TrioTrio Technology
|
||||||
Related Products
|
||||||
About
Tether gives IT teams full control over corporate devices worldwide. It provides device tracking, RemoteKill® data/device lockdown, full disk encryption management, and geofencing. Designed by cybersecurity experts, Tether is secure, standards-based, and proven through 20+ years of real-world use.
|
About
From businesses to educational institutions, Trio breaks down conventional management methods and rebuilds them gapless, automated, and simply secure. As a one-of-a-kind mobile device management solution, Trio is here to not only meet your security and productivity expectations but to exceed them.
Trio is a platform that not only manages devices but also takes care of vulnerability management, endpoint detection and response (EDR), compliance monitoring, and provides visibility into endpoints.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
MSPs, IT Directors, IT Managers, Cybersecurity, CISO
|
Audience
Companies, enterprises
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and VideosNo images available
|
Screenshots and VideosNo images available
|
|||||
Pricing
$29/device/year
Free Version
Free Trial
|
Pricing
$6.00/employee
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationTether Security
Founded: 2006
United States
tethersecurity.com
|
Company InformationTrio Technology
Founded: 2023
Germany
www.trio.so
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM) Features
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
|
||||||
Integrations
Google Workspace
Microsoft Azure
Microsoft Entra
Okta
|
||||||
|
|
|