vRx

vRx

Vicarius
+

Related Products

  • NinjaOne
    4,573 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • Atera
    1,914 Ratings
    Visit Website
  • SuperOps
    216 Ratings
    Visit Website
  • Addigy
    261 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Rippling
    17,976 Ratings
    Visit Website
  • Securden Endpoint Privilege Manager
    6 Ratings
    Visit Website
  • EZO AssetSonar
    109 Ratings
    Visit Website

About

Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.

About

Improve your security posture and quickly demonstrate compliance with a lightweight, ready-to-use, and affordable security information and event management solution. Security Event Manager (SEM) will be another pair of eyes watching 24/7 for suspicious activity and responding in real time to reduce its impact. Virtual appliance deployment, intuitive UI, and out-of-the-box content means you can start getting valuable data from your logs with minimal expertise and time. Minimize the time it takes to prepare and demonstrate compliance with audit proven reports and tools for HIPAA, PCI DSS, SOX, and more. Our licensing is based on the number of log-emitting sources, not log volume, so you won’t need to be selective about the logs you gather to keep costs down.

About

Consolidate your software vulnerability assessment with one single vRx agent. Let vRx do the work so you can focus on and remediate the threats that matter most. vRx's prioritization engine using CVSS framework bases prioritization, plus AI of the specific security posture of your organization, and maps your digital environment to help you prioritize critical vulnerabilities for mitigation. vRx maps the potential consequences of a successful exploit within your unique digital infrastructure. CVSS metrics and context-based AI mapping provide the data needed to prioritize and mitigate critical vulnerabilities. For each detected app, OS, or asset vulnerability, vRx provides recommended actions that help you eliminate potential risks and stay resilient.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses of all sizes that want to manage devices that employees use

Audience

IT security teams looking for an advanced Network Security solution

Audience

IT teams interested in a platform that helps monitor vulnerabilities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$3800 one-time fee
Free Version
Free Trial

Pricing

$5 per asset per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Microsoft
Founded: 1975
United States
www.microsoft.com/en-us/microsoft-365/enterprise-mobility-security/microsoft-intune

Company Information

SolarWinds
Founded: 1999
United Kingdom
www.solarwinds.com/security-event-manager

Company Information

Vicarius
Founded: 2016
United States
www.vicarius.io

Alternatives

Alternatives

Alternatives

Mageni

Mageni

Mageni Security
Qualys VMDR

Qualys VMDR

Qualys
SanerNow

SanerNow

SecPod Technologies
Centraleyezer

Centraleyezer

Sandline

Categories

Categories

Categories

Mobile Device Management (MDM) Features

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

PCI Compliance Features

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

ALVAO Asset Management
Akitra Andromeda
Asset Management for Jira
Beyond Identity
CyberQP
Cynerio
HaloCRM
Hypergate Authenticator
Incident IQ
Microsoft 365
Microsoft Power Platform
Oomnitza
Precog
Q-scout
Query Federated Search
Secureframe
Sunrise IT Service Management
UltraDDR
Windows Autopatch
Workativ Assistant

Integrations

ALVAO Asset Management
Akitra Andromeda
Asset Management for Jira
Beyond Identity
CyberQP
Cynerio
HaloCRM
Hypergate Authenticator
Incident IQ
Microsoft 365
Microsoft Power Platform
Oomnitza
Precog
Q-scout
Query Federated Search
Secureframe
Sunrise IT Service Management
UltraDDR
Windows Autopatch
Workativ Assistant

Integrations

ALVAO Asset Management
Akitra Andromeda
Asset Management for Jira
Beyond Identity
CyberQP
Cynerio
HaloCRM
Hypergate Authenticator
Incident IQ
Microsoft 365
Microsoft Power Platform
Oomnitza
Precog
Q-scout
Query Federated Search
Secureframe
Sunrise IT Service Management
UltraDDR
Windows Autopatch
Workativ Assistant
Claim Microsoft Intune and update features and information
Claim Microsoft Intune and update features and information
Claim SolarWinds Security Event Manager and update features and information
Claim SolarWinds Security Event Manager and update features and information
Claim vRx and update features and information
Claim vRx and update features and information