Alternatives to Kolide

Compare Kolide alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Kolide in 2024. Compare features, ratings, user reviews, pricing, and more from Kolide competitors and alternatives in order to make an informed decision for your business.

  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
    Leader badge
    Compare vs. Kolide View Software
    Visit Website
  • 2
    IBM Security MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.
    Compare vs. Kolide View Software
    Visit Website
  • 3
    ManageEngine Endpoint Central
    ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Compare vs. Kolide View Software
    Visit Website
  • 4
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Partner badge
    Compare vs. Kolide View Software
    Visit Website
  • 5
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Partner badge
    Compare vs. Kolide View Software
    Visit Website
  • 6
    Kandji

    Kandji

    Kandji

    We’re Kandji: the Apple device management and security platform that empowers secure and productive global work. Through advanced automation and thoughtful experiences, we’re bringing much-needed harmony to the way admins, end-users, and global teams work today and tomorrow. Kandji brings zero-touch deployment, self-healing remediation, click-and-go security, and powerful automation to boost technology teams' efficiency while improving the employee experience with their work.
    Compare vs. Kolide View Software
    Visit Website
  • 7
    Miradore MDM
    Miradore is a cloud-based Mobile Device Management (MDM) platform that was acquired by GoTo in 2022. Miradore provides a smarter way to securely manage both company-owned and personal Android, iOS, macOS, and Windows devices. GoTo (Miradore) has been recognized as a Leader in the IDC MarketScape: Worldwide Unified Endpoint Management (UEM) Software for SMBs 2024 Vendor Assessment, for its ease of use, flexibility and strong multi-platform support for Android, Mac, iOS, and Windows devices. With Miradore, you can stay up to date with your device fleet, automate device management across multiple operating systems, distribute business-critical apps, and secure your company data. Getting started is simple and always free, and when needed, you can unlock additional features with the Premium or Premium+ plans. You can test all the features risk-free with a 14-day trial of the Premium+ plan. No credit card information is required.
    Leader badge
    Compare vs. Kolide View Software
    Visit Website
  • 8
    Syncro

    Syncro

    Syncro

    Syncro is the integrated business platform for running a profitable MSP. Enjoy PSA, RMM and remote access in one affordable package. Integrations to 50+ MSP and business tools you also love and use amp your efficiency even more. Onboarding with Syncro is fast and free. Our bulk agent installer can have you up and running on all your client endpoints in a matter of hours. (Coming from another RMM? Our library of migration and import tools makes for a smooth switch.) Amp your efficiency even more with integrations to 50+ MSP and business tools you also love and use. Syncro pricing is refreshingly simple—one flat fee for all features. Unlimited endpoints, no contracts, no minimums.
    Leader badge
    Partner badge
    Compare vs. Kolide View Software
    Visit Website
  • 9
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution supporting cross-platform-functionalities. They support all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS and support out-of-the-box enrollment. The management process, streamlining the entire device lifecycle starting from enrollment up until device retirement can be monitored and managed from a unified central console. The automated device enrollment, geofencing, remote access, remote control of device/user grouping functionalities, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 10
    Adaptiva OneSite Anywhere
    Adaptiva OneSite Anywhere enables IT admins to exert total visibility and control over all endpoints, regardless of where they are – at home, at work, or at a coffee shop. With most employees working remotely, content delivery – getting patches, updates, and operating systems to endpoints quickly and without creating issues with production traffic, bandwidth degradation, and software delivery success rates – is even more difficult, especially over VPN. OneSite Anywhere helps you securely manage endpoints at unprecedented speed and scale whether they are on premise, connected remotely over VPN, or on the Internet without a VPN connection. OneSite Anywhere combines the world’s most advanced software distribution engine with a new, revolutionary cloud architecture to seamlessly extend the boundaries of the enterprise network to cover the entire internet.
  • 11
    SanerNow

    SanerNow

    SecPod Technologies

    SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
    Starting Price: $50/year/device
  • 12
    Pareto Security
    Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac. Mac comes with a number of built-in security settings that can help businesses prevent data from being stolen or accessed by unauthorized people. Pareto Security checks devices to see if specific settings have been turned on and lets teams know what can be improved. Pareto Security checks Mac against a list of security settings, including whether FileVault and Firewall are on, AirPlay receiver is off, boot is secure, and password is on after inactivity. Additional security checks are being consistently added.
    Starting Price: $17
  • 13
    Trio

