About
OpenText Core Endpoint Protection delivers next-generation, cloud-based security designed to stop ransomware, phishing, and zero-day attacks before they disrupt business operations. Using real-time machine learning and OpenText Threat Intelligence, it continuously identifies threats and blocks malicious behavior across all endpoints. The platform simplifies security management with pre-built policies, easy administration, and seamless integration with leading RMM tools. With cloud-based control, IT teams can monitor and protect devices from anywhere without requiring on-premises oversight. The solution minimizes downtime by preventing infections and enabling rapid isolation and investigation when suspicious activity occurs. For organizations seeking deeper visibility, it integrates seamlessly with OpenText Core EDR to provide advanced threat detection and workflow automation.
|
About
Though built for small business, Secure Hunter Small Business includes big features. A scalable malware solution, Secure Hunter Small Business is ideal for both small and mid-sized businesses. When trusting your company’s cyber security to Secure Hunter, you’ll enjoy the following benefits. Secure Hunters team is committed to customer satisfaction. Anti spyware and anti-malware solutions are only the tip of the iceberg when it comes to Secure Hunters small business services. Small business owners benefit from Secure Hunters consulting services, growing community and personalized support. Each minute without anti spyware technology leaves your small business at risk for data breaches and theft. Dont put your clients or business through the devastating and costly process of data recovery. Secure your assets now with Secure Hunter Small Business and share the refreshing experience of cyber security with your friends on social media!
|
About
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures.
- We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out.
- Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when.
- Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity
- IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use.
-All past, present, and future infrastructure is supported
- Responsive 24/7/365 customer support.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
OpenText Core Endpoint Protection is ideal for organizations seeking real-time, cloud-based endpoint security that minimizes threats, simplifies management, and supports both remote and on-premises environments
|
Audience
Companies and businesses searching for a solution to manage their security and prevent risks
|
Audience
CTOs, CIOs, CISOs, DevOps, SREs, Infrastructure Engineers, Heads of Infrastructure
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
$30 per year
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$70/user/month
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationOpenText
Founded: 1991
Canada
cybersecurity.opentext.com/products/threat-detection/endpoint-protection/
|
Company InformationSecure Hunter
www.securehunter.com
|
Company InformationStrongDM
Founded: 2015
United States
www.strongdm.com/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
|
|
||||
Categories |
Categories |
Categories |
||||
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
|
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
|
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Customer Identity and Access Management (CIAM) Features
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Database Features
Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization
Privileged Access Management Features
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
|
||||
Integrations
Active Directory
Amazon Athena
Atera
Blink
CYREBRO
Cisco Duo
ConnectWise Automate
DigitalOcean
Docker
Google Kubernetes Engine (GKE)
|
Integrations
Active Directory
Amazon Athena
Atera
Blink
CYREBRO
Cisco Duo
ConnectWise Automate
DigitalOcean
Docker
Google Kubernetes Engine (GKE)
|
Integrations
Active Directory
Amazon Athena
Atera
Blink
CYREBRO
Cisco Duo
ConnectWise Automate
DigitalOcean
Docker
Google Kubernetes Engine (GKE)
|
||||
|
|
|