Service Provider

JuiceSSH
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated JuiceSSH Alternatives

JuiceSSH Reviews & Provider Details

JuiceSSH Overview

What is JuiceSSH?

JuiceSSH is an SSH client for Android that includes SSH, Local Shell, and Telnet support.

JuiceSSH Details
Show LessShow More
Provider Description

JuiceSSH is an SSH client for Android that includes SSH, Local Shell, and Telnet support.


Seller

JuiceSSH

Description

JuiceSSH is a comprehensive SSH client designed for Android devices, offering users a simple and efficient way to manage and connect to their servers remotely. It supports SSH, Local Shell, Mosh, and Telnet connections, providing flexibility and wide-ranging compatibility. Key features include terminal access with intuitive copy/paste functionality, full-color support, and the ability to manage multiple connections simultaneously. JuiceSSH also offers password and key authentication options, helping to ensure secure access to remote systems. For developers and IT professionals on the go, JuiceSSH presents a user-friendly solution for managing server tasks directly from a mobile device.

Recent JuiceSSH Reviews

Verified User
G
Verified UserEnterprise (> 1000 emp.)
5.0 out of 5
"Great app to connect to your network devices"
I used the JuiceSSH app (free version) in my mobile phone to connect remotely to the internal network devices in the enterprise environment. I also...

JuiceSSH Media

Answer a few questions to help the JuiceSSH community
Have you used JuiceSSH before?
Yes

1 JuiceSSH Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 JuiceSSH Reviews
5.0 out of 5
1 JuiceSSH Reviews
5.0 out of 5
G2 reviews are authentic and verified.
Verified User in Tobacco
GT
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
Describe the project or task JuiceSSH helped with:

I used the JuiceSSH app (free version) in my mobile phone to connect remotely to the internal network devices in the enterprise environment. I also was able to use it while using a VPN connection outside of the network without issues. Review collected by and hosted on G2.com.

What do you like best about JuiceSSH?

Something I really like about the application is the ability to configure multiple credentials to be used and the ability to add multiple devices so you can manage them directly from your mobile. Also, it is ads-free. Review collected by and hosted on G2.com.

What do you dislike about JuiceSSH?

I don't have any issues so far with JuiceSSH. I consider it satisfies my needs. Review collected by and hosted on G2.com.

What problems is JuiceSSH solving and how is that benefiting you?

While doing my work outside the office, I don't need to carry on my heavy laptop with me. I just need my mobile phone. Review collected by and hosted on G2.com.

There are not enough reviews of JuiceSSH for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynomi vCISO Platform Logo
Cynomi vCISO Platform
4.9
(22)
Cynomi’s vCISO platform empowers MSSPs, MSPs and consultancies to offer structured cybersecurity services to SMEs at scale and provide them with proactive cyber resilience.  Combining proprietary AI algorithms with CISO-level knowledge, Cynomi’s platform streamlines the vCISO's work while automating manual time-consuming tasks.  Cynomi helps partners overcome the cybersecurity skill gap and scale their business, allowing them to offer new services and increase revenues while reducing operational costs.
2
Rapid7 Security Services Logo
Rapid7 Security Services
3.8
(11)
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.
3
2nd Watch Logo
2nd Watch
4.5
(8)
2nd Watch is an APN Premier Consulting Partner providing managed cloud to enterprises. The company's subject matter experts, software-enabled services and cutting-edge solutions provide companies with tested, proven, and trusted solutions, allowing them to fully leverage the power of the public cloud.
4
Fingerprint Cards AB Logo
Fingerprint Cards AB
4.5
(1)
Fingerprint Cards AB (FPC) markets, develops and produces biometric components and technologies that through the analysis and matching of an individuals unique fingerprint verify the persons identity.
5
NCC Group Logo
NCC Group
4.3
(4)
Through an unrivalled suite of services, we provide organizations with peace of mind that that their most important assets are protected, available and operating as they should be at all times.
6
Thales Logo
Thales
4.0
(2)
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored.
7
Little Snitch Logo
Little Snitch
5.0
(2)
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t. But you don’t notice anything, because all of this happens invisibly under the hood. Little Snitch makes these Internet connections visible and puts you back in control!
8
Azure Dedicated HSM Logo
Azure Dedicated HSM
3.5
(2)
9
VertexGraph Logo
VertexGraph
5.0
(1)
Smart Secure Access Service Edge (S-SASE) solution built on top of Zero Trust 2.0 technology
10
Basmat Aman Cybersecurity Foundation Logo
Basmat Aman Cybersecurity Foundation
5.0
(1)
Security Print, a specialized institution operating in the field of cybersecurity, accredited and licensed by the Saudi Ministry of Commerce, providing its services worldwide.
Show More