Alternatives to PolicyPak

Compare PolicyPak alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to PolicyPak in 2024. Compare features, ratings, user reviews, pricing, and more from PolicyPak competitors and alternatives in order to make an informed decision for your business.

  • 1
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Partner badge
    Compare vs. PolicyPak View Software
    Visit Website
  • 2
    Securden Endpoint Privilege Manager
    Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control. •Eliminate local admin rights on Windows endpoints •Manage applications that require administrative privileges •Define who can access what applications & automate application control through whitelisting & blacklisting •Policy-based access, even for offline endpoints & remote employees •On-demand privilege elevation on online & offline endpoints •Grant temporary full administrator privileged for standard users when required •Track application usage & privilege elevation trends •Continuously monitor local admin accounts & detect if new local admin accounts are created •Ensure compliance with regulations with comprehensive audit trails •Highly scalable and enterprise ready
    Compare vs. PolicyPak View Software
    Visit Website
  • 3
    Esper

    Esper

    Esper

    Esper powers exceptional Android and iOS device experiences by revolutionizing the way companies manage their device fleets. Through advanced capabilities, such as remote control & debugging, Pipelines for software deployment, Esper device SDK and APIs, Blueprints for dynamic configuration, and no-touch Seamless Provisioning, Esper provides a solution beyond standard MDM, into the modern era of DevOps for devices and beyond. Recognized as one of Deloitte’s Fast500 in 2023, Esper supports some of the world’s most innovative brands in retail, hospitality, logistics, healthcare, education, and more. Traditional mobile device management and mobility solutions (like MDMs, MAMs, EMMs, and UEMs) weren’t built for today’s growing, modern hardware fleets. That’s why Esper goes beyond device management with intelligent tooling and infrastructure for company-owned and managed devices, providing a single pane of glass for both Android and iOS devices.
    Starting Price: Free Trial
  • 4
    Jamf Pro

    Jamf Pro

    Jamf Pro

    Formerly known as Casper Suite, Jamf Pro is an enterprise mobility management (EMM) tool for Apple macOS and iOS devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily: - Choose a zero-touch, hands-free experience or go hands-on through imaging. Either way, enroll devices and deploy them with ease. - Go beyond configuration profiles and use policies and scripts to customize devices for the optimal user experience. - Purchase apps in bulk and make them available automatically or through a Self Service catalog. - Manage device settings and configurations, restrict malicious software, and patch all of your Apple devices without user interaction. Jamf Pro works seamlessly with your existing IT services and technologies, including: Apple Business Manager, Active Directory, SSO/SAML, SCCM, APIs, Cisco ISE, Security Connector and Fast Lane, Conditional Access for Mac.
  • 5
    ThreatLocker

