Alternatives to Microsoft Endpoint Manager

Compare Microsoft Endpoint Manager alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Microsoft Endpoint Manager in 2024. Compare features, ratings, user reviews, pricing, and more from Microsoft Endpoint Manager competitors and alternatives in order to make an informed decision for your business.

  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, empowering more than 17,000 IT teams with visibility, security, and control over all endpoints. The NinjaOne platform increases productivity while reducing risk and IT costs. Organizations use NinjaOne, including its wide range of IT and security integrations, for use cases including endpoint management, patch management, mobile device management, software deployment, remote access, endpoint backup, and more.
    Leader badge
    Compare vs. Microsoft Endpoint Manager View Software
    Visit Website
  • 2
    IBM Security MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.
    Compare vs. Microsoft Endpoint Manager View Software
    Visit Website
  • 3
    ManageEngine Endpoint Central
    ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Compare vs. Microsoft Endpoint Manager View Software
    Visit Website
  • 4
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Partner badge
    Compare vs. Microsoft Endpoint Manager View Software
    Visit Website
  • 5
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Partner badge
    Compare vs. Microsoft Endpoint Manager View Software
    Visit Website
  • 6
    Kandji

    Kandji

    Kandji

    We’re Kandji: the Apple device management and security platform that empowers secure and productive global work. Through advanced automation and thoughtful experiences, we’re bringing much-needed harmony to the way admins, end-users, and global teams work today and tomorrow. Kandji brings zero-touch deployment, self-healing remediation, click-and-go security, and powerful automation to boost technology teams' efficiency while improving the employee experience with their work.
    Compare vs. Microsoft Endpoint Manager View Software
    Visit Website
  • 7
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Compare vs. Microsoft Endpoint Manager View Software
    Visit Website
  • 8
    Jamf Pro

    Jamf Pro

    Jamf Pro

    Formerly known as Casper Suite, Jamf Pro is an enterprise mobility management (EMM) tool for Apple macOS and iOS devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily: - Choose a zero-touch, hands-free experience or go hands-on through imaging. Either way, enroll devices and deploy them with ease. - Go beyond configuration profiles and use policies and scripts to customize devices for the optimal user experience. - Purchase apps in bulk and make them available automatically or through a Self Service catalog. - Manage device settings and configurations, restrict malicious software, and patch all of your Apple devices without user interaction. Jamf Pro works seamlessly with your existing IT services and technologies, including: Apple Business Manager, Active Directory, SSO/SAML, SCCM, APIs, Cisco ISE, Security Connector and Fast Lane, Conditional Access for Mac.
  • 9
    Electric

    Electric

    Electric

    Electric is reinventing how businesses manage their IT. Providing real-time IT support to 30,000 users and centralized IT management to over 600 customers, Electric offers companies a 50% reduction in IT spend and standardized security across devices, apps, and networks, whether you're on-site or remote. We have an 100+ person team ready and willing to help with IT support. Once the Electric App is enabled in your Slack workspace or Microsoft Teams tenant, your team will have access to chat with Electric whenever they need help. They'll get a response from a member of our team in 10 minutes or less (our average is 6 minutes). Electric's team of experts is trained to handle a wide range of support needs. From the most basic password reset through device crashes, we've got your team covered.
  • 10
    N-able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting in automation manager—no need to write a line of code • Provide remote support across devices and platforms with the integrated Take Control feature • Integrate your existing PSA software or use N-able MSP Manager to manage tickets and billing • Manage security with integrated backup, EDR, AV, and disk encryption • Available as an on-premises or hosted cloud solution to fit your business
  • 11
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution supporting cross-platform-functionalities. They support all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS and support out-of-the-box enrollment. The management process, streamlining the entire device lifecycle starting from enrollment up until device retirement can be monitored and managed from a unified central console. The automated device enrollment, geofencing, remote access, remote control of device/user grouping functionalities, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 12
    Kolide

