GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more
Ninja Protect provides unprecedented visibility and control over endpoints, robust patching, endpoint hardening, backup, and data protection capabilities alongside Bitdefender’s industry-leading next-generation AV and EDR capabilities, Ninja Protect is a solution ranked #1 on G2 for endpoint mgmt.
Read more about NinjaOne
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.
Read more about ConnectWise SIEM
1Password protects all company secrets such as passwords, security tokens, 2FA codes, documents, and passkeys to centralize and simplify the sign-in experience. Developers have access to features that help secure secrets and speed up workflows throughout the software development life cycle.
Read more about 1Password
GoTo Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.
Read more about LogMeIn Central
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.
Read more about Splunk Enterprise
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.
Read more about Bitdefender GravityZone
Device control software. Enforce the exclusive use of authorized peripheral devices. Block USB portable storage devices and restrict file transfers to protect sensitive data against theft.
Read more about AccessPatrol
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.
Read more about GoodAccess
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.
Read more about Action1
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.
In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.
Read more about OneLogin
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.
Read more about Teramind
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.
Read more about Syxsense
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems against cyber threats and detect endpoint malware through a unified platform
Read more about WatchGuard Endpoint Security
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.
Read more about ThreatLocker
Admin By Request is a security solution that enables organizations to monitor and control local admin rights across their endpoints. The tool offers Just-In-Time elevation, anti-malware file scanning, temporary local admin accounts, and a full inventory and Auditlog.
Read more about Admin By Request
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.
Read more about Sealit
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Read more about Falcon
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.
Read more about Workspace ONE
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.
Read more about Acunetix
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.
Read more about BLACKbox
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.
Read more about DriveStrike