Alternatives to Heimdal Patch & Asset Management

Compare Heimdal Patch & Asset Management alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Heimdal Patch & Asset Management in 2024. Compare features, ratings, user reviews, pricing, and more from Heimdal Patch & Asset Management competitors and alternatives in order to make an informed decision for your business.

  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, empowering more than 17,000 IT teams with visibility, security, and control over all endpoints. The NinjaOne platform increases productivity while reducing risk and IT costs. Organizations use NinjaOne, including its wide range of IT and security integrations, for use cases including endpoint management, patch management, mobile device management, software deployment, remote access, endpoint backup, and more.
    Leader badge
    Compare vs. Heimdal Patch & Asset Management View Software
    Visit Website
  • 2
    ManageEngine Endpoint Central
    ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Compare vs. Heimdal Patch & Asset Management View Software
    Visit Website
  • 3
    ConnectWise RMM

    ConnectWise RMM

    ConnectWise

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
    Compare vs. Heimdal Patch & Asset Management View Software
    Visit Website
  • 4
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Partner badge
    Compare vs. Heimdal Patch & Asset Management View Software
    Visit Website
  • 5
    Acronis Cyber Protect
    Managing cyber protection in a constantly evolving threat landscape is a challenge. Safeguard your data from any threat with Acronis Cyber Protect (includes all features of Acronis Cyber Backup) – the only cyber protection solution that natively integrates data protection and cybersecurity. - Eliminate gaps in your defenses with integrated backup and anti-ransomware technologies. - Safeguard every bit of data against new and evolving cyberthreats with advanced MI-based protection against malware. - Streamline endpoint protection with integrated and automated URL filtering, vulnerability assessments, patch management and more
  • 6
    KernelCare Enterprise
    Global organizations trust Tuxcare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the Tuxcare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates. Tuxcare automates the patching process and eliminates the need to wait weeks or months for reboot cycles to apply patches. Tuxcare currently protects over 1 million workloads worldwide. Tight integrations with popular patch management and vulnerability scanners, including Qualys, Crowdstrike, and Rapid7, enable Tuxcare to fit seamlessly into existing infrastructure. The Tuxcare secure patch server, ePortal, allows operations in gated and air-gapped environments. Reduce risk by significantly reducing the mean time to patch vulnerabilities
  • 7
    TOPIA

    TOPIA

    Vicarius

    With hundreds of new software and OS vulnerabilities detected each month, reducing organizational security risk can become overwhelming. TOPIA's vulnerability management toolbox provides a quick and efficient way to analyze, prioritize, and remediate cyber threats before they're exploited—with or without a security patch. TOPIA's is a cloud-based cost-effective vulnerability assessment tool, actively identifies risks, and eliminates threats using proprietary xTags™ and Patchless Protection™ that go beyond traditional vulnerability management. TOPIA continuously conducts real-time risk analysis and tracks each phase of remediation, so you're always in the loop about your organization's cyber health. TOPIA allows you to get more done faster with risk-prioritization parameters, auto-security patch and efficient reports on your team's progress and performance.
  • 8
    Adaptiva OneSite Anywhere
    Adaptiva OneSite Anywhere enables IT admins to exert total visibility and control over all endpoints, regardless of where they are – at home, at work, or at a coffee shop. With most employees working remotely, content delivery – getting patches, updates, and operating systems to endpoints quickly and without creating issues with production traffic, bandwidth degradation, and software delivery success rates – is even more difficult, especially over VPN. OneSite Anywhere helps you securely manage endpoints at unprecedented speed and scale whether they are on premise, connected remotely over VPN, or on the Internet without a VPN connection. OneSite Anywhere combines the world’s most advanced software distribution engine with a new, revolutionary cloud architecture to seamlessly extend the boundaries of the enterprise network to cover the entire internet.
  • 9
    SanerNow

    SanerNow

    SecPod Technologies

    SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
  • 10
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
  • 11
    Skybox Security

