147 results
Why Capterra is free
Go ahead. Forget your passwords. 1Password remembers them all for you. Save your passwords and log in to sites with a single click. Learn more about 1Password
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. When everyone uses 1Password, your risk goes down and your productivity goes up. Learn more about 1Password
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password i...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to d...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about SecureAnywhere
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about SecureAnywhere
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits,...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy ...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering fil...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
An award-winning solution that delivers superior protection to keep small and medium businesses protected from advanced cyberthreats. Learn more about Avast Business Antivirus Pro
Avast Business Antivirus Pro is an award-winning solution that delivers superior, enterprise-grade protection designed to keep small and medium businesses protected from sophisticated cyberthreats. Get comprehensive device and server protection with features like Wi-Fi inspector, security browser extension, SharePoint server protection, and more. Learn more about Avast Business Antivirus Pro
Avast Business Antivirus Pro is an award-winning solution that delivers superior, enterprise-grade protection designed to keep small and medium businesses protected from sophisticated cyberthreats. Get...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
INKY is powered by computer vision, and machine learning making it the most effective solution in the fight against phishing. Learn more about Inky
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques and a unique banner technology to identify and block sophisticated phishing emails that legacy email systems cannot detect. INKY works with Microsoft O365, Exchange, and Google Workspace and on all mobile devices. Learn more about Inky
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques an...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions. With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decr...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more.
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more.
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention ...
Simplified endpoint management for desktops, servers, and mobile laptops.
LogMeIn Central is a powerful, easy-to-use endpoint management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk.
LogMeIn Central is a powerful, easy-to-use endpoint management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote emplo...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the r...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signatureless exploit prevention, deep learning malware detection, anti-ransomware capabilities, root cause analysis, and more.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signaturel...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
On-prem & cloud-based unified endpoint management and security tool that helps manage organization endpoints from single console.
Desktop Central is a unified endpoint management solution that helps in managing servers, laptops, desktops, smartphones, & tablets from a central location. Using either an on-premise or a cloud-based UEM allows you to automate regular endpoint management routines like installing patches, deploying software, imaging & deploying OS, manage mobiles & BYOD devices, remote troubleshooting, modern management & much more! It also has a mobile app that allows you to manage endpoints anywhere, anytime!
Desktop Central is a unified endpoint management solution that helps in managing servers, laptops, desktops, smartphones, & tablets from a central location. Using either an on-premise or a cloud-based ...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
NinjaRMM is the easiest, all-in-one remote management and monitoring solution that MSPs and IT professionals love.
NinjaRMM is an all-in-one SaaS IT monitoring and management platform with a robust set of features to help you design, plan, deliver, operate and control IT services. You can manage network devices including windows and mac endpoints, perform patching, access remotely, deploy and run antivirus scans, automate scripts across all devices, monitor website performance and more. Built on an easy and intuitive cloud-based platform, you can get up and running in 5 minutes, no servers required.
NinjaRMM is an all-in-one SaaS IT monitoring and management platform with a robust set of features to help you design, plan, deliver, operate and control IT services. You can manage network devices inc...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
SaaS based solution that assists with data visualization through live presentations, KPIs, heatmaps, waffle charts and more.
Elastic Enterprise Search is a distributed, RESTful search and analytics engine based on Apache Lucene, capable of storing data, and search it in near real time. Elasticsearch, Logstash, Kibana and Beats make up the "Elastic Stack" developed by Elastic. Hosted Elasticsearch (Elastic Cloud) is also provided.
Elastic Enterprise Search is a distributed, RESTful search and analytics engine based on Apache Lucene, capable of storing data, and search it in near real time. Elasticsearch, Logstash, Kibana and Bea...
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a...
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price that works with your budget. Seamlessly manage all your digital identities and take complete control over application access to defend against cyberattacks, increase operational efficiency, and boost productivity.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price th...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network.
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help secur...