    Kolide

    Kolide

    Endpoint solutions for teams that value productivity, transparency, and employee happiness. Engage with employees on Slack providing customized security and compliance recommendations for their Mac, Windows, and Linux devices. Traditional security solutions don't interact with end-users and must rely on strict enforcement and surveillance. We believe that device security starts with the user. With Kolide you can clearly communicate your organization's security guidelines and help users achieve compliance without resorting to rigid management. Get a bird's eye view of your environment, then drill down into the nitty gritty to gain critical insights into your fleet's health and hygiene. A single device in your fleet can produce thousands of unique data points. This data is often intended to be read by programs and systems, not people. Kolide interpets and visualizes the data we collect so you can quickly understand the state of your devices.
  • 13
    Adaptiva OneSite Anywhere
    Adaptiva OneSite Anywhere enables IT admins to exert total visibility and control over all endpoints, regardless of where they are – at home, at work, or at a coffee shop. With most employees working remotely, content delivery – getting patches, updates, and operating systems to endpoints quickly and without creating issues with production traffic, bandwidth degradation, and software delivery success rates – is even more difficult, especially over VPN. OneSite Anywhere helps you securely manage endpoints at unprecedented speed and scale whether they are on premise, connected remotely over VPN, or on the Internet without a VPN connection. OneSite Anywhere combines the world’s most advanced software distribution engine with a new, revolutionary cloud architecture to seamlessly extend the boundaries of the enterprise network to cover the entire internet.
  • 14
    SanerNow

    SanerNow

    SecPod Technologies

    SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
  • 15
    Codeproof

    Codeproof

    Codeproof Technologies

    Codeproof Technologies Inc. is an American software and technology company that offers a suite of cloud mobile device management (MDM) software and integrated security solutions. The company offers software as a service (SaaS) environment. The company’s flagship platform is the Codeproof platform, an MDM solution that offers customers an industry-leading feature set, easy onboarding, and a simple interface. Codeproof also offers DriveSafe, SiteSecure, and Managed Mobile Hotspot, which allows individuals and companies to manage and secure mobile devices. Their offerings are built on a patent granted in July 2015. The company is best known for associating with medium and large organizations and helps them create a centralized environment for endpoint management of their workforce. The company is headquartered in Redmond, Washington.
    Starting Price: $3/device/month
  • 16
    Arctic Wolf

    Arctic Wolf

    Arctic Wolf Networks

    Get better security effectiveness for your organization with the Arctic Wolf® Platform and Concierge Security® Team. Cybersecurity is a field that requires 24x7 vigilance and constant adaptation. Arctic Wolf’s cloud native platform and Concierge Security® Team delivers uniquely effective solutions. Spanning thousands of installations, the Arctic Wolf® Platform processes over 65 billion security events daily. The platform collects and enriches endpoint, network, and cloud telemetry, and then analyzes it with multiple detection engines. Machine learning and custom detection rules then deliver personalized protection for your organization. While other products have limited visibility, the vendor-neutral Arctic Wolf® Platform enables broad visibility and works seamlessly with existing technology stacks, making it easy to adopt while eliminating blind spots and vendor lock-in.
  • 17
    TeamViewer

    TeamViewer

    TeamViewer

    TeamViewer is a popular remote access and support software that enables users to connect to and control computers and devices from anywhere in the world. It is widely used for troubleshooting technical issues, managing IT services, and providing customer support. The software allows for secure file sharing, real-time collaboration, and remote desktop access across different platforms, including Windows, macOS, Linux, iOS, and Android. TeamViewer's security features include end-to-end encryption and two-factor authentication, ensuring safe and reliable remote connections. It is used by individuals, IT professionals, and large organizations to enhance productivity, offer remote support, and manage devices efficiently.
  • 18
    Microsoft System Center Operations Manager (SCOM)
    Operations Manager provides infrastructure monitoring that is flexible and cost-effective, helps ensure the predictable performance and availability of vital applications, and offers comprehensive monitoring for your datacenter and cloud, both private and public.
  • 19
    Quest KACE

    Quest KACE

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
    Starting Price: As low as $3/mo/device
  • 20
    Nexthink