    ThreatLocker

    ThreatLocker

    For IT Professionals to stop ransomware and other cyberattacks, you need to do more than just hunt for threats. ThreatLocker helps you reduce your surface areas of attack with Zero Trust policy-driven endpoint security solutions. Now you can change the paradigm from only blocking known threats, to blocking everything that you have not explicitly allowed. ThreatLocker Application Allowlisting is the gold standard when it comes to blocking ransomware, viruses, and other software-based threats. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 6
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution supporting cross-platform-functionalities. They support all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS and support out-of-the-box enrollment. The management process, streamlining the entire device lifecycle starting from enrollment up until device retirement can be monitored and managed from a unified central console. The automated device enrollment, geofencing, remote access, remote control of device/user grouping functionalities, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 7
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 8
    Heimdal Application Control
    Heimdal Application Control is a novel approach to integrative application management and user rights curation. Modular and easy to set up, App Control empowers the system administrator to create all-encompassing rule-based frameworks, streamline auto-dismissal or auto-approval flows, and enforce individual rights per Active Directory group. The tool’s uniqueness comes from its ability to perfectly pair with a (PAM) Privileged Access Management solution, imparting the user with granular oversight of software inventories and hardware assets.
  • 9
    Check Point Application Control
    Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups, to identify, block or limit the usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications, and more. Granular control of social networks, applications, and application features, identify, allow, block, or limit the usage. Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware. Integrated into Next Generation Firewalls enables consolidation of security controls decreasing costs. Only the right users and devices can access your protected assets.
  • 10
    BlackBerry Enterprise BRIDGE
    BlackBerry® Enterprise BRIDGE provides a highly secure option for seamlessly using native Microsoft mobile apps on iOS and Android. Using Microsoft Office mobile apps just got a lot simpler and more secure. Regulated and security-conscious organizations can now enable their users with the full native app experience for Microsoft PowerPoint, Word, and Excel from BlackBerry Dynamics apps such as BlackBerry Work. With the rapid adoption of Office 365 by business and consumer users, some employees may use personal Office 365 accounts to work with corporate files. With the collaboration between BlackBerry and Microsoft, users no longer need to use this workaround. The secure bridge ensures that data encryption and document fidelity are preserved in the document-sharing process and that common data leakage policies are applied. BlackBerry Enterprise BRIDGE allows users to view, create, edit, and annotate Office files on their mobile device of choice inside a secure managed app environment.
  • 11
    VMware Carbon Black App Control
    Lock down critical systems and servers to prevent unwanted changes and ensure continuous compliance with regulatory mandates. Harden new and legacy systems against unwanted change, simplify the compliance process, and provide protection for corporate systems. VMware Carbon Black® App Control™ is one of the most proven and scalable application control solutions on the market. Consolidate multiple endpoint security capabilities, and operate faster and more effectively with a single, cloud native platform. Stop malware, ransomware, zero-day and non-malware attacks. Prevent unauthorized change with file-integrity monitoring, device control and memory protection. Monitor critical activity to assess risk and maintain system integrity. Secure EOL systems with powerful change-control and application control policies. Out-of-the-box templates keep management overhead low.
  • 12
    SP Policy Management

    SP Policy Management

    SP Marketplace

    SP Policy Management streamlines the entire policy and procedure life cycle from development through electronic acknowledgment by employees or contractors. Built on SharePoint, Microsoft Teams, and the Power Platform, SP Policy Management is an easy-to-use out-of-the-box solution that provides a consistent way to drive compliance with policies from HR, IT, Security, Safety, and more. Upon Approval, publish policies to the Policies Portal for access by employees with applied governance by the group. Provide a central point for employees to search, browse and see the latest policies. Also, view their acknowledgments. Manage and track policy expiration, renewal, and retention. Reminder notifications to policy owners. Policy calendar for upcoming renewals. Request via email employee groups to acknowledge that they have read and understood policies. Schedule and Track Policy Acknowledgement by Group.
    Starting Price: $15 per user per year
  • 13
    AirDroid Business

    AirDroid Business

    Sand Studio

    AirDroid Business is a full-fledged Enterprise Mobile Device Management (EMM/MDM) Solution for managing and securing all Android endpoints with powerful remote monitoring and remote control features. Some popular device types are smartphones and tablets, digital signages, POS, restaurant kiosks, IoT, and other OEM Android endpoints. It is a solution that can ensure SMBs and Enterprises enhance their business mobility and device security, along with an excellent support team for the best customer service. AirDroid Business MDM Solution Highlights: *Multiple enrollment options: Zero-Touch Enrollment, AE Enrollment, Enroll with Device Owner, Regular Enrollment *Google Play apps management *Unattended remote access *Batch operations *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS) *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications
    Leader badge
    Starting Price: $12 /device/year
  • 14
    ManageEngine Application Control Plus
    Application Control Plus is an enterprise solution that leverages application control and privilege management features to fortify endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses. Ensure complete endpoint security by creating whitelists of applications that you trust, and keep all untrusted applications out of your network. Protect your risky legacy OS machines by deploying application control policies that prevent vulnerable applications without a patch from running. Augment the security of customer-facing systems such as point-of-sale or fixed-function machines by simulating an environment under lockdown using policies run in Strict Mode.
  • 15
    DriveLock