    Skybox Security

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 12
    PDQ Deploy & Inventory
    Automate patch management with PDQ Deploy & Inventory. Use PDQ Inventory to scan, collect, and organize your devices, then use PDQ Deploy to set a preferred schedule for deployment. Once the deployment has been scheduled, PDQ will automatically and silently apply updates without inconveniencing end users. - Integrate with Active Directory to easily collect device data 📊 - Schedule multi-step and multi-application custom deployments 💻 - Access the Package Library, which includes 100+ ready-to-deploy third party applications 📦 - Remotely execute commands, run scripts, and force reboots 🥾 - Apply updates silently 🤫 - Create custom device groupings 🖥️ - Use our PowerShell scanner, CLI, and other prebuilt tools 🧰 - Save and export reports, including custom data like asset information 📈 - Share servers and databases with other consoles 🤝 tl;dr — PDQ Deploy and Inventory makes device management simple, secure, and pretty damn quick.
  • 13
    Patch My PC

    Patch My PC

    Patch My PC

    Save more time than you ever thought possible and improve security by automating the patching of third-party applications in Microsoft ConfigMgr and Intune. Extend beyond patching, auto-create applications for the initial deployment of products in Microsoft SCCM and Intune. Including icons, keywords, descriptions, and much more! We'll keep the base installs up to date automatically — no need to deploy outdated apps and wait for the updates to apply after the fact. Use existing installation methods within SCCM including task sequences and collection deployments for the initial installation of products. Add your own custom pre/post-update scripts to perform environment-specific configurations when needed. Disable the self-update feature within applications to ensure you can manage when and how updates apply in your enterprise.
    Starting Price: $2 per device per year
  • 14
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 15
    Seal Security

    Seal Security

    Seal Security

    Redefine open source vulnerability and patch management with Seal Security. Easy integration directly into your existing SDLC, and workflows. Standalone security patches for immediate resolution of critical security issues. Predictable remediation and optimal resource allocation, with centralized control and reduced R&D dependency. Streamline your open source vulnerability remediation without introducing the risk of breaking changes. Say goodbye to alert fatigue and start patching with Seal Security. Pass every product security scan with confidence. Seal Security provides immediate remediation for open source vulnerabilities. By meeting your customers' SLAs and offering a vulnerability-free product, you can ensure customer trust and fortify your market standing. Seal Security seamlessly integrates with various coding languages, patch management systems, and open source platforms through powerful APIs and CLI.
  • 16
    baramundi Management Suite

    baramundi Management Suite

    baramundi Software USA

    Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.
  • 17
    AVG Patch Management
    Patches are software and operating system updates that address security vulnerabilities within an application. Software vendors constantly release patches to fix vulnerabilities and provide enhanced security features. Patching can be complex and time-consuming, but ignoring software updates isn’t an option. If patches are not installed in a timely manner, networks can be severely compromised. Patch Management solves these issues by making it easy to identify and deploy critical patches and monitor ongoing activity from a central cloud management console. Schedule automatic patch scans. Select from daily, weekly, or monthly options. Patches will be deployed automatically for all software applications. You can easily exclude any application that you don’t want to be patched. Easily see the status of all your patches, including missing patches and severity level. Schedule and deploy approved patches at desired times or manually deploy them to groups or individual devices.
  • 18
    Automox

    Automox

    Automox

    Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
  • 19
    Avast Business Patch Management
    Simplify and automate the patching process to save time and money. Get patching support for Windows and thousands of popular third-party applications. Software patches can be ignored. Proven, industry-leading patch management that keeps all your Windows systems and third-party apps up-to-date with the latest patches. Distribute thoroughly tested patches to thousands of machines in minutes, with minimal impact on your network. Patch all devices anywhere—whether they're behind the firewall, on the road, at remote sites, or even asleep. Manage all Microsoft Windows and thousands of third-party software updates from a single cloud-based platform. Achieve compliance, mitigate exploits, close vulnerabilities, and remotely deploy software and Windows updates. Our patch content engineers spend countless hours thoroughly testing all patches before we release them to you, in order to ensure they function optimally and don’t introduce new problems.
    Starting Price: $14.99 per device per year
  • 20
    OpenText ZENworks Endpoint Software Patch Management
    Enable automated processes for patch assessment, monitoring, and remediation. Apply patches up to 13 times faster without burdening your staff. Team workspaces enable you to create digital offices where local and global team members can gather online to coordinate their efforts. Monitor patch compliance, quickly identify and assess vulnerabilities, and automatically apply updates and patches to meet pre-defined standards. Patch Management watches your back, patching everything you’ve got on your network 24 hours a day, without the need for human intervention. With its unique policy-based approach, you set up the policies, define the actions, and then sit back and let ZENworks do the rest. ZENworks Patch Management includes fast, automatic patch deployment based on predefined policies, as well as the ability to customize tested patches as needed. It also supports phased rollouts to ensure smooth, error-free patch deployments to large numbers of systems.
  • 21
    Cloudaware