    Nexthink

    Nexthink

    Proactively measure and manage the Digital Employee Experience. With a constant read on the pulse of digital employee experience, IT can continuously improve technology’s ability to engage, empower and delight people at work no matter where they work – any time, all the time. When IT is under pressure to make it all work, your next move matters. Discover all the real-time insight you need to resolve all kinds of disruptions before they happen. The cloud-native platform for managing digital employee experience. Nexthink Experience pinpoints issues and solutions, automates response and helps you continuously improve the employee experience.
  • 21
    Ivanti Endpoint Manager
    From Windows to macOS, from iOS to Android and beyond to IoT—one place to manage all devices—plus user profiles. Do more than keep your business up and running. Consolidate your endpoint and workspace management, satisfy growing user expectations, and simplify your management processes through a single, unified endpoint management suite. Ivanti Endpoint Manager is proven, reliable endpoint and user-profile management software that is core to: 1) discovering everything that touches your network; 2) automating software delivery; 3) reducing headaches with login performance; and 4) integrating actions with multiple IT solutions. Experience UEM today. Discover, inventory, and configure all devices—PCs, laptops, servers, tablets, and smartphones. Also remote control Windows and Mac devices.
  • 22
    Lansweeper

    Lansweeper

    Lansweeper

    Discover your IT with Lansweeper, build your centralized IT Asset System of Record. With the Lansweeper Deepscan IP Scanner engine, you can audit all assets in your company network without installing software on them. Build an accurate network inventory of all your hardware, software and users. Scan Windows, Linux, and Mac devices. Keep track of your licenses, serial numbers and warranties of major brands like Dell, IBM, HP, Toshiba and many more. Detect Unauthorized Local Admins, unify Office 365 and AD User Data, get the netbios domain name, check for Windows updates and more. Discover all assets in your IT environment that you didn’t even knew about & take full control of your network. Download your free trial and start your IT asset management.
  • 23
    SysTrack

    SysTrack

    Lakeside Software

    Lakeside Software is a leader in digital experience monitoring. We develop software that provides the visibility IT teams need to design and support productive digital workplaces. Customers use our technology to perform workplace analytics, IT asset optimization, remote work management, and AIOps. Our product, SysTrack, is a digital experience monitoring solution that gathers and analyzes data on everything that may impact end-user experience and business productivity. For more information, visit www.lakesidesoftware.com.
  • 24
    Tanium

    Tanium

    Tanium

    Empowering the world’s largest organizations to manage and protect their mission-critical networks. Our data model can collect new, ad-hoc data on the fly in seconds, allowing customers, partners and Tanium to quickly develop capabilities on this extensible platform. Our patented architecture collects and distributes data to millions of endpoints in seconds, with zero infrastructure. Enable decision-making where data is generated: the endpoint itself. Our agent consumes minimal endpoint resources and bandwidth while fitting on the firmware of the smallest chips. Expand your capabilities without expanding Tanium’s footprint. We’ve found that the best way for customers to understand what we do is to show our platform in action. Orion Hindawi, Tanium’s co-founder and CEO, will guide you through a hands-on keyboard tour to show what Tanium does and the power of the platform. Track down every IT asset you own instantaneously.
  • 25
    OpenText ZENworks Configuration Management
    If your staff spends more than 10% of its time running around trying to manage desktops and mobile devices, your life is a lot harder – and more expensive – than it should be. ZENworks Configuration Management increases user productivity with an identity-centric approach that focuses on users, devices, and locations to deliver the right resources to the right users. Integrated remote management so IT can control, view, chat, transfer files, and execute applications both inside and outside the corporate network. Discover IP-attached assets and obtain complete hardware and software inventory of endpoint devices. Implement modern device management features across Windows, iOS, and Android. Easily manage a hybrid workforce. No VPN connected needed to support endpoint devices. Leverage Apple DEP, Android Enterprise, and Microsoft Autopilot for devices.
  • 26
    Ivanti Neurons for Patch Management
    Most exploits target known vulnerabilities—those for which a patch has been available for at least a year. You can’t rely on manual processes, or on users themselves, to ensure systems are fully patched. Ivanti DSM integrates Patch Management to identify and patch vulnerabilities across heterogeneous OSes, configurations, and all major third party applications. Your servers, desktops, and laptops are equally protected across your entire organization.
  • 27
    IGEL