    DriveLock

    DriveLock

    Protecting your IT systems, endpoints and business data should be just as natural you close your front door to protect your home. DriveLock made it easier than you think. We use the latest technology and share our expertise with you. With it, you don't have to worry about your data throughout its lifecycle and across your endpoints. DriveLock Zero Trust Platform: Instead of gradually closing gaps in a conventional environment with individual and independent security silos, the Zero Trust model prevents all access. DriveLock's centralized policies allow access to only the data and applications that are necessary for individual employees and endpoints - true to the maxim "never trust, always verify".
  • 16
    Airlock Digital

    Airlock Digital

    Airlock Digital

    Stop targeted attacks with Airlock Allowlisting and Execution Control. Airlock has been purpose-built to perform application allowlisting at scale, making allowlisting simple in complex and changing enterprise environments. Creating, deploying, and managing application allowlists with Airlock is fast, enabling organizations to become secure and compliant, sooner. Airlock supports execution control of all binary files (executables / dll’s) including scripts (PowerShell, VBScript, MSI, JavaScript, Batch Files & HTML executables) Airlock partners with ReversingLabs to help determine which files are safe to add to the allowlist. This service will also automatically identify any malicious and suspicious files inside your environment. Airlock does not compromise on security through efficiency. Airlock enforces allowlisting in compliance with all requirements in multiple security standards. Airlock delivers an easy-to-use, secure, and effective execution control solution for businesses.
  • 17
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 18
    SureMDM

    SureMDM

    42Gears Mobility Systems

    Secure, Monitor, and Manage company or employee-owned devices. Avoid security risks and solve maintenance challenges during all phases of device lifecycle. SureMDM by 42Gears is an intuitive and powerful MDM solution and MDM app for Android, iOS/iPadOS, Windows, Linux, macOS, Wear OS, VR, and IoT platforms. You can secure, monitor, and manage company-owned devices for dedicated-use as well as employee-owned devices used to access company data (BYOD). SureMDM incorporates all aspects of enterprise mobility through unified endpoint management, including Mobile Application Management, Mobile Device Management, and Mobile Content Management. SureMDM licenses also include access to SureLock for kiosk lockdown, SureFox for a secure lockdown browser, and SureVideo for a secure digital signage solution.
    Starting Price: $3.49 per month
  • 19
    Ivanti Application Control
    Application Control combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via helpdesk systems lighten the load for IT staff while providing users a streamlined experience. With Application Control you can manage user privileges and policy automatically, at a granular level, and allow for optional self-elevation when exceptions occur. Give your users access to what they need quickly, with seamless app access that relies on granular, context-aware policies. Create flexible, preventive policies to help ensure only known and trusted applications can execute on a system. Enable automated requests for emergency privilege elevation or application access via integrated IT helpdesk system​.
  • 20
    Trellix Application Control
    Advanced persistent threats (APTs) to control points, servers, and fixed devices via remote attack or social engineering make it increasingly difficult to protect your business. Trellix Application Control helps you outsmart cybercriminals and keeps your business secure and productive. Ensure that only trusted applications run on devices, servers, and desktops. As users demand more flexibility to use applications in their social and cloud-enabled business world, Trellix Application Control gives organizations options to maximize their whitelisting strategy for threat prevention. For unknown applications, Trellix Application Control provides IT with multiple ways to enable users to install new applications: User Notifications and user self-approvals. Prevents zero-day and APT attacks by blocking the execution of unauthorized applications. Use inventory search and pre-defined reports to quickly find and fix vulnerabilities, compliance, and security issues in your environment.
  • 21
    AhnLab TrusGuard
    The NGFW TrusGuard has been acknowledged by a through market assessment for its technology, performance and stability. The firewall, IPS, application control, VPN, C&C, Anti-Virus/Anti-Spam and DLP protect the business environment. TrusGuard has full lineup from the low-end to data center level models. Scales up to protect high-performance networks. Capable of handling growing network traffic, thanks to optimization for high-performance multicore environments. Ensures network stability. Protects network resources (such as, websites, database servers, applications servers, and client machines) from unknown network attacks with the 3-step defense. Covers IPv6 network environments. Complete support for IPv6 networks. Reduces total cost of operation (TCO). Offers cost cuts compared to integrating multiple security products Relieves operational and labor costs associated with managing multiple security solutions. Increases productivity and network efficiency.
  • 22
    PolicyStat