    Cloudaware

    Cloudaware

    Cloudaware is a cloud management platform with such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, and Backup. Cloudaware is designed for enterprises that deploy workloads across multiple cloud providers and on-premises. Cloudaware integrates out-of-the-box with ServiceNow, New Relic, JIRA, Chef, Puppet, Ansible, and over 50 other products. Customers deploy Cloudaware to streamline their cloud-agnostic IT management processes, spending, compliance and security.
  • 22
    GFI LanGuard

    GFI LanGuard

    GFI Software

    GFI LanGuard enables you to manage and maintain endpoint protection across your network. It provides visibility into all the elements in your network, helps you assess where there may be potential vulnerabilities, and enables you to patch them. The patch management and network auditing solution are easy-to-use and easy to deploy. Automatically discover all the elements in your network, including computers, laptops, mobile phones, tablets, printers, servers, virtual machines, routers and switches. Group your devices for better management. Distribute management to different teams and see everything from a central management dashboard. Identify non-patch vulnerabilities by using an updated list of 60,000+ known issues as well as items such as open ports and system information about users, shared directories and services. Find gaps in common operating systems. Identify missing patches in web browsers and third-party software.
  • 23
    Syxense Manage
    Syxsense Manage lets users see and manage all endpoints inside and outside the network with coverage for all major operating systems and endpoints, including IoT devices. Syxsense provides users with a complete view of their IT infrastructure with an intuitive interface, and all-inclusive features. The service is designed to provide full endpoint intelligence with OS, hardware, and software inventory details. Know if patches are missing or security standards are compromised. Critical devices are color coded in the datagrid, dashboards, and reports. Use sites, queries, and groups to target and view devices in logical subsets. Scan and prioritize security and patching priorities relative to exposed risk. Find out which patches have been released, their severity, and if vulnerabilities are being exploited. Automated Maintenance and Blackout Windows protect business productivity while deploying updates.
  • 24
    SolarWinds Patch Manager
    Patch management software designed for quickly addressing software vulnerabilities. SolarWinds® Patch Manager simplifies many of the steps in the patch management process—from research and scheduling, to deployment and reporting—to help save you time and make it easier to keep your servers and workstations patched and compliant. SolarWinds Patch Manager works with and extends your Microsoft WSUS and SCCM deployments with pretested, prebuilt updates for Microsoft products and third-party applications from a central point of control. SolarWinds Patch Manager makes it easier to manage patches on virtual desktops and servers with the ability to patch offline machines, organize virtual machines into groups, and inventory virtual machines across your enterprise.
  • 25
    Application Manager

