Related Products
|
||||||
About
Discover your IT with Lansweeper, build your centralized IT Asset System of Record. With the Lansweeper Deepscan IP Scanner engine, you can audit all assets in your company network without installing software on them. Build an accurate network inventory of all your hardware, software and users. Scan Windows, Linux, and Mac devices. Keep track of your licenses, serial numbers and warranties of major brands like Dell, IBM, HP, Toshiba and many more. Detect Unauthorized Local Admins, unify Office 365 and AD User Data, get the netbios domain name, check for Windows updates and more. Discover all assets in your IT environment that you didn’t even knew about & take full control of your network. Download your free trial and start your IT asset management.
|
About
Automate patch management with PDQ Deploy & Inventory. Use PDQ Inventory to scan, collect, and organize your devices, then use PDQ Deploy to set a preferred schedule for deployment. Once the deployment has been scheduled, PDQ will automatically and silently apply updates without inconveniencing end users.
- Integrate with Active Directory to easily collect device data 📊
- Schedule multi-step and multi-application custom deployments 💻
- Access the Package Library, which includes 100+ ready-to-deploy third party applications 📦
- Remotely execute commands, run scripts, and force reboots 🥾
- Apply updates silently 🤫
- Create custom device groupings 🖥️
- Use our PowerShell scanner, CLI, and other prebuilt tools 🧰
- Save and export reports, including custom data like asset information 📈
- Share servers and databases with other consoles 🤝
tl;dr — PDQ Deploy and Inventory makes device management simple, secure, and pretty damn quick.
|
About
Have total control and visibility over who accesses your data, systems, applications, infrastructure and any other assets, preventing cyber attacks and data breaches. With VaultOne, protect your company’s resources and achieve compliance. VaultOne is redesigning the concept of privileged access management (PAM). Manage user access, credentials and sessions in a fast, secure and automated way. In a single and powerful solution, we offer multiple features, such as digital vault, password generator, sessions recording, auditing and reporting, customizable policies, disaster recovery and multi-factor authentication. If you’re looking for a solution to protect shared accounts, certificates and user access to applications, websites, servers, databases, cloud services and infrastructure, you’ve just found it. By creating customized access policies and managing users and privileges, you fight cyber attacks and avoid data breaches.4
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Small to mid-sized companies including enterprise and MSP
|
Audience
System Administrators, IT professionals, Network Administrators, Help Desk technicians
|
Audience
IT security teams looking for a privileged access management solution
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
$495.00/year
Free Version
Free Trial
|
Pricing
$1,575/year/user
Free Version
Free Trial
|
Pricing
$99 per month
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationLansweeper
Founded: 2008
Belgium
www.lansweeper.com
|
Company InformationPDQ
United States
www.pdq.com
|
Company InformationVaultOne Software
Founded: 2017
United States
vaultone.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
Categories |
||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Asset Management Features
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
License Management Features
Automatic SKU Recognition
Central LM Server
Copy Protection
History Tracking
Node Management
Online Activation
Portable License
Sarbanes-Oxley Compliance
Timing Rights
Trial License
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Troubleshooting Features
Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring
Server Management Features
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
|
Patch Management Features
Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning
|
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Password Management Features
Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management
Privileged Access Management Features
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
|
||||
Integrations
Alemba Service Manager
AssetLabs Streamline License Tracker
Axonius
CyCognito
Devolutions Remote Desktop Manager
HaloCRM
Help Desk Migration
Mint Service Desk
Notus
OverSOC
|
Integrations
Alemba Service Manager
AssetLabs Streamline License Tracker
Axonius
CyCognito
Devolutions Remote Desktop Manager
HaloCRM
Help Desk Migration
Mint Service Desk
Notus
OverSOC
|
Integrations
Alemba Service Manager
AssetLabs Streamline License Tracker
Axonius
CyCognito
Devolutions Remote Desktop Manager
HaloCRM
Help Desk Migration
Mint Service Desk
Notus
OverSOC
|
||||
|
|
|
|