    PolicyStat

    PolicyStat

    Healthcare staffing and operational environments are becoming more and more complex and the challenge of these along with low policy adoption rates by staff and poor communication are making it more difficult to adhere to regulatory compliance, yet the need to set policies and effectively communicate them to all employees across the entire environment is critical for patient safety. Remaining compliant (with safe patient care, a priority) is becoming harder due to increased regulations and requirements. Our powerful policy compliance software automatically keeps track of expiration dates and notifies managers of expiring policies. Our policy compliance software lets you easily tag and group policies or procedures related to a particular audit, so you can find all policies related to Joint Commission or HIPAA in a single search.
  • 23
    StealthINTERCEPT
    Audit and block any ad changes, authentications, or requests. Monitor and prevent unwanted and unauthorized activities in real-time for Active Directory security and compliance. For years, organizations have struggled to obtain contextual, actionable intelligence from their critical Microsoft infrastructure to address security, compliance, and operational requirements. Even after filling SIEM and other log aggregation technologies with every event possible, critical details get lost in the noise or are missing altogether. As attackers continue to leverage more sophisticated methods to elude detection, the need for a better way to detect and control changes and activities that violate policy is vital to security and compliance. Without any reliance on native logging, StealthINTERCEPT is able to detect and optionally prevent any change, authentication, or request against Active Directory in real-time and with surgical accuracy.
  • 24
    Security Auditor

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.
  • 25
    Nirmata

    Nirmata

    Nirmata

    Deploy production-ready Kubernetes clusters in days. Rapidly onboard users and applications. Conquer Kubernetes complexity with an intuitive and powerful DevOps solution. Eliminate friction between teams, enhance alignment, and boost productivity. With Nirmata’s Kubernetes Policy Manager, you’ll have the right security, compliance and Kubernetes governance to scale efficiently. Manage all your Kubernetes clusters, policies, and applications in one place while streamling operations with the DevSecOps Platform. Nirmata’s DevSecOps platform integrates with cloud providers (EKS, AKS, GKE, OKE, etc.) and infrastructure-based solutions (VMware, Nutanix, bare metal) and solves Kubernetes operations challenges for enterprise DevOps teams with powerful Kubernetes management and governance capabilities.
    Starting Price: $50 per node per month
  • 26
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 27
    Digital.ai App Management
    Enterprise mobile app management (MAM) enables IT to balance the unique needs of IT and remote users. Connect with our MAM mobile BYOD security experts listen to an in-depth discussion on the mobile security landscape and view a product demonstration. Receive guidance on enterprise app store capabilities and the values of internal app-store testing. Easily manage and update any app, complete security management of sensitive app data down to the physical mobile device using MAM in tandem with existing MDM solutions. Distribute policy-enabled apps through existing app stores, and support the secure distribution and management of any app using MAM centralized policy management and App Store or Google Play. Developers can improve overall app quality, improve ‘time-to-market’ metrics, and continuously innovate on features by gathering user data and feedback. Securely manage and distribute apps to external employees or trusted internal employees.
  • 28
    OpenText ZENworks Mobile Workspace
    OpenText™ ZENworks Mobile Workspace is a secure mobile access management solution. It balances mobile security and usability so you can take advantage of BYOD cost benefits and users can remain productive with access to what they need, anywhere. Secure, containerized accounts for mobile. Enable your workforce to conveniently access corporate accounts in a secure container on their mobile device. Keep corporate data safe and mobile users happy. Centrally manage mobile device corporate workspaces. Keystore and encryption remove potential vulnerabilities to secure data without controlling the entire device. Provide offsite access to company intranet resources and web apps without exposing them directly to the internet. Keep corporate data safe in secure containers. Control shared data with policy-enforced threat detection. Remote workspace wipes to prevent data theft on lost devices. Isolate and encrypt important data.
  • 29
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 30
    ProMDM