    Trio

    Trio Technology

    From businesses to educational institutions, Trio breaks down conventional management methods and rebuilds them gapless, automated, and simply secure. As a one-of-a-kind mobile device management solution, Trio is here to not only meet your security and productivity expectations but to exceed them. Trio is a platform that not only manages devices but also takes care of vulnerability management, endpoint detection and response (EDR), compliance monitoring, and provides visibility into endpoints.
    Leader badge
    Starting Price: $6.00/employee
  • 14
    Quest KACE

    Quest KACE

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
    Starting Price: As low as $3/mo/device
  • 15
    WinMagic MagicEndpoint
    As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks.
  • 16
    Absolute

    Absolute

    Absolute Software

    Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it.
  • 17
    Chimpa

    Chimpa

    Chimpa

    It takes just a few minutes to activate Chimpa and its ease of use makes it suitable even for inexperienced users. Chimpa supports iOS, iPadOS, tvOS and Android operating systems. The MDM is generally a distribution of a combination of applications and configurations on the device, company policies and certificates and back-end infrastructure, in order to simplify and improve the IT management of end-user devices. In modern corporate IT environments, the number and variety of managed devices (and user behavior) is the basis of MDM solutions that allow the management of devices and users in a coherent and scalable way. The general role of MDM is to increase the user-friendliness, security and functionality, while maintaining a certain flexibility for the user. Kiosk mode, security functions, blocking, remote initialization. Collection of analytical data on the use of the App and the network.
  • 18
    Kaseya 365

    Kaseya 365

    Kaseya 365

    Kaseya 365 provides seamless access to functions in endpoint management, security, and backup. These solutions are joined under one subscription, effortlessly integrated, and live within the unified interface experience of IT Complete. Gain access and control over devices and the network. Ensure devices and data are protected from intrusion or corruption. Preserve critical data from loss, theft, or exploitation. Do it all consistently, accurately, and within the constraints of small teams. Reduce vendor fatigue by putting all critical components in one easy-to-understand, acquire, and manage subscription. Experience massive improvements in technician efficiency by leveraging the power of workflow integrations and automation. Experience significant budget benefits by saving up to 75% when compared to using a mix of separate competing solutions. Your Kaseya 365 subscription offers everything needed to manage, secure, backup, and automate endpoints in your environment.
  • 19
    Microsoft Endpoint Manager
    Transformative management and security that meets you where you are and helps you move to the cloud. The secure, integrated management solution. Deploy a seamless, end-to-end management solution that combines the functionality, data, and new intelligent actions of Microsoft Intune and Microsoft System Center Configuration Manager. Get native integration with cloud-powered security controls from Microsoft including risk-based conditional access for apps and data. Use analytics to help understand and remediate issues impacting users. Improve productivity and collaboration with the familiar experience users expect. Give IT flexibility to support diverse scenarios for both bring your own device (BYOD) and corporate owned devices. Accelerate time to value with fast rollout of services and devices with end-to-end integration across our stack. Minimize disruption to IT, users, and processes while maximizing your investment and security.
  • 20
    HCL BigFix

    HCL BigFix

    HCL Software

    HCL BigFix is the AI Digital+ endpoint management platform that leverages AI to improve employee experience and intelligently automate infrastructure management. HCL BigFix offers complete solutions to secure and manage endpoints across nearly 100 different operating systems, ensure continuous compliance with industry benchmarks, and revolutionize vulnerability management with award-winning cybersecurity analytics. HCL BigFix is the single solution to secure any endpoint, in any cloud, across any industry.
  • 21
    IGEL

    IGEL

    IGEL Technology

    IGEL provides the next-gen edge OS for cloud workspaces. Our solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. Work is now defined by what we do, not where we go. The widely distributed workforce is here to stay, and IGEL OS allows people to thrive in their work from anywhere, while organizations retain full management, control, and security of user endpoints regardless of which endpoint device they use. IGEL OS secures and simplifies digital workspaces in healthcare, finance, retail, higher education, government, and manufacturing organizations around the world. Its 100+ technology integrations lend full support of the latest unified communications tools, VDI platforms, DaaS, and SaaS-based applications from anywhere on any x86-64 device, including thin client, laptop, or tablet.
  • 22
    Rippling