    Application Manager

    Recast Software

    Manage and patch all 3rd party applications in your organization from one centralized location, with the largest application catalog on the market. Third-party application patch management simply cannot be efficient and secure if it is still done manually. Decrease the vulnerabilities of your IT environment by automating the 3rd party patching aspect of your security infrastructure. By doing this you both improve security and save time by removing manual tasks. Application Manager goes beyond managing updates by allowing teams to govern the entire lifecycle of applications, from installation to uninstallation. Gain clarity into your application environment while increasing ease of management. With 2,500+ applications in our catalog, automated software updates save everyone’s time, streamline effectiveness, and keep third-party applications’ cyber security threats at bay. Third-party applications waiting for an update cause a significant security risk to organizations of all shapes.
  • 26
    ManageEngine Patch Manager Plus
    Keep all your production businesses up to date by automating the entire patching process using Patch Manager Plus. Available as both cloud-based and on-premise software, Patch Manager Plus offers features that include scanning for and detecting missing patches, automated scheduled patch deployments, test and approve patches, patch tracking, patch compliance and reporting. Patch Manager Plus also enables users to provide detailed audit and compliance reports.
  • 27
    Adaptiva OneSite Patch
    OneSite Patch's automation capabilities revolutionize how businesses manage and deploy software updates, significantly reducing manual workload and minimizing the risk of human error. By streamlining the patch deployment process, companies can ensure their systems are always up to date with the latest security measures, enhancing overall cybersecurity posture with unparalleled efficiency. Rapidly remediate vulnerabilities with hands-free, fully automated patch management. Reduce manual workloads and intelligently automate even the most complex enterprise patching processes. IT and security teams can precisely mirror their desired patching rules, including phased deployments, approvals, testing, and notifications, then OneSite Patch takes care of the rest every time a new patch is available. IT and security teams can precisely mirror their desired patching strategies once, then automation takes care of the rest. When a new patch is available, it can be deployed without any intervention.
  • 28
    Quest KACE

    Quest KACE

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
  • 29
    Juriba Enterprise
    Discover the power of centralising your Digital Workplace management with the Juriba Platform. As the leading Digital Platform Conductor (DPC) tailored to the intricate demands of large enterprise Digital Workplace leaders, Juriba offers a comprehensive suite of tools. From complete Digital Workplace management and application testing and packaging to facilitating complex IT transformations and ongoing Evergreen IT management initiatives, our platform empowers you to streamline operations efficiently. Seamlessly integrating with Hybrid Digital Infrastructure Management tools like Microsoft Endpoint Manager, Microsoft Intune, ServiceNow, NexThink, and Workspace ONE, among others, Juriba synchronizes data across your entire Digital Workplace, granting you unparalleled visibility and control. Through intelligent workplace automation and orchestration, tedious tasks are eliminated, minimising human error and enhancing productivity.
  • 30
    Cisco Vulnerability Management
    A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management. We created Risk-Based Vulnerability Management software and now we’re defining the modern model. Show your security and IT teams which infrastructure vulnerabilities they should remediate, when. Our latest version reveals exploitability can be measured, and accurately measuring exploitability can help you minimize it. Cisco Vulnerability Management (formerly Kenna.VM) combines real-world threat and exploit intelligence and advanced data science to determine which vulnerabilities pose the highest risk and which you can deprioritize. Spoiler alert: Your mega-list of “critical vulnerabilities” will shrink faster than a woolen sweater-vest in a hot cycle.
  • 31
    Comodo Dragon Platform
    Our completely cloud-native framework delivers you zero day protection against undetectable threats while defending your endpoints from known threat signatures. Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. The Dragon platform delivers the foundation principles for complete next-generation endpoint protection. Easily improve your cybersecurity and performance with the Dragon Platform's lightweight agent delivering artificial intelligence (AI) and Auto Containment to stop all threats. Comodo delivers everything cybersecurity you ever needed to activate breach protection immediate value added from day one. 100% trusted verdict within 45 seconds on 92% of signatures via analysis, and 4 hours SLA on the remaining 8% via human experts. Automatic signature updates that simplifies deployment across your entire environment to lower operational costs.
  • 32
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices.
  • 33
    Panda Patch Management

