GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more
Ninja Protect provides unprecedented visibility and control over endpoints, robust patching, endpoint hardening, backup, and data protection capabilities alongside Bitdefender’s industry-leading next-generation AV and EDR capabilities, Ninja Protect is a solution ranked #1 on G2 for endpoint mgmt.
Read more about NinjaOne
Kandji is the modern Apple MDM solution for IT teams that manage macOS, iOS, iPadOS, and tvOS devices at medium-to-large businesses. Features include zero-touch deployment, app management, automated patching, one-click security and compliance templates, and 150+ pre-built device controls.
Read more about Kandji
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.
Read more about Automox
GoTo Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.
Read more about LogMeIn Central
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.
Read more about Splunk Enterprise
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.
Read more about GoodAccess
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.
No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Read more about Cypherdog Encryption
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.
Read more about Action1
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Features such as Device Posture Check allow for endpoint protection, identity management, and advanced remote security.
Read more about Perimeter 81
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.
Read more about Syxsense
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.
Read more about ThreatLocker
Admin By Request is a security solution that enables organizations to monitor and control local admin rights across their endpoints. The tool offers Just-In-Time elevation, anti-malware file scanning, temporary local admin accounts, and a full inventory and Auditlog.
Read more about Admin By Request
Acronis Cyber Protect Cloud is truly a unique integration of backup, anti-malware, antivirus and endpoint protection. Such synergy solves complexity, allowing service providers to better protect customers while keeping the costs down.
Read more about Acronis Cyber Protect Cloud
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.
Read more about Workspace ONE
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.
Read more about BLACKbox
N-able N-central® is an endpoint detection and response software designed to help managed service providers (MSPs) prevent, detect, respond to, and recover from threats.
Read more about N-central
MaaS360 is an enterprise mobility management platform that enables IT to deliver end-to-end security and management through the implementation of Mobile Device Management, Secure Mail, Secure Browser and Laptop Management. It accelerates deployment, reduce risk and increase employee productivity.
Read more about IBM Security MaaS360 with Watson
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
Read more about KACE
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation processes to handle threats. Features include routing, authentication, issue tracking, encryption, content filtering, log management, and analytics.
Read more about SilverSky Managed Security Services
Chimpa UEM helps manage, monitor, and secure various Android and iOS-based devices like digital signage, interactive displays, service kiosks, single-purpose devices, and more. Users can protect devices from unauthorized access, data theft, and intrusion using role-based permissions.
Read more about Chimpa
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.
Read more about Uptycs
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.
Read more about Beyond DLP
XDR / EDR is a powerful endpoint security solution that includes real-time monitoring and collection of endpoint security data with an automated threat response mechanism.
Its missions are: detecting known and unknown attacks, launch remediations and provide advanced investigation features.
Read more about TEHTRIS XDR Platform