Alternatives to Application Manager
Compare Application Manager alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Application Manager in 2026. Compare features, ratings, user reviews, pricing, and more from Application Manager competitors and alternatives in order to make an informed decision for your business.
-
1
ManageEngine Endpoint Central
ManageEngine
ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security. -
2
KernelCare Enterprise
TuxCare
Global organizations trust TuxCare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the TuxCare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates. TuxCare automates the patching process and eliminates the need to wait weeks or months for reboot cycles to apply patches. TuxCare currently protects over 1 million workloads worldwide. Tight integrations with popular patch management and vulnerability scanners, including Qualys, Crowdstrike, and Rapid7, enable TuxCare to fit seamlessly into existing infrastructure. The TuxCare secure patch server, ePortal, allows operations in gated and air-gapped environments. Reduce risk by significantly reducing the mean time to patch vulnerabilitiesStarting Price: $3.95 per month -
3
Action1
Action1
Action1 is an autonomous endpoint management platform trusted by many Fortune 500 companies. Cloud-native, infinitely scalable, highly secure, and configurable in 5 minutes—it just works and is always free for the first 200 endpoints, with no functional limits. By pioneering autonomous OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates routine labor, preempts ransomware and security risks, and protects the digital employee experience. In 2025, Action1 was recognized by Inc. 5000 as the fastest-growing private software company in America. The company is founder-led by Alex Vovk and Mike Walters, American entrepreneurs who previously founded Netwrix, a multi-billion-dollar cybersecurity company.Starting Price: $0 USD/per device/per month -
4
SanerNow
SecPod Technologies
SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.Starting Price: $50/year/device -
5
SaltStack
SaltStack
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems. -
6
Easy2Patch
E2P
Easy2Patch is a software that enables centralized updating of third-party products running on computers within IT ınfrastructures. It works integrated with WSUS, ConfigMgr, and Intune. Its scope is limited to third-party Updates on Windows Operating System Platforms. Easy2Patch does not allow the archiving of updates or the archiving of setup processes. This design ensures that your updating and installing processes are automatically on time. Updates for third-party products are securely provided with the original site link. With the Defender feature, Easy2Patch can automatically send third-party applications to the computers within the group the system administrators determined. These are on the CVE score to be determined but forgotten or not configured to be sent via Easy2Patch. *Stay up to date *Extensive application pool for wide use *Automatic protection of computers with Microsoft Defender feature -
7
Simplify and automate the patching process to save time and money. Get patching support for Windows and thousands of popular third-party applications. Software patches can be ignored. Proven, industry-leading patch management that keeps all your Windows systems and third-party apps up-to-date with the latest patches. Distribute thoroughly tested patches to thousands of machines in minutes, with minimal impact on your network. Patch all devices anywhere—whether they're behind the firewall, on the road, at remote sites, or even asleep. Manage all Microsoft Windows and thousands of third-party software updates from a single cloud-based platform. Achieve compliance, mitigate exploits, close vulnerabilities, and remotely deploy software and Windows updates. Our patch content engineers spend countless hours thoroughly testing all patches before we release them to you, in order to ensure they function optimally and don’t introduce new problems.Starting Price: $14.99 per device per year
-
8
Panda Patch Management
WatchGuard Technologies
Patch Management is an easy-to-use solution for managing vulnerabilities in operating systems and third-party applications on Windows workstations and servers. It covers all the patch management processes including discovering, identifying, assessing, reporting, managing, deploying installations and remediating security risks. Reduce the attack surface, contain and mitigate vulnerability exploitation attacks, while strengthening your organization’s prevention and containment capabilities. Centralized and real-time visibility into the security status of software vulnerabilities, missing patches, updates and unsupported (EOL) software. Audit, monitor and prioritize operating system and application updates. -