    IGEL

    IGEL Technology

    IGEL provides the next-gen edge OS for cloud workspaces. Our solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. Work is now defined by what we do, not where we go. The widely distributed workforce is here to stay, and IGEL OS allows people to thrive in their work from anywhere, while organizations retain full management, control, and security of user endpoints regardless of which endpoint device they use. IGEL OS secures and simplifies digital workspaces in healthcare, finance, retail, higher education, government, and manufacturing organizations around the world. Its 100+ technology integrations lend full support of the latest unified communications tools, VDI platforms, DaaS, and SaaS-based applications from anywhere on any x86-64 device, including thin client, laptop, or tablet.
  • 28
    Adaptiva OneSite Health
    Adaptiva OneSite Health automatically checks the configuration of endpoints, diagnoses any problems, and remediates any issues. And it does this at massive scale – hundreds of thousands of endpoints – without bandwidth throttling or disrupting business processes. Adaptiva OneSite Health is the fastest, most scalable solution to manage endpoint health at scale and includes over 100 pre-built checks and remediations. Our customers use Endpoint Health to ensure endpoints are functioning properly and securely. Over 100 built-in checks can ensure Bitlocker is turned on, or ConfigMgr is working as expected. A major national retailer ran Adaptiva OneSite Health on just over 11,000 live production endpoints. They found a 55% failure rate. Endpoint Health was able to automatically remediate 89% of failed endpoints, with an instant savings of over $1m.
  • 29
    Action1

    Action1

    Action1

    Action1 is the #1 risk-based patch management platform for distributed networks trusted by thousands of global enterprises. Action1 helps to discover, prioritize, and remediate vulnerabilities in a single solution to prevent security breaches and ransomware attacks. It automates patching of third-party software and operating systems, ensuring continuous patch compliance and remediation of security vulnerabilities. The company was founded by cybersecurity veterans Alex Vovk and Mike Walters, who previously founded Netwrix, which was acquired by TA Associates. Action1 functionality: patch management remote access remote management and monitoring software deployment IT asset inventory
    Starting Price: $0 USD/per device/per month
  • 30
    Trio

    Trio

    Trio Technology

    From businesses to educational institutions, Trio breaks down conventional management methods and rebuilds them gapless, automated, and simply secure. As a one-of-a-kind mobile device management solution, Trio is here to not only meet your security and productivity expectations but to exceed them. Trio is a platform that not only manages devices but also takes care of vulnerability management, endpoint detection and response (EDR), compliance monitoring, and provides visibility into endpoints.
  • 31
    Chimpa

    Chimpa

    Chimpa

    It takes just a few minutes to activate Chimpa and its ease of use makes it suitable even for inexperienced users. Chimpa supports iOS, iPadOS, tvOS and Android operating systems. The MDM is generally a distribution of a combination of applications and configurations on the device, company policies and certificates and back-end infrastructure, in order to simplify and improve the IT management of end-user devices. In modern corporate IT environments, the number and variety of managed devices (and user behavior) is the basis of MDM solutions that allow the management of devices and users in a coherent and scalable way. The general role of MDM is to increase the user-friendliness, security and functionality, while maintaining a certain flexibility for the user. Kiosk mode, security functions, blocking, remote initialization. Collection of analytical data on the use of the App and the network.
  • 32
    WinMagic MagicEndpoint
    As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks.
  • 33
    Kaseya 365

    Kaseya 365

    Kaseya 365

    Kaseya 365 provides seamless access to functions in endpoint management, security, and backup. These solutions are joined under one subscription, effortlessly integrated, and live within the unified interface experience of IT Complete. Gain access and control over devices and the network. Ensure devices and data are protected from intrusion or corruption. Preserve critical data from loss, theft, or exploitation. Do it all consistently, accurately, and within the constraints of small teams. Reduce vendor fatigue by putting all critical components in one easy-to-understand, acquire, and manage subscription. Experience massive improvements in technician efficiency by leveraging the power of workflow integrations and automation. Experience significant budget benefits by saving up to 75% when compared to using a mix of separate competing solutions. Your Kaseya 365 subscription offers everything needed to manage, secure, backup, and automate endpoints in your environment.
  • 34
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 35
    Devicie