    ProMDM

    ProMDM

    ProMDM is a mobile device management solution that provides end-to-end control of all mobile devices across the IT infrastructure, using standard MDM specifications for iOS, Android and Windows devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Dynamic Group management based on AD/LDAP groups, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automation for administrative tasks with Health check service Role base administration SSO with Client Certificate Authentication for Exchange, Sharepoint, Web sites iOS SSO with Kerberos for Safari and native apps (integration with ADFS or websites directly) MAM - Mobile App Management Samsung KNOX support Document management – Managed media support Photo sync for Android GPS location and tracking Android for Work support (ProMDM is certified Google Partner)
  • 31
    NovaEMM

    NovaEMM

    Tabnova

    NovaEMM offers a powerful mobile device management solution that provides comprehensive control over devices used for work, including BYOD and COPE devices. Our EMM solution allows businesses to manage their devices from a centralized console, eliminating potential threats and vulnerabilities, and optimizing device performance. NovaEMM provides comprehensive, turnkey analytics rooted in data, network, and location utilization. These insights enable organizations to collect and leverage actionable data on the elements influencing their mobile device productivity. A single view offers a consolidated overview of your entire installation, showcasing each device, and making it the paramount solution. NovaEMM provides a streamlined solution for creating and managing a variety of kiosk/lockdown profiles on a single platform. With our platform, passwords and other essential configurations can be easily set.
    Starting Price: $1 per device
  • 32
    Cubed Mobile

    Cubed Mobile

    Cubed Mobile

    End-to-end mobile security is made simple. Get the protection you need for your growing business in two simple steps. Cubed Mobile frees your employees from the need for a second device and/or second SIM while creating a secured separation between personal and business workspaces. Keep sensitive data safe and isolated in a secure environment. Ensure employees only connect to secure Wi-Fi networks. Empower your team to access the Internet securely. Protect against network, apps, privilege abuse, and advanced attacks. Strengthen security, smooth communication coordination, and ease management of BYOD with a new approach that anyone can set it up in two minutes! Create workspaces with different settings, apps, and access-rights based on user parameters. Let your admins invite and remove users, edit personal details, settings, and virtual lines, and filter lists of associated devices. Anytime you can remotely backup, restore, and wipe entire workspaces immediately.
    Starting Price: Free
  • 33
    Appaloosa

    Appaloosa

    Appaloosa

    For personal devices used at work, we split work and personal spaces to provide a secure and engaging experience. For corporate devices, we simplify configuration for network, apps and security. Whether you need to distribute a single app to a few beta-testers or deploy to thousands of employees, Appaloosa scales with you. We offer different enterprise mobility management packages of features to precisely suit your needs. Everything you need to ship your private apps in a matter of minutes. Quickly deploy and manage apps without the hassle of large MDM solutions. Configure, update & remove apps silently. Our most complete solution, best suited for large organizations. Deploy apps, enroll and manage devices. Trusted by the most demanding production environments. Start your free trial today. We were down for only 12 minutes last year.
    Starting Price: $1.49 per month
  • 34
    Applivery

    Applivery

    Applivery

    Applivery is the most powerful Unified Endpoint Management (UEM) platform that provides full control over App Distribution and Device Management for Android, Windows, and Apple. Its easy-to-use, cloud-based Mobile Device Management (MDM) solution enables efficient remote management with top-notch security. It seamlessly integrates into organizations of all sizes, requiring only a few minutes to set up.
    Starting Price: €2/device
  • 35
    Trend Micro Mobile Security
    Stay safe, no matter where you go or what you do. Enjoy advanced security and privacy. Live your mobile life more safely with powerful protection for all your mobile devices. Improve performance. Take advantage of optimization features to make your mobile devices work better. Avoid online scams and fraud. Flag malicious phishing emails and scam websites. Trust in experience. Enjoy peace of mind thanks to mobile solutions built on nearly 30 years of security expertise. Stop threats, rely on the cloud-based Smart Protection Network™ and mobile app reputation technology to stop threats before they can reach you. Surf anywhere and prevent mobile apps from loading dangerous and risky websites when you browse. Protects you against malicious apps, ransomware, dangerous websites, unsafe Wi-Fi networks, unwanted access to your device, and more. Optimize your mobile phone to keep it running at peak performance.
    Starting Price: Free
  • 36
    Perscale