    Panda Patch Management

    WatchGuard Technologies

    Patch Management is an easy-to-use solution for managing vulnerabilities in operating systems and third-party applications on Windows workstations and servers. It covers all the patch management processes including discovering, identifying, assessing, reporting, managing, deploying installations and remediating security risks. Reduce the attack surface, contain and mitigate vulnerability exploitation attacks, while strengthening your organization’s prevention and containment capabilities. Centralized and real-time visibility into the security status of software vulnerabilities, missing patches, updates and unsupported (EOL) software. Audit, monitor and prioritize operating system and application updates.
  • 34
    Adaptiva OneSite Wake
    Turn on Windows devices from within your enterprise network at any time to successfully install critical software updates and patches. Have complete confidence that every endpoint receives critical updates even if they are offline. Ensure the latest software updates and patches are installed on every device across your network. Remotely power on endpoints or wake them up from sleep mode from within your enterprise network. Set a desired schedule to ensure the availability of certain endpoints or groups of endpoints. Allow users to manually wake up devices via an online portal. Turn on devices anywhere, at any time, to enable successful content distribution without disrupting end-users. With Adaptiva OneSite Wake, you can continuously deliver software and patches to devices across your organization, wherever they are, without infrastructure.
  • 35
    Tanium

    Tanium

    Tanium

    Empowering the world’s largest organizations to manage and protect their mission-critical networks. Our data model can collect new, ad-hoc data on the fly in seconds, allowing customers, partners and Tanium to quickly develop capabilities on this extensible platform. Our patented architecture collects and distributes data to millions of endpoints in seconds, with zero infrastructure. Enable decision-making where data is generated: the endpoint itself. Our agent consumes minimal endpoint resources and bandwidth while fitting on the firmware of the smallest chips. Expand your capabilities without expanding Tanium’s footprint. We’ve found that the best way for customers to understand what we do is to show our platform in action. Orion Hindawi, Tanium’s co-founder and CEO, will guide you through a hands-on keyboard tour to show what Tanium does and the power of the platform. Track down every IT asset you own instantaneously.
  • 36
    Replicated

    Replicated

    Replicated

    Operationalize & scale the distribution of modern on‑prem applications to enterprise customers. Replicated customers serve some of the world's largest and most innovative companies, from industries including financial services, automotive, and consumer technology. Out of the box, Replicated gives you everything you need to start shipping an installable version of your application securely and quickly. A unified experience for delivering to both customers with an existing Kubernetes cluster and customers without any Kubernetes knowledge. The most advanced end-user experience for configuration, updates, and application management. Robust tools for trustless troubleshooting and automated remediation in disconnected environments. Create and manage customer licenses to enforce customer-specific entitlements (expiration, features, usage limits, etc). Plugs into existing deployment pipelines to integrate CI/CD processes with enterprise release cadence.
  • 37
    Waratek

    Waratek

    Waratek

    Integrate seamless security into the software delivery lifecycle to improve efficiency and agility. Ensure security policies are flexible, human readable, and not impacted by technical debt. Deploy applications securely across on-premises, hybrid, or cloud infrastructures. Automate systems' adherence to desired security behavior to minimize delays & fire drills. Execute the security of your apps in the runtime with a performance impact of less than 3% in production. We see agent-less solutions as a major disadvantage for highly regulated organizations that have tight security requirements. This is why Waratek leverages an agent to ensure its autonomous behavior that can secure unknown threats for themselves unlike agent-less models. Virtually upgrade apps and dependencies like Log4j without code changes, vendor patches, or downtime.
  • 38
    JetPatch

    JetPatch

    JetPatch

    Powerful features that give you complete visibility and control of patch compliance across all environments. Eliminate patching blind spots and get a comprehensive patch compliance report. View and analyze the entire patch remediation process in a single, easy-to-understand dashboard. Ensure your systems are always up-to-date. Streamline patch and vulnerability remediation across infrastructure and company silos, saving time, preventing errors and reducing time-to-remediation. JetPatch analyzes and learns the root causes of remediation delays and automatically corrects them. Shorten scheduled downtime windows by creating a more efficient process (more patches in the same DT window). Increases security because patches are done quicker.
  • 39
    XEOX

    XEOX

    XEOX

    XEOX is a comprehensive, cloud-based remote management and monitoring solution that includes optimized patch management, integrated remote access, seamless software deployment, IT asset management and more. It allows you to centrally manage the IT landscape of all computers and servers within your organization, and keeps track of inventory and software. XEOX was developed to take IT management to a new level. It is fast, accessible from anywhere and easy to use thanks to our modern user interface. XEOX will save your business money because it cuts down costly help desk calls. It will alert your IT support staff to potential risks so they can be fixed as quickly as possible. Task automation facilitates many routine maintenance tasks, freeing up IT support for more complex jobs.
  • 40
    Action1