9
Ivanti Security Controls
Ivanti
Ivanti Security Controls is an automated patch management solution that simplifies security through unified prevention, detection, and response across physical and virtual environments. It automatically discovers vulnerabilities and missing OS or third-party application patches, then deploys updates to servers, workstations, VMs, and templates, online or offline, via agentless patching and remote task scheduling to minimize disruption. Granular privilege management implements just enough and just-in-time administration to remove full admin rights while elevating access temporarily for approved tasks. Dynamic allowlisting enforces preventive policies so only known, trusted applications can execute, supported by a data-gathering mode that monitors application usage to refine controls and eliminate false positives. CVE-to-patch list creation automates grouping of relevant updates from any vulnerability assessment, and REST APIs enable integration and orchestration. -
10
SolarWinds Patch Manager
SolarWinds
Patch management software designed for quickly addressing software vulnerabilities. SolarWinds® Patch Manager simplifies many of the steps in the patch management process—from research and scheduling, to deployment and reporting—to help save you time and make it easier to keep your servers and workstations patched and compliant. SolarWinds Patch Manager works with and extends your Microsoft WSUS and SCCM deployments with pretested, prebuilt updates for Microsoft products and third-party applications from a central point of control. SolarWinds Patch Manager makes it easier to manage patches on virtual desktops and servers with the ability to patch offline machines, organize virtual machines into groups, and inventory virtual machines across your enterprise.Starting Price: $3495.00/one-time -
11
Patch My PC
Patch My PC
Save more time than you ever thought possible and improve security by automating the patching of third-party applications in Microsoft ConfigMgr and Intune. Extend beyond patching, auto-create applications for the initial deployment of products in Microsoft SCCM and Intune. Including icons, keywords, descriptions, and much more! We'll keep the base installs up to date automatically — no need to deploy outdated apps and wait for the updates to apply after the fact. Use existing installation methods within SCCM including task sequences and collection deployments for the initial installation of products. Add your own custom pre/post-update scripts to perform environment-specific configurations when needed. Disable the self-update feature within applications to ensure you can manage when and how updates apply in your enterprise.Starting Price: $2 per device per year -
12
Patch Connect Plus
ManageEngine
Patch Connect Plus is a SCCM third party patch management and non-Microsoft patch solution that assists users in deploying patches to over 250 third party applications. Patch Connect Plus allows users to automate non-Microsoft patch management to protect their systems from security threats. With Patch Connect Plus, users can overcome the requirement of getting another IT solution for patch management. Patch Connect Plus also notifies users with status reports of the available patches for the applications.Starting Price: $495.00/one-time -
13
Autonomic Software
Autonomic Software
Autonomic Software was established with the primary objective of creating solutions that can protect organizations against cybersecurity issues. Turn to our expert software solutions to assist your company in mitigating potential breaches. We have never encountered a successful cyberattack from any of our critical infrastructure locations. Patch and Application Manager is a fully integrated component that provides McAfee ePO users with a comprehensive solution to manage Windows and Mac updates including third-party and custom applications for desktops, laptops, and servers. All data collected by Patch Manager rolls up into Risk Advisor for McAfee ePO to provide a more comprehensive view of an organization's network and vulnerabilities. -
14
Most exploits target known vulnerabilities—those for which a patch has been available for at least a year. You can’t rely on manual processes, or on users themselves, to ensure systems are fully patched. Ivanti DSM integrates Patch Management to identify and patch vulnerabilities across heterogeneous OSes, configurations, and all major third party applications. Your servers, desktops, and laptops are equally protected across your entire organization.