    Perscale

    Perscale

    All of your apps, files and data are accessible via Perscale. Touch up that picture on Photoshop on your iphone, Chromebook, or desktop–all you need is wifi. Your hardware will never again be obsolete. Your files, documents, pictures and videos stay in the cloud. Perscale offers online storage so your files are always up to date. Perscale offers free storage, file sync and sharing that is fully integrated with all of your applications. We’re integrated with Dropbox so you can save your files straight from your app to your preferred online storage provider. Say goodbye to viruses. Because your apps are in the cloud, viruses, Trojans, and other malware cannot get to them. Perscale secures your files with 256-bit AES encryption and two-step verification. Even if your device is damaged, lost, or stolen, all of your apps and files are always ready to go, wherever you are. Access your applications where ever you go with Perscale.
    Starting Price: $6 per month
  • 37
    Applicaster

    Applicaster

    Applicaster

    The only no/low-code platform for creating, launching & managing streaming apps across multiple devices & technology stacks. App independence; developers optional. Use simple, built-in tools to craft and change custom experiences, connect your preferred integrations & launch directly to the app stores. Scale & expand your streaming business with budget predictability & full control over timelines & resources. Support the growing needs of your business in the most operationally efficient way. Continuously experiment, personalize & optimize your app experience to drive that perfect user experience & desired business outcomes. Non-developers build & compile apps, and manage releases. Hundreds of available integrations power client apps. Use our APIs to extend your capabilities. Features available OOTB, you configure your backend. For measurement, data source & UI across platforms. Continuously collect user data, rollout changes quickly.
  • 38
    PolicyPro

    PolicyPro

    First Reference

    PolicyPro® is the complete online policy management service and it is Canada’s best source for current model policies, procedures and forms for HR, finance, IT, accessibility, non-profits and more. PolicyPro® gives you the tools you need to create and update policies and includes a platform for distributing policies to staff and tracking that they have read and understood them. PolicyPro® is the only policy management solution that does it all, from Policy to Sign-Off™, in one secure centralized cloud application hosted in Canada. In the current work environment, organizations may face rising claims related to fraud, wrongful dismissal, harassment, privacy breach, etc. The first question lawyers, courts and tribunals will ask is, “Where are your policies and can you demonstrate they have been read and understood by your employees?”
  • 39
    Kyverno

    Kyverno

    Kyverno

    Kyverno is a policy engine designed for Kubernetes. With Kyverno, policies are managed as Kubernetes resources and no new language is required to write policies. This allows using familiar tools such as kubectl, Git, and Kustomize to manage policies. Kyverno policies can validate, mutate, and generate Kubernetes resources plus ensure OCI image supply chain security. The Kyverno CLI can be used to test policies and validate resources as part of a CI/CD pipeline. Kyverno allows cluster administrators to manage environment specific configurations independently of workload configurations and enforce configuration best practices for their clusters. Kyverno can be used to scan existing workloads for best practices, or can be used to enforce best practices by blocking or mutating API requests. Block non-conformant resources using admission controls, or report policy violations.
  • 40
    Google Cloud Policy Intelligence
    Reduce risk with automated policy controls: Security teams in cloud are faced with an overwhelming amount of information to process in order to keep their environments secure. Keeping up with everything manually is a difficult, never-ending task where failure can have high consequences. Google Cloud Policy Intelligence helps enterprises understand and manage their policies to reduce their risk. By providing more visibility and automation, customers can increase security without increasing their workload.
  • 41
    TotalCompliance