    Action1

    Action1

    Action1 is the #1 risk-based patch management platform for distributed networks trusted by thousands of global enterprises. Action1 helps to discover, prioritize, and remediate vulnerabilities in a single solution to prevent security breaches and ransomware attacks. It automates patching of third-party software and operating systems, ensuring continuous patch compliance and remediation of security vulnerabilities. The company was founded by cybersecurity veterans Alex Vovk and Mike Walters, who previously founded Netwrix, which was acquired by TA Associates. Action1 functionality: patch management remote access remote management and monitoring software deployment IT asset inventory
    Starting Price: $0 USD/per device/per month
  • 41
    Easy2Patch
    Easy2Patch is a software that enables centralized updating of third-party products running on computers within IT ınfrastructures. It works integrated with WSUS, ConfigMgr, and Intune. Its scope is limited to third-party Updates on Windows Operating System Platforms. Easy2Patch does not allow the archiving of updates or the archiving of setup processes. This design ensures that your updating and installing processes are automatically on time. Updates for third-party products are securely provided with the original site link. With the Defender feature, Easy2Patch can automatically send third-party applications to the computers within the group the system administrators determined. These are on the CVE score to be determined but forgotten or not configured to be sent via Easy2Patch. *Stay up to date *Extensive application pool for wide use *Automatic protection of computers with Microsoft Defender feature
  • 42
    Autonomic Software

    Autonomic Software

    Autonomic Software

    Autonomic Software was established with the primary objective of creating solutions that can protect organizations against cybersecurity issues. Turn to our expert software solutions to assist your company in mitigating potential breaches. We have never encountered a successful cyberattack from any of our critical infrastructure locations. Patch and Application Manager is a fully integrated component that provides McAfee ePO users with a comprehensive solution to manage Windows and Mac updates including third-party and custom applications for desktops, laptops, and servers. All data collected by Patch Manager rolls up into Risk Advisor for McAfee ePO to provide a more comprehensive view of an organization's network and vulnerabilities.
  • 43
    BMC Helix Remediate
    Automated security vulnerability management for 14X faster remediation. BMC Helix Remediate uses advanced analytics and automation to quickly fix security vulnerabilities and manage compliance of on-premises and cloud infrastructure. Strengthen security, ensure compliance, improve productivity, and lower costs. Imports and analyzes data from vulnerability scanners, maps vulnerabilities to assets and patches, sets priorities, and automates corrective action. Provides real-time visibility into security vulnerabilities, missing patches, and misconfigured resources. Uses simplified patching for rapid remediation of security vulnerabilities both on premises and in the cloud. Leverages automation to ensure compliance with external regulations and internal organizational policies. Automates configuration testing and remediation for resources on AWS, Azure, and GCP to ensure cloud services and containers are managed consistently and securely.
  • 44
    Huawei Cloud Resource Formation Service
    Resource Formation Service (RFS) automates cloud resources provisioning and application deployment based on templates you define. A graphical template designer and a large number of free sample templates enable you to intuitively and easily create custom templates. You only need to describe the final state of resources in a template, which frees you from complex operations. You do not need to install software, prepare an executor, or manage underlying files or data. You can generate an execution template by dragging resources, which reduces the learning curve. Visualized compliance control policies prevent security risks caused by resource changes. Resource deployment rollback, resource status query, and resource operation trace are supported. Compatibility with HCL syntax eliminates an extra learning curve. You can deploy or delete a template in one click without complex manual operations.
  • 45
    DROPS