-
15
GFI LanGuard
GFI Software
GFI LanGuard enables you to manage and maintain endpoint protection across your network. It provides visibility into all the elements in your network, helps you assess where there may be potential vulnerabilities, and enables you to patch them. The patch management and network auditing solution are easy-to-use and easy to deploy. Automatically discover all the elements in your network, including computers, laptops, mobile phones, tablets, printers, servers, virtual machines, routers and switches. Group your devices for better management. Distribute management to different teams and see everything from a central management dashboard. Identify non-patch vulnerabilities by using an updated list of 60,000+ known issues as well as items such as open ports and system information about users, shared directories and services. Find gaps in common operating systems. Identify missing patches in web browsers and third-party software.Starting Price: $32 per year -
16
Patches are software and operating system updates that address security vulnerabilities within an application. Software vendors constantly release patches to fix vulnerabilities and provide enhanced security features. Patching can be complex and time-consuming, but ignoring software updates isn’t an option. If patches are not installed in a timely manner, networks can be severely compromised. Patch Management solves these issues by making it easy to identify and deploy critical patches and monitor ongoing activity from a central cloud management console. Schedule automatic patch scans. Select from daily, weekly, or monthly options. Patches will be deployed automatically for all software applications. You can easily exclude any application that you don’t want to be patched. Easily see the status of all your patches, including missing patches and severity level. Schedule and deploy approved patches at desired times or manually deploy them to groups or individual devices.Starting Price: $15.49 per year
-
17
Automox
Automox
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.Starting Price: $3.00 -
18
Heimdal Patch & Asset Management
Heimdal®
Heimdal Patch & Asset Management is an automatic software updater and digital asset tracking solution that will automatically install updates based on your configured policies, without the need for manual input. As soon as 3rd party vendors release new patches, our technology silently deploys them to your endpoints, without the need for reboots or user interruption. In addition to this, Heimdal Patch & Asset Management allows your sysadmins to see any software assets in your inventory, alongside their version and number of installs. Users can also install software on their own, saving time and resources. Automating your patch management routine helps you save valuable time and resources. Heimdal Patch & Asset Management makes vulnerability and patch management cost-effective and time-efficient. -
19
Automate patch management with PDQ Deploy & Inventory. Use PDQ Inventory to scan, collect, and organize your devices, then use PDQ Deploy to set a preferred schedule for deployment. Once the deployment has been scheduled, PDQ will automatically and silently apply updates without inconveniencing end users. - Integrate with Active Directory to easily collect device data 📊 - Schedule multi-step and multi-application custom deployments 💻 - Access the Package Library, which includes 100+ ready-to-deploy third party applications 📦 - Remotely execute commands, run scripts, and force reboots 🥾 - Apply updates silently 🤫 - Create custom device groupings 🖥️ - Use our PowerShell scanner, CLI, and other prebuilt tools 🧰 - Save and export reports, including custom data like asset information 📈 - Share servers and databases with other consoles 🤝 tl;dr — PDQ Deploy and Inventory makes device management simple, secure, and pretty damn quick.Starting Price: $1,575/year/user
-
20
Adaptiva OneSite Patch
Adaptiva
OneSite Patch's automation capabilities revolutionize how businesses manage and deploy software updates, significantly reducing manual workload and minimizing the risk of human error. By streamlining the patch deployment process, companies can ensure their systems are always up to date with the latest security measures, enhancing overall cybersecurity posture with unparalleled efficiency. Rapidly remediate vulnerabilities with hands-free, fully automated patch management. Reduce manual workloads and intelligently automate even the most complex enterprise patching processes. IT and security teams can precisely mirror their desired patching rules, including phased deployments, approvals, testing, and notifications, then OneSite Patch takes care of the rest every time a new patch is available. IT and security teams can precisely mirror their desired patching strategies once, then automation takes care of the rest. When a new patch is available, it can be deployed without any intervention. -
21
ManageEngine Vulnerability Manager Plus
ManageEngine
Enterprise vulnerability management software. Vulnerability Manager Plus is an integrated threat and vulnerability management software that delivers comprehensive vulnerability scanning, assessment, and remediation across all endpoints in your network from a centralized console. Scan and discover exposed areas of all your local and remote office endpoints as well as roaming devices. Leverage attacker-based analytics, and prioritize areas that are more likely to be exploited by an attacker. Mitigate the exploitation of security loopholes that exist in your network and prevent further loopholes from developing. Assess and prioritize vulnerabilities based on exploitability, severity, age, affected system count, as well as the availability of the fix. Download, test, and deploy patches automatically to Windows, Mac, Linux, and over 250 third-party applications with an integral patching module—at no additional cost.Starting Price: $695 per user per year -