    Devicie

    Devicie

    Modern device management is more critical than ever. Experience hyperautomated deployment and no-touch management. A best-in-class Intune instance tailored to your customers' needs. Tested, deployed, and ready for organization-wide rollout. Zero-touch execution of updates, policies, and automated remediation. Comprehensive insights into the endpoint health of an organization, making management and compliance reporting a breeze. Get all of your customers into a state of modern management with Devicie. It enables IT teams to deploy, control, and maintain their entire device fleet securely, remotely, and at scale. By automating historically monotonous, manual, and disparate IT and security workflows, Devicie reduces the need for multiple-point solutions, ultimately driving costs and time savings while enabling organizations to streamline and unify end-user device management.
  • 36
    Absolute

    Absolute

    Absolute Software

    Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it.
  • 37
    Prey

    Prey

    Prey

    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd. Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. It's a service that protects over 8 million devices and their data every day, all around the world. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
  • 38
    HCL BigFix

    HCL BigFix

    HCL Software

    HCL BigFix is the AI Digital+ endpoint management platform that leverages AI to improve employee experience and intelligently automate infrastructure management. HCL BigFix offers complete solutions to secure and manage endpoints across nearly 100 different operating systems, ensure continuous compliance with industry benchmarks, and revolutionize vulnerability management with award-winning cybersecurity analytics. HCL BigFix is the single solution to secure any endpoint, in any cloud, across any industry.
  • 39
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 40
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 41
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems – whether Mac, Linux, or Windows – and provides access to cloud and on-prem resources such as Office 365™, G Suite, AWS™ cloud servers, Salesforce™, and Jira® among thousands of others. The same login also connects users to networks and file shares via RADIUS and Samba, respectively, securing your organization’s WiFi and file server access. Leveraging cloud-based directory services, IT organizations can choose the best IT resources for the business enabling users to be as productive as possible.
  • 42
    10ZiG Manager
    Thin Client & Zero Client Endpoint Management Software. The 10ZiG Manager™ is a fully free, easy to use endpoint management software suite provided to customers using endpoints running on a 10ZiG OS in a virtual desktop infrastructure environment - from x86 devices to laptops, tablets or old, outdated Dell or HP endpoints, among others. The 10ZiG Manager provides IT admins the choice of managing endpoints via traditional LAN/ WAN or the Cloud - using either our Desktop Console or our Web Console. Both platforms come with a variety of features that make managing large volumes of endpoints a breeze, regardless of your location.
  • 43
    APPVISORY

    APPVISORY

    mediaTest digital

    APPVISORY is Europe’s leading Mobile Threat Defense Software. In combination with leading mobile device management systems (such as MobileIron, Workspace ONE, Microsoft Intune, Sophos, etc.) or as a stand-alone solution, the SaaS solution ensures the protection of sensitive company data by using mobile devices. You can enforce your individual IT security guidelines and requirements according to the GDPR on your employee devices. APPVISORY‘s App-Client contributes to the users‘ education and awareness and enables mobile business processes. APPVISORY secures smartphones and tablets of several hundred customers worldwide ranging from three to 50,000 devices. DAX30 companies as well as numerous small and medium-sized enterprises in sectors such as banking, automotive, energy, retail and government comprise our satisfied customers. APPVISORY is developed and hosted in Germany.
    Starting Price: 490€ per year
  • 44
    Snow Software

