+
+

Related Products

  • Fraud.net
    56 Ratings
    Visit Website
  • ISL Light Remote Desktop
    1,546 Ratings
    Visit Website
  • Plauti
    122 Ratings
    Visit Website
  • Teradata VantageCloud
    1,105 Ratings
    Visit Website
  • QuickApps
    Visit Website
  • Code-Cube.io
    7 Ratings
    Visit Website
  • D&B Hoovers
    1,209 Ratings
    Visit Website
  • Google Cloud BigQuery
    1,983 Ratings
    Visit Website
  • Reprise License Manager
    87 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website

About

Make better, more informed decisions with access to real-time insights on a single, scalable platform. SAP BusinessObjects Business Intelligence is a centralized suite for data reporting, visualization, and sharing. As the on-premise BI layer for SAP’s Business Technology Platform, it transforms data into useful insights, available anytime, anywhere. Share insights and make better decisions with the SAP BusinessObjects Business Intelligence (BI) suite. By providing a flexible architecture, our analytics platform can support your growth – from a few users to tens of thousands of users, and from a single tool to multiple tools and interfaces. Deployed on premise, this product requires a perpetual license and allows you to license and pay for only the functionality and users you need.

About

Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations interested in a powerful business intelligence suite

Audience

IT teams that want to prevent breaches with complete attack prevention and detection

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 4.5 / 5
ease 5.0 / 5
features 4.0 / 5
design 4.5 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SAP
Founded: 1972
Germany
www.sap.com/products/technology-platform/bi-platform.html

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/cyber-security/endpoint/end-user

Alternatives

Strategy ONE

Strategy ONE

Strategy Software

Alternatives

CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Business Intelligence Features

Ad Hoc Reports
Benchmarking
Budgeting & Forecasting
Dashboard
Data Analysis
Key Performance Indicators
Natural Language Generation (NLG)
Performance Metrics
Predictive Analytics
Profitability Analysis
Strategic Planning
Trend / Problem Indicators
Visual Analytics

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Adpoint
Amadea
Data Secure
Data Virtuality
Deep Identity
Enablon
FairCom DB
FortiADC
KeyScaler
Keyfactor Command for IoT
Qliktag Platform
SAP Cloud Platform
SCH Supplier
Sharvy
Symantec Secure Web Gateway
Tactic
Teamstack
ThreatQ
Toad Intelligence Central
Wiiisdom Ops

Integrations

Adpoint
Amadea
Data Secure
Data Virtuality
Deep Identity
Enablon
FairCom DB
FortiADC
KeyScaler
Keyfactor Command for IoT
Qliktag Platform
SAP Cloud Platform
SCH Supplier
Sharvy
Symantec Secure Web Gateway
Tactic
Teamstack
ThreatQ
Toad Intelligence Central
Wiiisdom Ops
Claim SAP BusinessObjects Business Intelligence and update features and information
Claim SAP BusinessObjects Business Intelligence and update features and information
Claim Symantec Endpoint Protection and update features and information
Claim Symantec Endpoint Protection and update features and information