22
GAT
GAT InfoSec
Information security solutions to manage threats in technologies, people and processes. Manage your Security Program and reduce the risk of attacks, ransomware, data leaks and third-party risks. Integrated solutions to help create and maintain an SGSI (Information Security Management System) with prioritization and focus on the business context. Automatically identify vulnerabilities in cloud environments and reduce the risk of ransomware, data leaks, intrusions and cyber attacks. Mapping of the exhibition surface itself and that of third parties. Risk score and vision of leaks, risks and vulnerabilities in applications, networks and infrastructure. Collaborative processes, reports and dashboards that deliver data with clarity, creating and facilitating the sharing of information across all sectors of the company. -
23
JetPatch
JetPatch
Powerful features that give you complete visibility and control of patch compliance across all environments. Eliminate patching blind spots and get a comprehensive patch compliance report. View and analyze the entire patch remediation process in a single, easy-to-understand dashboard. Ensure your systems are always up-to-date. Streamline patch and vulnerability remediation across infrastructure and company silos, saving time, preventing errors and reducing time-to-remediation. JetPatch analyzes and learns the root causes of remediation delays and automatically corrects them. Shorten scheduled downtime windows by creating a more efficient process (more patches in the same DT window). Increases security because patches are done quicker. -
24
Endpoint Security for Endpoint Manager delivers powerful, integrated endpoint protection and unified management from within the familiar Ivanti console. It combines passive visibility, discovering and inventorying every IP-enabled device and installed software in real time, including rogue devices, with active control features such as application whitelisting, device control (USB/media lockdown and detailed copy logs) and antivirus orchestration (Ivanti AV or third-party engines) to detect and prevent threats before they spread. Automated patch management covers Windows, macOS, Linux, and third-party applications across on-site, remote, and offline devices, ensuring systems stay up to date without impacting users. When malware or ransomware does get through, the solution’s auto-isolation and remote-control capabilities contain infections instantly, kill malicious processes, notify connected machines, and remediate or reimage compromised endpoints.
-
25
Seal Security
Seal Security
Redefine open source vulnerability and patch management with Seal Security. Easy integration directly into your existing SDLC, and workflows. Standalone security patches for immediate resolution of critical security issues. Predictable remediation and optimal resource allocation, with centralized control and reduced R&D dependency. Streamline your open source vulnerability remediation without introducing the risk of breaking changes. Say goodbye to alert fatigue and start patching with Seal Security. Pass every product security scan with confidence. Seal Security provides immediate remediation for open source vulnerabilities. By meeting your customers' SLAs and offering a vulnerability-free product, you can ensure customer trust and fortify your market standing. Seal Security seamlessly integrates with various coding languages, patch management systems, and open source platforms through powerful APIs and CLI.Starting Price: Free -
26
Cisco AI Defense
Cisco
Cisco AI Defense is a comprehensive security solution designed to enable enterprises to safely develop, deploy, and utilize AI applications. It addresses critical security challenges such as shadow AI—unauthorized use of third-party generative AI apps—and application security by providing full visibility into AI assets and enforcing controls to prevent data leakage and mitigate threats. Key components include AI Access, which offers control over third-party AI applications; AI Model and Application Validation, which conducts automated vulnerability assessments; AI Runtime Protection, which implements real-time guardrails against adversarial attacks; and AI Cloud Visibility, which inventories AI models and data sources across distributed environments. Leveraging Cisco's network-layer visibility and continuous threat intelligence updates, AI Defense ensures robust protection against evolving AI-related risks. -
27
Enable automated processes for patch assessment, monitoring, and remediation. Apply patches up to 13 times faster without burdening your staff. Team workspaces enable you to create digital offices where local and global team members can gather online to coordinate their efforts. Monitor patch compliance, quickly identify and assess vulnerabilities, and automatically apply updates and patches to meet pre-defined standards. Patch Management watches your back, patching everything you’ve got on your network 24 hours a day, without the need for human intervention. With its unique policy-based approach, you set up the policies, define the actions, and then sit back and let ZENworks do the rest. ZENworks Patch Management includes fast, automatic patch deployment based on predefined policies, as well as the ability to customize tested patches as needed. It also supports phased rollouts to ensure smooth, error-free patch deployments to large numbers of systems.