    Snow Software

    Snow Software

    We have brought together software asset management, cloud management and SaaS management so you can fully optimize all of your technology in one platform that seamlessly integrates with your enterprise ecosystem. Clearly see, understand and manage your entire technology landscape, both on-prem and in the cloud. Maximize the value of your technology investments with deep insights into usage, spend and vulnerabilities. Get the perspective and automation you need to anticipate and align with the rapidly evolving needs of your business. Fast implementation and intuitive design means you are saving money in weeks, not months. Break down your data silos to see on-prem, hybrid and cloud technologies together. Get clean and augmented data, updated daily and powered by the world's largest discovery catalog. Recommendations and self-service drive value, save time and increase productivity.
  • 45
    Symantec Endpoint Protection
    Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.
  • 46
    SimpleMDM
    Apple device management that's simple, secure, and pretty damn quick. Effortless account creation and setup — Enroll, configure, and monitor any number of Apple devices in a matter of minutes. Our user-friendly interface makes the onboarding experience a piece of cake for admins and users alike. Rapid device enrollment options — Quickly add iOS and macOS devices with automated enrollment through Apple Business Manager, enrollment by link for BYOD, and more. Flexible app deployment and installation — Automatically deploy apps and installer packages at scale. Utilize App Store, VPP, custom apps, or a self-serve experience for macOS using our hosted Munki integration. Advanced configuration capabilities — Automate your workflows using a variety of premade configuration profiles or upload your own. Fast US-based support — Get help when you need it from a technical support professional who knows the ins and outs of MDM. Our average response time is 30 minutes or less.
    Starting Price: $2.50 per month
  • 47
    Q-Scout

    Q-Scout

    Quokka.io

    Q-Scout prioritizes BYOD and privacy concerns to help IT Teams secure business-related applications on corporate and personal devices while preserving the data privacy of employees. IT administrators can define enterprise data isolation policies and control the managed apps without impacting personal privacy. Allows for fast validation of thousands of devices with minimal use of a personal device’s resources. Creates and performs analysis on a virtual model of employee device without accessing personal data such as photos, contacts, or texts. This solution offers app-based policies that set a basic level of security for devices with Q-Scout installed, ensuring secure access to company data and files. By enabling employees to choose to install business apps on their devices and allowing users to self-remediate any policy violations, Q-Scout fosters a level playing field for the use of personal devices in work-related tasks.
  • 48
    eLux

    eLux

    Unicon

    eLux® is an ultra light-weight, Linux-based, hardware agnostic, highly secure x86 end-point operating system purpose-built to help companies scale, and secure their end-user computing in complex VDI, DaaS environments. About eLux: Scale, Manage and Secure Your End-user Computing. Companies today need a lean, secure OS that powers end-point devices operating in increasingly complex environments, running an ever-growing stack of virtual applications and desktops. IT departments need an easy-to-manage, resource friendly end-point OS that can provide end-users access to their virtual desktops and digital workspaces anytime, anywhere. Large enterprises and businesses of all sizes can make use of our Linux-based OS to deliver a consistent employee experience to their diverse, distributed and mobile workforce that meets business needs and also fulfills newer ways of working.
  • 49
    Ivanti Neurons for MDM
    Effectively manage and secure all endpoints, so you can protect data everywhere work happens. Dealing with increasing demand for devices, applications and platforms? Ivanti Neurons for MDM is your single solution to manage iOS, iPadOS, Android, macOS, ChromeOS and Windows. Quickly and easily onboard devices and provision them over the air with all the apps, settings and security configurations they need. Deliver a delightful, native user experience across any device and OS while improving productivity. Manage and protect any iOS, iPadOS, Android, macOS, ChromeOS, Windows and VR/XR device, from a single cloud-based solution. Know the devices your supply chain workers rely on are updated and in good operating condition, ready for the day’s business.
  • 50
    Sophos Mobile
    Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices. Sophos Mobile lets you secure any combination of personal and corporate-owned devices with minimal effort. When users bring their personal macOS, Windows 10, or mobile devices to work, the flexible self-service portal lets them enroll their device, reset passwords, and get help, with no involvement from IT, making your life easier. Container-only Management gives admins control over corporate content in the Sophos Secure Email and Sophos Secure Workspace apps without requiring management of the mobile device itself. Ensure business data doesn’t go adrift and isn’t threatened by malware.