Related Products
|
||||||
About
Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
|
About
SmartDeploy is a leading provider of modern endpoint management solutions. With a flexible layered architecture, IT can achieve centralized, single-image management to support 50 - 50,000 endpoints. SmartDeploys award-winning technology combines the best of progressive solutions like SCCM, centralized solutions like VDI and legacy imaging solutions like Ghost, without the common drawbacks. More than 3,000 organizations trust SmartDeploy to deploy and manage their end user devices. With over 1500 ready-to-use driver packs from top manufacturers, SmartDeploy helps streamline your disk cloning for remote and in-house employees.
|
About
Threat defense tools that use a mix of vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling and transport security technologies to help defend mobile devices and applications from advanced threats. Mobile devices are more than just small computers in continuous use with perpetual connections to the Internet. The operating paradigm of these devices calls for new approaches to help ensure the data processed by them remains secure while maintaining productivity. Symantec designed the risk-based mobile security approach in Mobile Threat Defense from the ground up to defend against all detected threats that put business data at risk of exposure, theft, and manipulation while respecting users’ need for privacy, productivity, and a great mobile experience. Detect the most threats with on-device and in-cloud machine learning elements. Benefit from real-time processing, detection, and protection–at scale.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Businesses of all sizes that want to manage devices that employees use
|
Audience
IT teams that manage 50 to 50,000 Windows machines
|
Audience
Enterprises and individuals seeking a software solution to predict, detect, and prevent mobile cyber attacks
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$1020/50 machines
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationMicrosoft
Founded: 1975
United States
www.microsoft.com/en-us/microsoft-365/enterprise-mobility-security/microsoft-intune
|
Company InformationSmartDeploy
Founded: 2008
United States
www.smartdeploy.com
|
Company InformationBroadcom
Founded: 1991
United States
www.broadcom.com/info/endpoint-security/protection-mobile
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|
||||
|
|
||||||
|
|
|
|
||||
Categories |
Categories |
Categories |
||||
Mobile Device Management (MDM) Features
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
|
Disk Imaging Features
Backup Scheduling
Bare-Metal Restore
Compression
Differential Backup
Disk Cloning
Encryption
Image Deployment
Incremental Backup
Web Access / Restoration
IT Asset Management Features
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
|
|||||
Integrations
Alemba Service Manager
Azure Marketplace
Box
CertSecure Manager
Complyance
CyberQP
Devicie
Drata
DriveStrike
Keyfactor EJBCA
|
Integrations
Alemba Service Manager
Azure Marketplace
Box
CertSecure Manager
Complyance
CyberQP
Devicie
Drata
DriveStrike
Keyfactor EJBCA
|
Integrations
Alemba Service Manager
Azure Marketplace
Box
CertSecure Manager
Complyance
CyberQP
Devicie
Drata
DriveStrike
Keyfactor EJBCA
|
||||
|
|
|
|