-
28
3rdRisk
3rdRisk
Whether it concerns cyber, sustainability, compliance, or continuity risks, your supplier (third-party) relationships are a growing area of concern. The occurrence and impact of third-party incidents and compliance obligations are increasing. Our platform serves as a secure, all-in-one hub, facilitating multidisciplinary collaboration among all internal risk disciplines, business teams, and third-party partners. It enables the seamless and secure sharing of documents and questionnaires, while also providing a collaborative space for working on shared requirements. While working on one platform, internal teams can choose what information they would like to share with other teams and external parties. Our third-party catalog connects seamlessly with your internal procurement systems and external data feeds, creating a centralized overview of your entire third-party landscape. This comprehensive view includes everything you need to know about contracts and specific characteristics. -
29
Riskpro
Riskpro India
Third party risk management (TPRM) is a structured approach to analyze and control risks arising to the organization from third parties. Mainly third parties are: Vendors Customers Joint ventures Counterparties Fourth Parties Third-party relationships can be a significant source of enterprise risk. The propagation of third-party partners, regulatory pressure, and the complexity of cyber-related risks has led companies to dedicate more time and attention to the potential risks by third parties. They enable companies to be flexible and competitive in a global business environment. These relationships often allow companies to delegate important tasks so that they can focus on their core competencies. With the benefits gained from third parties comes related risks that pose significant threats to a business, such as cyber breaches, business continuity challenges, or reputational damage.Starting Price: $750 per year -
30
Syxense Manage
Syxsense
Syxsense Manage lets users see and manage all endpoints inside and outside the network with coverage for all major operating systems and endpoints, including IoT devices. Syxsense provides users with a complete view of their IT infrastructure with an intuitive interface, and all-inclusive features. The service is designed to provide full endpoint intelligence with OS, hardware, and software inventory details. Know if patches are missing or security standards are compromised. Critical devices are color coded in the datagrid, dashboards, and reports. Use sites, queries, and groups to target and view devices in logical subsets. Scan and prioritize security and patching priorities relative to exposed risk. Find out which patches have been released, their severity, and if vulnerabilities are being exploited. Automated Maintenance and Blackout Windows protect business productivity while deploying updates. -
31
baramundi Management Suite
baramundi Software USA
Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.Starting Price: $5000.00/one-time -
32
Promisec Endpoint Manager
Promisec
PEM delivers a fundamental capability to the IT organization responsible for software patches updates across the company endpoints and servers. PEM provides unified visibility and control over what’s running on your endpoints and servers, ensuring that you can respond in near real time to any potential flagged threat. With PEM you get full visibility of every file, registry, process, network connection, third-party product and OS version across the organization. PEM leverages proprietary agentless technology to quickly inspect your entire enterprise, identifying, analyzing, and remediating security gaps. The solution is engineered to run at scale on any network, serving diverse use cases from compliance through cyber. -
33
Streaming service is a real-time, serverless, Apache Kafka-compatible event streaming platform for developers and data scientists. Streaming is tightly integrated with Oracle Cloud Infrastructure (OCI), Database, GoldenGate, and Integration Cloud. The service also provides out-of-the-box integrations for hundreds of third-party products across categories such as DevOps, databases, big data, and SaaS applications. Data engineers can easily set up and operate big data pipelines. Oracle handles all infrastructure and platform management for event streaming, including provisioning, scaling, and security patching. With the help of consumer groups, Streaming can provide state management for thousands of consumers. This helps developers easily build applications at scale.
