Ammar Ali Alvi and Yousga Abbas – ‘Protect Me’ App that secures mobile device & encrypts it and track it even if its turned off.

“Protect Me” is a mobile security application designed to enhance the safety and privacy of your smartphone.

Designed for Android devices; ensure your device meets the app’s system requirements for optimal performance.

Features an intuitive and user-friendly interface, facilitating easy navigation and access to security tools.

Optimized to run efficiently in the background without significantly affecting device performance or battery life.

Receives frequent updates to address emerging security threats and improve functionality.

It Offers:

App Lock: Secure individual applications with a password or fingerprint, preventing unauthorized access to sensitive apps.

Secure Vault: Store important files, photos, and videos in an encrypted vault, adding an extra layer of protection to personal information.

Anti-Theft Protection: Remotely locate, lock, or wipe your device if it is lost or stolen, ensuring personal data remains secure.

Antivirus Scanner: Conduct comprehensive scans to detect and remove potential threats, providing real-time protection against malware and viruses.

Future release may provide MDM – Mobile Device Managment capability to allow –

Device Enrollment and Provisioning
Automated Enrollment: Simplifies onboarding via QR codes, NFC, or enrollment programs like Apple DEP and Android Enterprise.


Pre-configured Settings: Push predefined configurations (Wi-Fi, VPN, email, etc.) during setup.

Application Management
App Deployment: Install, update, or remove apps remotely.
App Whitelisting/Blacklisting: Restrict unauthorized applications.
App Store Control: Enable or disable access to app stores.

Policy Enforcement
Security Policies: Enforce passcodes, screen lock, and encryption.
Compliance Rules: Automatically restrict access for non-compliant devices.

Device Security
Remote Lock and Wipe: Securely lock or erase data on lost/stolen devices.
Data Loss Prevention (DLP): Prevent unauthorized data sharing, screenshotting, and copying.
Threat Protection: Detect malware, phishing attempts, or unauthorized modifications (root/jailbreak).

Inventory and Monitoring
Device Inventory: Track device types, OS versions, and hardware specifications.
Usage Monitoring: Analyze app usage, data consumption, and location tracking.

Network Management
VPN Configuration: Manage secure network access.
Wi-Fi Profile Management: Auto-connect devices to corporate Wi-Fi.
Geofencing: Restrict access or enforce policies based on location.

Content Management
Document Sharing: Securely distribute and manage corporate documents.
Access Controls: Limit document access based on user roles or locations.

Identity and Access Management
Single Sign-On (SSO): Simplify authentication with integrated credentials.
Conditional Access: Block access to corporate resources based on device compliance.

Reporting and Analytics
Compliance Reports: Generate detailed compliance and usage reports.
Device Activity Insights: Analyze device performance, app usage, and security risks.

Remote Support
Screen Sharing: Assist users by viewing their screens remotely.
Device Diagnostics: Troubleshoot issues without requiring physical access.

Multi-Platform Support
Cross-OS Management: Manage devices running Android, iOS, Windows, macOS, and Linux.
BYOD Management: Apply policies while respecting employee privacy on personal devices.

Integration Capabilities
Third-Party Integrations: Connect with ITSM, IAM, and endpoint security tools.
Enterprise Ecosystem Compatibility: Seamlessly integrate with Microsoft 365, Google Workspace, and other enterprise services.