    Rippling

    Rippling

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
  • 23
    Prey

    Prey

    Prey

    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd. Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. It's a service that protects over 8 million devices and their data every day, all around the world. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
    Starting Price: $1.2 per month
  • 24
    Devicie

    Devicie

    Devicie

    Modern device management is more critical than ever. Experience hyperautomated deployment and no-touch management. A best-in-class Intune instance tailored to your customers' needs. Tested, deployed, and ready for organization-wide rollout. Zero-touch execution of updates, policies, and automated remediation. Comprehensive insights into the endpoint health of an organization, making management and compliance reporting a breeze. Get all of your customers into a state of modern management with Devicie. It enables IT teams to deploy, control, and maintain their entire device fleet securely, remotely, and at scale. By automating historically monotonous, manual, and disparate IT and security workflows, Devicie reduces the need for multiple-point solutions, ultimately driving costs and time savings while enabling organizations to streamline and unify end-user device management.
  • 25
    HiddenApp

    HiddenApp

    HiddenApp

    HiddenApp protects Apple, Chromebook, Windows, and Android devices against loss or theft through a suite of location tracking, device monitoring, and advanced recovery features. > Fleet location tracking Using HiddenApp's global map view, you can keep track of all of your devices, at a glance. You can also track down individual devices with pinpoint accuracy in real-time or historically, as we also store device location history for up to a year. > Monitoring and incident detection Make sure your devices don't leave the premises of your institution without your knowledge. You can safely rely on our geofencing and IP whitelisting features to get incident notifications on your email whenever a device leaves your designated area or connects to an unauthorized network. > Mass notifications Whenever needed, you can quickly send out an urgent or important message to your entire fleet and choose for it to either be displayed on the screen or to be read aloud on the device.
  • 26
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 27
    eLux

    eLux

    Unicon

    eLux® is an ultra light-weight, Linux-based, hardware agnostic, highly secure x86 end-point operating system purpose-built to help companies scale, and secure their end-user computing in complex VDI, DaaS environments. About eLux: Scale, Manage and Secure Your End-user Computing. Companies today need a lean, secure OS that powers end-point devices operating in increasingly complex environments, running an ever-growing stack of virtual applications and desktops. IT departments need an easy-to-manage, resource friendly end-point OS that can provide end-users access to their virtual desktops and digital workspaces anytime, anywhere. Large enterprises and businesses of all sizes can make use of our Linux-based OS to deliver a consistent employee experience to their diverse, distributed and mobile workforce that meets business needs and also fulfills newer ways of working.
  • 28
    Google Cloud Identity
    A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.
    Starting Price: $6 per user per month
  • 29
    APPVISORY