-
34
Moderne
Moderne
Reduce 1000s of hours of static code analysis fixes to minutes. Patch security vulnerabilities across 100s of repositories at once. Moderne automates code remediation tasks for you, enabling developers to deliver more business value all the time. Automatically make safe, sweeping changes to your codebase that improve the quality, security, and cost of code. Manage dependencies of your software supply chain, keeping software up to date continuously. Alleviate code smells automatically without all the scanning noise of SAST and SCA tools. Work in high-quality code all the time. Find and fix CVEs automatically across repositories, it's the ultimate shift left for security. The reality of modern applications is that they naturally accrue technical debt. They are composed of large and diverse codebases and ecosystems, and a supply chain of custom, third-party, and open-source software. -
35
TrustCloud
TrustCloud Corporation
Don’t struggle with 1000s of vulnerability smoke signals from your security tools. Aggregate feeds from your cloud, on-premises, and bespoke apps, and combine them with feeds from your security tools, to continuously measure the control effectiveness and operational status of your entire IT environment. Map control assurance to business impact to assess which gaps to prioritize and remediate. Use AI and API-driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real-time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it. -
36
Vorlon
Vorlon
Continuous near real-time detection and identification of your data in motion between third-party apps with remediation capabilities. By not continuously monitoring third-party APIs, you inadvertently grant attackers an average of seven months to act before you detect and remediate an issue. Vorlon continuously monitors your third-party applications and detects abnormal behavior in near real-time, processing your data every hour. Understand your risks in the third-party apps your Enterprise uses with clear insights and recommendations. Report progress to your stakeholders and board with confidence. Gain visibility into your third-party apps. Detect, investigate, and respond to abnormal third-party app activity, data breaches, and security incidents in near real-time. Determine whether the third-party apps your Enterprise uses are compliant with regulations. Provide proof of compliance to stakeholders with confidence. -
37
SnaPatch
SmiKar Software
Access and interact with your SCCM environment – view collections and servers, along with detailed information including make, model, OS and serial numbers. Check the compliance level of each server from within each collection. See detailed information such as the number of updates missing for each class (ie. security, critical, service packs, etc.) Remove the risk of patching your virtual Windows fleet by automatically taking a snapshot before deploying any patches. Patches are only deployed to servers that have had a successful snapshot performed. If the snapshot fails, then no updates are deployed to those servers. You decide how long to keep snapshots before the system automatically deletes them, and even get reminder emails before it happens! You also have the option to exclude servers from the snapshot auto-delete policy. Stay informed every step of the way.Starting Price: $500 one-time payment -
38
DerScanner
DerSecur
DerScanner is a convenient and easy-to-use officially CWE-Compatible solution that combines the capabilities of static (SAST), dynamic (DAST) and software composition analysis (SCA) in a single interface. It helps provide more thorough control over the security of applications and information systems and check both your own and open source code using one solution. Correlate the results of SAST and DAST, verify the detected vulnerabilities and eliminate them as a first priority. Strengthen your code by fixing vulnerabilities in both your own and third-party code. Perform an independent code review with developers-agnostic application analysis. Detect vulnerabilities and undocumented features in the code at all stages of the application development lifecycle. Control your in-house or third-party developers and secure legacy apps. Enhance user experience and feedback with a smoothly working and secure application.Starting Price: $500 USD -
39
Adaptiva OneSite Wake
Adaptiva
Turn on Windows devices from within your enterprise network at any time to successfully install critical software updates and patches. Have complete confidence that every endpoint receives critical updates even if they are offline. Ensure the latest software updates and patches are installed on every device across your network. Remotely power on endpoints or wake them up from sleep mode from within your enterprise network. Set a desired schedule to ensure the availability of certain endpoints or groups of endpoints. Allow users to manually wake up devices via an online portal. Turn on devices anywhere, at any time, to enable successful content distribution without disrupting end-users. With Adaptiva OneSite Wake, you can continuously deliver software and patches to devices across your organization, wherever they are, without infrastructure. -