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing ...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
System recovery software to protect Windows & Mac workstations against pre-existing vulnerabilities & threats by rebooting & restoring.
System recovery software to protect Windows & Mac workstations against pre-existing vulnerabilities & threats by rebooting & restoring.
System recovery software to protect Windows & Mac workstations against pre-existing vulnerabilities & threats by rebooting & restoring....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Advanced protection for all of your workstations, the leading virtualization systems, Android devices and Exchange servers.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This complete protection covers all vectors: Network (firewall), Email, Web, and External devices. Panda Endpoint Protection Plus also includes protection for Exchange servers. No spam and no browsing unauthorized websites for a more productive workforce.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This comp...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software.
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more.
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Dire...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
The N-able N-central® remote monitoring and management platform is designed to make managing complex IT networks simple.
The N-able N-central® remote monitoring and management platform is designed to help managed services providers handle complex networks with ease. With extensive automation and in-depth configurability options, security features like antivirus, endpoint detection and response, patch management, and integrated backup, N-central is built to help MSP businesses efficiently manage intricate networks from one easy-to-use platform.
The N-able N-central® remote monitoring and management platform is designed to help managed services providers handle complex networks with ease. With extensive automation and in-depth configurability ...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Secu...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
A cloud service for internet security & content filtering for businesses of any size to secure corporate networks, manage web access
A DNS-based internet security and web filtering service providing a range of flexible, fast and reliable solutions for businesses and institutions of any size. Choose just the right SafeDNS solution for your industry or type of organization from a SMB to a multinational enterprise. Block botnets, malicious and phishing sites, web ads and unwanted online content such as pornography, violence, hate & racism, social media, gambling - in a word any inappropriate content.
A DNS-based internet security and web filtering service providing a range of flexible, fast and reliable solutions for businesses and institutions of any size. Choose just the right SafeDNS solution fo...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, execu...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Deliver powerful, layered protection to multiple customers quickly and easily.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve ...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers.
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers, providing significant security and performance advantages over software that is not built for your systems. It boasts one of the most comprehensive sets of virus signatures available and keeps itself up to date by automatically downloading the latest virus definitions. You'll have peace of mind knowing that your scan engine is backed by battle-tested technology.
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers, providing significant security and performance advantages over sof...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your business? To be covered today, you have to prevent, detect, and respond to active threats and even predict future attacks before they happen. Yet even more than ever, your business relies on digital and remote capabilities. You need to run fast and lean but cannot afford to risk gaps in cybersecurity.
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your business...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Automatic, insightful, all-in-one endpoint security from the trusted leader.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares t...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
MDM solution that supports multiple platforms and IoT devices and provides an overview of connected endpoints via a single dashboard.
MDM solution that supports multiple platforms and IoT devices and provides an overview of connected endpoints via a single dashboard.
MDM solution that supports multiple platforms and IoT devices and provides an overview of connected endpoints via a single dashboard....
Make it easy for employees to work remotely from any location or device in a secure environment with solutions from VMware & Softchoice
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We can help you set up, manage, secure, and optimize IT performance for your remote workforce using VMware solutions. Explore how solutions like VMware Horizon 7 and Workspace ONE can make your IT staff more efficient, save your company money, and maximize your companys end user experience.
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We ca...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Next-generation Apple device management for macOS, iOS, iPadOS, and tvOS.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of the box. The only MDM with a pre-built library of 150+ automations. Leverage app patching, compliance templates, and the industry's first macOS agent that auto-remediates - even when devices are offline. Provision devices in minutes with 1-click configurations for Mac, iPhone, iPad, and Apple TV.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of th...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks....
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company ...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of br...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint protection solution that helps businesses monitor operating system activities to detect & clean suspicious or unknown threats.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS....
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service all delivered via a single lightweight agent.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivir...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Device control software. Block USB removable storage devices and other peripherals to secure sensitive data against theft and misuse.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol includes device control features for a variety of peripheral devices including USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s. File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol includes device control...
  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management