    APPVISORY

    mediaTest digital

    APPVISORY is Europe’s leading Mobile Threat Defense Software. In combination with leading mobile device management systems (such as MobileIron, Workspace ONE, Microsoft Intune, Sophos, etc.) or as a stand-alone solution, the SaaS solution ensures the protection of sensitive company data by using mobile devices. You can enforce your individual IT security guidelines and requirements according to the GDPR on your employee devices. APPVISORY‘s App-Client contributes to the users‘ education and awareness and enables mobile business processes. APPVISORY secures smartphones and tablets of several hundred customers worldwide ranging from three to 50,000 devices. DAX30 companies as well as numerous small and medium-sized enterprises in sectors such as banking, automotive, energy, retail and government comprise our satisfied customers. APPVISORY is developed and hosted in Germany.
    Starting Price: 490€ per year
  • 30
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 31
    DDP Endpoint Security Suite
    Dell Data Protection | Endpoint Security Suite offers threat protection, authentication, and encryption, all centrally-managed from the Dell Data Protection Server. With centralized management, consolidated compliance reporting, and console threat alerts, businesses can easily enforce and prove compliance for all of their endpoints. Ensure that security device drivers are up-to-date for the best customer experience. Visit http://www.dell.com/support to download Dell ControlVault drivers. Software-based Data Centric Encryption enables IT to easily enforce encryption policies, whether the data resides on the system drive or external media. Designed for mixed vendor environments, it also won’t get in the way of existing IT processes for patch management and authentication. Exclusive to select Dell Latitude, OptiPlex and Dell Precision systems, the optional Full Volume Encryption* solution equips end-user systems with military-grade protection that won’t slow your employees down.
  • 32
    Citrix Endpoint Management
    Let employees work how, when, and where they want with the power to manage all apps, devices, and platforms in one central location. Bring all applications and endpoints together in a single, unified view to deliver the digital workspace your users need to be productive. Protect every endpoint with a unified endpoint management solution. Manage all terminals from the same console. Equip all endpoints with a secure digital workspace. Simplify application and device management with a comprehensive, unified endpoint management solution. It provides device and application management for most devices and platforms and integrates seamlessly with the Citrix product portfolio.
    Starting Price: $4 per user per month
  • 33
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 34
    ManageEngine Endpoint Central MSP
    Experience seamless endpoint management, enhanced security, and real-time insights with Endpoint Central MSP Cloud. Streamline operations and deliver top-notch service to your clients with our all-in-one solution. Effortlessly onboard clients and deploy agents for swift endpoint management. Automate patching for efficient SLA compliance, ensuring client satisfaction. Manage a wide array of client endpoints, including laptops, computers, and mobile devices. Implement strong security measures, including configurations such as geo-fencing, corporate/complete wipe, etc for ultimate protection. Ensure client data privacy through data segregation and client-specific technician logins. Swiftly troubleshoot remote client endpoints for instant issue resolution.
  • 35
    Sophos Mobile
    Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices. Sophos Mobile lets you secure any combination of personal and corporate-owned devices with minimal effort. When users bring their personal macOS, Windows 10, or mobile devices to work, the flexible self-service portal lets them enroll their device, reset passwords, and get help, with no involvement from IT, making your life easier. Container-only Management gives admins control over corporate content in the Sophos Secure Email and Sophos Secure Workspace apps without requiring management of the mobile device itself. Ensure business data doesn’t go adrift and isn’t threatened by malware.
  • 36
    Fusion UEM

    Fusion UEM

    VXL Technology

    VXL Software’s unified endpoint management solution, Fusion UEM, provides powerful device management for smartphones, tablets, desktops, laptops and thin clients – enabling better control over your devices and more secure homeworking. Fusion UEM brings the industry-leading device management portfolio of applications – to Android (4.x upwards) and iOS (7.0 upwards) mobile devices, Windows desktop / laptop PCs (XP/7/8/10 IoT & Windows 7/10 Professional) and VXL Windows Embedded and Linux thin clients together with Windows-based thin clients from third parties. Via Fusion SecureDesktop, Fusion UEM provides incredible endpoint management power, delivering a level of control for remote and homeworking devices that equals on-premises control. For organisations wishing to provide secure access to virtualised corporate Windows desktops, Fusion SecureDesktop enables employees to securely access corporate applications and data from a home PC.
  • 37
    Ivanti Neurons for MDM
    Effectively manage and secure all endpoints, so you can protect data everywhere work happens. Dealing with increasing demand for devices, applications and platforms? Ivanti Neurons for MDM is your single solution to manage iOS, iPadOS, Android, macOS, ChromeOS and Windows. Quickly and easily onboard devices and provision them over the air with all the apps, settings and security configurations they need. Deliver a delightful, native user experience across any device and OS while improving productivity. Manage and protect any iOS, iPadOS, Android, macOS, ChromeOS, Windows and VR/XR device, from a single cloud-based solution. Know the devices your supply chain workers rely on are updated and in good operating condition, ready for the day’s business.
  • 38
    Google Endpoint Management
    Keep things simple—and moving. Endpoint management for Android, iOS, Windows, Chrome OS, MacOS, and Linux is easy to set up and use. Lost phone? Stolen tablet? These things happen. Keep your company's data secure with endpoint management. You can require screen locks and strong passwords and erase confidential data with device wipe or selective account wipe for Android and iOS, as well as block access to specific Windows, Chrome OS, Linux, and MacOS sessions. Simplify endpoint management in your organization with G Suite. Enforce passcodes and wipe specific accounts without installing software on a user's Android and iOS device with agentless endpoint management. This feature is on by default. Manage and secure Windows 10 devices through the Admin console. Distribute business applications from the Admin console on Google Play (agentless) or Apple’s App Store. Host internal-only Android apps in the Play Private Channel.
    Starting Price: $6 per user per month
  • 39
    Falcon Discover