40
Radware Client-Side Protection
Radware
Cybercriminals are targeting an unmonitored source for personal and financial data, the application supply chain. This includes the dozens of automatically trusted third-party services embedded in your application environments that can expose user-entered addresses, credit card numbers, and more. Protect the data path between end users’ browsers and third-party services by extending Radware’s blanket of security to your application supply chain. Our advanced client-side protection complies with new PCI-DSS 4.0 requirements, so you can keep your customer data safe, and your reputation intact. Discover third-party scripts and services running on the browser side of your application. Receive real-time activity tracking alerts and threat-level assessments according to multiple indicators (compliant with PCI-DSS 4 regulations). Prevent data leakage by blocking destinations that are unknown or have illegitimate parameters. -
41
ESET PROTECT Complete is a comprehensive cybersecurity solution designed to safeguard business endpoints, cloud applications, and email systems. It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email servers, incorporating anti-malware, anti-phishing, and anti-spam measures. Its centralized, cloud-based management console allows for streamlined deployment, monitoring, and response to security incidents across the organization. Additional features include vulnerability and patch management, ensuring that software vulnerabilities are promptly identified and addressed.Starting Price: $287.72 one-time payment
-
42
ISG GovernX
ISG
ISG GovernX® is the first third-party management platform that allows you to proactively optimize the value of your supplier relationships, mitigate risks and manage the contract lifecycle with speed and agility. Get control of your third-party environment, improve supplier performance and decrease spend. Leverage ISG’s knowledge and insights borne from more than $460 billion worth of enterprise client-supplier transactions. Automate the entire lifecycle of third-party risk management. Minimize exposure to financial, reputation, operational, and identify risk exposure from your third parties. From onboarding, assessments, and remediations to performance monitoring and reviews, gain efficiency by automating your workflow, integration, and on-going notifications. Maintain insight and oversight of your third-party portfolio. Orchestrate and manage your complex environment of third-party relationships in one easy-to-use dashboard. -
43
Triplicity
Phinity Risk Solutions
With Triplicity’s powerful cloud software, you can easily automate your third-party risk management. Our third-party risk manager helps ensure that your company’s risks are fully understood and well managed, applying a risk-based approach to your third-party vendors. Triplicity automates all your processes, dramatically reducing your risk and improving strategic relationships with your key third-party vendors. Compare and rate your third parties by risk, category, business unit, or even the application of their agreed service. Improve reliability and reduce your risk by ensuring you continue to work only with parties that comply with industry best practices. Improve your performance by running several thousand third-party assessments simultaneously, and ensure all parties are assessed. Triplicity is an IT Vendor Risk Management (IVRM) solution with a difference. We first profile each third party to provide their inherent risk specific to your business. -
44
OneTrust Third-Party Management
OneTrust
OneTrust's Third-Party Management solution transforms your third-party lifecycle with data-driven automation, shifting from a questionnaire-first to a risk-based approach by integrating data to streamline and secure your third-party ecosystem. It automates manual processes and tailors assessments to the unique needs of each third-party engagement, improving assessment efficiency. Customers experience, on average, more than a 70% reduction in time and cost associated with completing a third-party risk assessment, reducing onboarding time and cost. The platform leverages industry-leading data sources to continuously monitor third-party risk postures and automatically respond as new risks surface. It increases consistency and efficiency by aligning workstreams, band ringing teams together across common workflows, data objects, inventories, and objectives. The solution scales internal capacity by automating key processes, and enabling centralized management of third-party inventories. -