    DROPS

    DROPS

    DROPS is a release management tool designed to simplify, secure, and centralize the deployment of applications across data centers, hybrid, and multi-cloud infrastructures. It supports a wide range of platforms, integrates seamlessly with various CI/CD pipelines, and offers both agent-based and agentless operations. With features like full-stack release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes and ensure consistent, reliable delivery. The tool is flexible enough to manage both legacy and modern applications, catering to diverse enterprise needs. Select agent-based or agentless operation. No need for agent installation and management. DROPS adapts to your configuration and if agents are needed, they are provisioned automatically. Plan and organize your application deployment from the web console with no scripting needed. Ease collaboration between stakeholders and technical teams.
  • 46
    Parallels Device Management
    Centrally administer PCs, iPhones and iPads, including Mac management, with a simple plug-in. Extends Microsoft Endpoint Configuration Manager (MECM) for unified device administration. Improves IT performance, reducing duplicate work and incident resolution time. Straightforward to deploy, requiring no additional infrastructure or training. IT administrators don’t have to learn much about macOS to manage it—our solution transcends existing processes and skillsets. Manage Mac computers and software discovery, distribution, updates and inventory just like PCs. Easily enroll iPhone and iPad devices and secure them with the help of Configuration Profiles without having to use an additional solution for managing mobile devices. Leverage familiar workflows in the Configuration Manager for creating iOS inventory reports. Without the right tools, Apple computers and mobile devices take up a disproportionate amount of IT support time compared with Windows PCs.
  • 47
    Ecora

    Ecora

    IgniteTech

    Manage workstations and servers with access to a wide range of reports based on machines' configurations. Automate system discovery, patch assessment and patch installation on workstations and servers. Collect information from your IT environment in seconds. Get the information you need without having to install anything in your environment. Ecora allows you to slice and dice your data on the fly, without a wait. Ecora is easy to install and get running. Set up your collections in a snap. Get the data you need to ensure you have the most secure environment with just a few clicks. Easily create custom reports on the attributes you need to review to keep your environment safe and secure. Maximize the return on your investment with IgniteTech’s Consulting Services, an exclusive benefit for IgniteTech Platinum customers. From advisory and process consulting, through implementation and support, our team of industry experts will ensure you get superior value from your technology investment.
  • 48
    Fleetsmith
    Put your devices on auto-pilot. Fleetsmith automates device setup, intelligence, patching, and security, for your company’s Macs, iPhones, iPads, and Apple TVs. Automatically set up devices for new hires? Check. Automatically detect and prevent problems across your fleet? Yup. Automatically install and update apps automatically? You bet. Security is deeply considered in every aspect of our product, and in every decision we make. Stemming from our company value “Secure by Design,” we made sure that our product was secure from day one, and that our internal policies were secure from the get-go. Experience one click sign-up, automatic Single Sign-On (SSO), and 1-click import of your employee directory. All with zero configuration.
    Starting Price: $8.25 per user per month
  • 49
    Panorama9

    Panorama9

    Panorama9

    This is IT monitoring and management done right. Get the full picture and respond quickly to issues. Patch management, remote control, network discovery, all built into one beautiful and easy-to-use solution. Got a minute? That’s how long it takes to deploy and install a powerful and lightweight agent on all of your devices. Within minutes you are provided with detailed information about your IT environment. IT administration is complex but we make your job easier. Automatically discover devices and services in your IT environment. Remote install applications and run scripts. Everything you need in one comprehensive tool. Downtime is unacceptable. Panorama9 foresees problems so you can be proactive instead of reactive. When things do go wrong you are notified instantly and can take action before your users notice anything. Your security is only as strong as the weakest link - we'll tell you where that is.
  • 50
    Phosphorus

    Phosphorus

    Phosphorus Cybersecurity

    Phosphorus is the backbone tool to secure the rapidly growing and often unmonitored enterprise IoT landscape. Providing visibility down to the device model and firmware version, Phosphorus gives you full, granular visibility into all embedded devices on your network. Phosphorus’s patented capabilities allow you to update all of your IoT devices to the latest firmware and rotate credentials at the click of a button. Unlike traditional scanners that search for vulnerabilities or require expensive Spanports, Phosphorus’s scanner provides light-touch detection of all IP-enabled IoT devices on your network without “knocking them over”. Gain full enterprise protection with our solutions. Audit IoT inventories. Meet compliance requirements and industry regulations. Automate key tasks like policy enforcement and patching updates – all at a fraction of the cost.