    Falcon Discover

    CrowdStrike

    Falcon Discover allows you to quickly identify and eliminate malicious or noncompliant activity by providing unmatched real-time visibility into the devices, users and applications in your network. Monitor everything from one convenient, powerful dashboard, and quickly dive in to explore applications, accounts and assets using real-time and historical data. Get contextual information for all of your systems instantly, utilizing dashboards, graphs, charts and search functionality to drill down into supporting data. Leverage the single lightweight CrowdStrike Falcon® agent to keep your systems and users free to do their jobs. Understand all applications running in your environment, and search to see versions, hosts and users. Manage non-compliance and license costs by tracking application usage. Monitor asset inventory to help achieve, maintain and prove compliance requirements.
  • 40
    Adaptiva OneSite Health
    Adaptiva OneSite Health automatically checks the configuration of endpoints, diagnoses any problems, and remediates any issues. And it does this at massive scale – hundreds of thousands of endpoints – without bandwidth throttling or disrupting business processes. Adaptiva OneSite Health is the fastest, most scalable solution to manage endpoint health at scale and includes over 100 pre-built checks and remediations. Our customers use Endpoint Health to ensure endpoints are functioning properly and securely. Over 100 built-in checks can ensure Bitlocker is turned on, or ConfigMgr is working as expected. A major national retailer ran Adaptiva OneSite Health on just over 11,000 live production endpoints. They found a 55% failure rate. Endpoint Health was able to automatically remediate 89% of failed endpoints, with an instant savings of over $1m.
  • 41
    Action1

    Action1

    Action1

    Action1 is the #1 risk-based patch management platform for distributed networks trusted by thousands of global enterprises. Action1 helps to discover, prioritize, and remediate vulnerabilities in a single solution to prevent security breaches and ransomware attacks. It automates patching of third-party software and operating systems, ensuring continuous patch compliance and remediation of security vulnerabilities. The company was founded by cybersecurity veterans Alex Vovk and Mike Walters, who previously founded Netwrix, which was acquired by TA Associates. Action1 functionality: patch management remote access remote management and monitoring software deployment IT asset inventory
    Starting Price: $0 USD/per device/per month
  • 42
    Kitecyber

    Kitecyber

    Kitecyber

    Kitecyber provides a hyper-converged endpoint security solution that provides comprehensive security and meets compliance requirements of organizations for SOC2, ISO27001, HIPAA, PCI-DSS, GDPR etc. Our unique endpoint-based approach eliminates the need for cloud gateways or local appliances. The hyper-converged offering includes the following protections: 1) Secure Web Gateway to safeguard internet access 2) Eliminate Shadow SaaS and Shadow AI) 3) Anti-Phishing measures to protect user credentials 4) Zero Trust Private Access (Next gen VPN) 5) Data Loss Prevention across all devices—Mac, Windows, and mobile 6) Device Management for Mac, Windows, and mobile for all employees, BYOD devices and 3rd party contractors 7) Continuous Compliance Monitoring 8) User Behavior Analysis to identify potential risks
  • 43
    Jamf Protect

    Jamf Protect

    Jamf Protect

    Endpoint protection built exclusively for Mac. Prevent macOS malware, detect and remediate Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Built for Mac to protect Mac. Jamf Protect puts the spotlight on Apple, helping security and IT teams with Mac in organizations of all sizes. Scale your teams through tools that understand the Mac platform. Jamf Protect helps maintain Mac endpoint compliance, address anti-virus needs by preventing macOS malware, control Mac application within the organization, detect and remediate Mac-specific threats, all while maintaining minimal impact to the device and the end-user experience. Prevent With comprehensive insight into Mac-specific malware, Jamf Protect meets your anti-virus needs by preventing known malware from running on your devices and quarantining them for later analysis. Lock down unwanted software by letting Jamf Protect limit its execution. Detect. Defend against sophisticated attacks on your Mac
    Starting Price: $5 per user, per month
  • 44
    BlackBerry Cyber Suite
    Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working? In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption.
  • 45
    Clearswift Endpoint Data Loss Prevention
    As a vital piece of your IT security strategy, Clearswift Endpoint Data Loss Protection (DLP) solution allows organizations to detect, inspect and secure critical data on endpoints. In one solution, it provides context-aware Data in Use (DIU) policies to control which devices can connect to a corporate network and what information can be transferred. It also executes scheduled Data at Rest (DAR) scans on file systems to audit and manage critical data residing on the network or in the cloud. A lightweight agent, Clearswift Endpoint DLP works behind the scenes to enforce your security and compliance policies and provides continuity even when users are not connected to the network. Flexible and context-aware DIU policies allow organizations to apply rules that either prevent documents containing critical data from being copied to removable media, shared on the network or uploaded to the cloud, or automatically encrypt them before they are transferred.
  • 46
    Ivanti Secure Unified Client
    Ivanti Secure Unified Client is a dynamic, integrated, and easy-to-use network client that delivers anytime/anywhere secure connectivity. It provides secure connectivity, an intuitive end-user interface, and simplified deployment options. It runs on platforms that support application distribution through an online application store. Secure access to corporate networks for employees, anywhere, anytime, and from any device. Increased productivity, reduced management overhead, and better security profiles. Data channels use FIPS-certified cryptographic modules. Automated tunnel tear-down or re-establishment. VPN connected automatically via a predefined host. Change the appearance of UI and input elements. With Ivanti Secure Unified Client, you can improve your security for employee access to corporate networks.
  • 47
    Moki Total Control