45
ESET PROTECT Elite
ESET
ESET PROTECT Elite is an enterprise-grade cybersecurity solution that integrates extended detection and response with comprehensive multilayered protection. It offers advanced threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent zero-day threats and ransomware. The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full disk encryption, helping organizations comply with data protection regulations. ESET PROTECT Elite provides robust email security, including anti-phishing, anti-malware, and anti-spam technologies, along with cloud app protection for Microsoft 365 and Google Workspace. Vulnerability and patch management capabilities allow for automatic tracking and patching of vulnerabilities across all endpoints.Starting Price: $275 one-time payment -
46
Risk Ledger
Risk Ledger
The Risk Ledger platform gives clients all the tools they need to run a comprehensive, cyber security-led, third-party risk management programme against their entire supply chain at speed and at scale while making it simple, free and fast for third parties to engage with the process and improve their risk management maturity. Our unique secure network model allows every organisation to both run a third-party risk management programme and respond to client risk assessments, facilitating a network of trust relationships between organisations on the platform. Organisations running a third-party risk management programme on the Risk Ledger platform benefit from: - continuous monitoring of risk controls implemented in their supply chain - visibility beyond third-parties to fourth, fifth and sixth parties - procurement cycles reduced by up to 80% - Increased supplier engagement - low per-supplier costs -
47
PATCH MANAGER
PATCH MANAGER
PATCH MANAGER is a comprehensive cable and asset management software solution designed to plan, document, and manage physical layer connectivity across data centers, outside plant fiber networks, office networks, and building infrastructures. It offers features such as end-to-end connection tracing, detailed asset modeling with 2D and 3D visualization, and a flexible work order system to efficiently support network moves, adds, and changes. The software includes a Geographic Information System (GIS) extension for integrating geographical maps, enabling accurate management of outside plant physical assets and cabling. PATCH MANAGER's extensive REST API facilitates seamless integration with third-party systems and devices, enhancing its versatility within various IT environments. Available as both a Software as a Service (SaaS) and in-house deployment, PATCH MANAGER is scalable to support large global networks.Starting Price: $9.50 per month -
48
Black Duck's Mobile Application Security Testing (MAST) service offers on-demand assessments designed to address the unique security risks of mobile applications. It enables detailed analysis of client-side code, server-side code, and third-party libraries, identifying vulnerabilities even without requiring access to source code. Combining proprietary static and dynamic analysis tools, MAST provides two levels of testing depth: Standard, which integrates automated and manual analysis to detect vulnerabilities in application binaries, and Comprehensive, which adds extended manual testing to uncover issues in both mobile application binaries and their server-side functionalities. This flexible and thorough approach helps organizations reduce the risk of breaches and ensure the security of their mobile application ecosystems.
-
49
ManageEngine Patch Manager Plus
ManageEngine
Keep all your production businesses up to date by automating the entire patching process using Patch Manager Plus. Available as both cloud-based and on-premise software, Patch Manager Plus offers features that include scanning for and detecting missing patches, automated scheduled patch deployments, test and approve patches, patch tracking, patch compliance and reporting. Patch Manager Plus also enables users to provide detailed audit and compliance reports.Starting Price: $245 per year -
50
Sonatype Vulnerability Scanner
Sonatype
Sonatype’s Vulnerability Scanner is a tool designed to help developers identify security risks and compliance issues in their open-source components. It provides users with a comprehensive Software Bill of Materials (SBOM), which lists all open-source dependencies and highlights vulnerabilities and license risks. The platform offers real-time scanning and actionable insights, allowing teams to assess the severity of risks and implement fixes swiftly. With automated scans and detailed reports, Sonatype’s Vulnerability Scanner helps organizations secure their applications, manage third-party dependencies, and maintain compliance across their software environments.