware, phishing attempts, and network attacks. The software offers features including real-time scanning, vulnerability detection, and privacy risk monitoring to help organizations secure sensitive data on smartphones and tablets. Trustd MTD enables visibility into potential risks and supports compliance with security policies by alerting users and administrators to suspicious activity or unauthorized access. The software addresses business challenges related to data breaches and mobile device exploitation by delivering comprehensive threat assessment and response capabilities for enterprise environments.

Show More Details

Gartner Research

Market Guide for Mobile Threat Defense
Gartner Peer Insights 'Voice of the Customer': Mobile Threat Defense

Top Trending Products

CrowdStrike FalconCortex XDRIBM Security MaaS360Harmony MobileZimperium Mobile Threat Defense (MTD)Microsoft Defender for EndpointSingularity MobileBugsmirror MASST

Popular Product Comparisons

Harmony Mobile vs Lookout Mobile Endpoint SecurityLookout Mobile Endpoint Security vs Zimperium Mobile Threat Defense (MTD)Harmony Mobile vs Zimperium Mobile Threat Defense (MTD)Harmony Mobile vs Singularity MobileLookout Mobile Endpoint Security vs Singularity MobileMicrosoft Defender for Endpoint vs Zimperium Mobile Threat Defense (MTD)Lookout Mobile Endpoint Security vs Symantec Endpoint Protection Mobile

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.