    Moki Total Control

    Moki Mobility

    Moki creates mobile device management software that enables companies to manage large fleets of single-purpose customer-facing iOS, Android, and BrightSign devices. With our MDM software, mobile devices transform into kiosks, digital signage, and points of sale (POS). Moki MDM is the simplest solution for mobile device management on interactive kiosks, POS stations, and digital signage. Moki’s device deployment can be done in minutes. Once enrolled devices can be managed in bulk with Moki’s simple-to-use UI. Moki’s mobile device management platform helps turn any smartphone or tablets into a single-purpose POS terminal. With Moki these devices can be locked to a single application so you can be sure they are only being utilized as intended. Moki MDM provides the functionality needed to deploy and manage digital kiosks in any scenario. Additionally, when using our Moki Kiosk application users can lock to desired URLs, images, and videos for a consistent end-user experience.
  • 48
    VISO MDM/EMM

    VISO MDM/EMM

    Radix Technologies Ltd.

    VISO MDM/EMM enables help desks, IT administrators and project leaders to centrally monitor, manage and support devices wherever they are. Reaching well beyond the local network boundaries, the cloud-based platform delivers a bird’s-eye view of an entire device fleet, enabling administrators to give the best support possible, optimize device performance and make informed decisions. Extend your support umbrella, control capabilities and manage nomadic users’ mobile devices from wherever they are located and operating, both inside and beyond the organization’s network. Manage mission-critical and complex IT infrastructures and simplify demanding operation and maintenance work on remote and roaming computers, laptops, tablets, digital signage, rugged devices and more.
    Starting Price: $22 per device/year
  • 49
    CLYD

    CLYD

    Telelogos

    Clyd is an MDM / EMM solution to securely manage your devices. Administer, manage and secure Android and Windows smartphones or tablets with CLYD software. It offers the essential features of app management, device security and remote control. It gives your company a complete solution to manage a fleet of mobile devices, certified by Google and its Android Enterprise program. CLYD is acclaimed by many companies for its simple and intuitive use. Its scalability and reliability enable it to respond fully to the needs of small to large deployments. Use kiosk mode to create and deploy a secure work environment for users on your business devices. Deploy business applications developed in-house or from the Google Play Store; silently update applications. Have information at your fingertips about the general condition of your fleet, connection and deployment statistics, device malfunction alarms. CLYD is approved by Google and is compatible with Android Enterprise Recommended devices.
  • 50
    WAY

    WAY

    WAY

    WAY brings magic capabilities to your existing fleet. WAY comes with a powerful platform to manage your devices. Sync your people via almost any HRIS or Slack and assign devices to them. Your devices are automatically set up with all software and must take security measures when the device is started for the first time. WAY sets up devices with software and must-do security. WAY automatically handles your inventory. WAY takes care of any device- shipment with special shipping boxes and pre-printed shipping labels. WAY handles all device logistics including remote device returns. WAY lets you wipe devices from anywhere & sell old devices. Automatically wipe devices during offboarding and trade in old devices for cash. WAY makes sure all your devices run on the latest operating system. Start for free and upgrade when you need it. WAY makes sure your devices are up to date.
    Starting Price: €8 per employee per month