Related Products
|
||||||
About
Tether gives IT teams full control over corporate devices worldwide. It provides device tracking, RemoteKill® data/device lockdown, full disk encryption management, and geofencing. Designed by cybersecurity experts, Tether is secure, standards-based, and proven through 20+ years of real-world use.
|
About
No expertise is needed to run a full security program with Zip. Minimize hassle with single-click workflows for everything from account recovery to deploying CrowdStrike. We provide everything you need to execute instantly. Never worry about missing a compliance standard. Monitor your system’s devices, identities, and 3rd party tools at a bird’s eye view and get each metric to where it needs to be. We integrate the best-in-class security tooling like CrowdStrike, Jamf, and Intune to build the enterprise security stack that scales with you, and it’s all behind a single pane of glass. Set consistent security policies across Windows and macOS devices without juggling platform-specific configuration. Zip is your single partner to procure, deploy, configure, and manage your enterprise security program. We’ll manage all of the software you need to buy to meet the standards of your customers, insurers, and compliance regimes.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
MSPs, IT Directors, IT Managers, Cybersecurity, CISO
|
Audience
Enterprises looking for a solution to secure their company and manage compliance
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and VideosNo images available
|
Screenshots and Videos |
|||||
Pricing
$29/device/year
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationTether Security
Founded: 2006
United States
tethersecurity.com
|
Company InformationZip Security
www.zipsec.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM) Features
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
|
||||||
Integrations
Google Workspace
Okta
Active Directory
CrowdStrike Container Security
Jamf Connect
Microsoft 365
Microsoft Azure
Microsoft Entra
Microsoft Intune
Slack
|
Integrations
Google Workspace
Okta
Active Directory
CrowdStrike Container Security
Jamf Connect
Microsoft 365
Microsoft Azure
Microsoft Entra
Microsoft Intune
Slack
|
|||||
|
|
|