    TotalCompliance

    ComplianceBridge

    TotalCompliance® is the most cost-effective compliance software spanning policy and procedure management, and efficient risk, audit and assessment management. At ComplianceBridge, our mission is to make Policy and Procedure Management and Risk Management easier. That’s why we built TotalCompliance, the world’s most powerful cloud-based compliance solution that makes it all a breeze. Discover why hundreds of organizations choose TotalCompliance by taking a look at a few of our features: Users always have instant access to the most current version of policies and procedures. Document editors, reviewers and stakeholders collaborate using powerful workflows on one central version. Send new policies & procedures to exactly who needs them. Define by individual, groups and distribution lists. Notify users when tasks or documents are assigned. Keep records of who has read, tested on and signed off documents. Set automated reminders.
    Starting Price: $749 per user per year
  • 42
    Procedure Rock

    Procedure Rock

    Gerald Fanning Consulting

    ProcedureRock is a smart, cloud-based Operations and Procedures Management Software that systemizes your business operations. It makes it easy for you to document and manage your procedures, processes, manuals, guidelines and much much more. Launched in Apr 2013, ProcedureRock is a cloud-based online tool designed to help organizations and companies improve their policy and procedural management. Built by a strong team of smart engineers and lead by a group of experienced executives, we adopt your passion and diligence to provide you with this great tool that solves any of your problems present in procedural management. A secure, cloud-based platform to manage policies and procedures throughout the entire lifecycle. Save time and reduce paper costs by developing, reviewing, approving, distributing, and tracking employee acknowledgement with our user-friendly solution.
    Starting Price: $59 per month
  • 43
    Delinea Privilege Manager
    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. You can prevent malware from exploiting applications by removing local administrative rights from endpoints and implementing policy-based application controls. Privilege Manager prevents malware attacks without causing any end user friction that slows productivity. Available both on-premises and in the cloud, enterprises and fast-growing teams can manage hundreds of thousands of machines through Privilege Manager. With built-in application control, real-time threat intelligence, and actionable reporting, it is easier than ever to manage endpoints and demonstrate compliance with least privilege policies to executives and auditors.
  • 44
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems – whether Mac, Linux, or Windows – and provides access to cloud and on-prem resources such as Office 365™, G Suite, AWS™ cloud servers, Salesforce™, and Jira® among thousands of others. The same login also connects users to networks and file shares via RADIUS and Samba, respectively, securing your organization’s WiFi and file server access. Leveraging cloud-based directory services, IT organizations can choose the best IT resources for the business enabling users to be as productive as possible.
  • 45
    PC Matic

    PC Matic

    PC Matic

    PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.
    Starting Price: $50 per year
  • 46
    baramundi Management Suite

    baramundi Management Suite

    baramundi Software USA

    Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.
    Starting Price: $5000.00/one-time
  • 47
    WatchGuard Application Control

    WatchGuard Application Control

    WatchGuard Technologies

    Allow, block, or restrict access to applications based on a user’s department, job function, and time of day. It’s never been easier to decide who, what, when, where, why and how applications are used on your network. WatchGuard Application Control is part of the WatchGuard Basic Security Suite. The Basic Security Suite includes all the traditional network security services typical to a UTM appliance: Intrusion Prevention Service, Gateway AntiVirus, URL filtering, application control, spam blocking and reputation lookup. It also includes our centralized management and network visibility capabilities, as well as our standard 24x7 support.
  • 48
    BeyondTrust Endpoint Privilege Management
    Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance.
  • 49
    myComplianceManager

    myComplianceManager

    myComplianceManager

    Our Audit Management system is much more than a great tool to optimize your audit life-cycle because we've combined it with our Enterprise Risk Management, Issue Management and IT Systems Inventory applications. It not only enhances the way you perform audits, but it also allows the Audit Committee and senior management to evaluate how your audit results impact the organization's risk profile, and to determine what post-audit actions need to be prioritized. We've also included our Issue Management system, so that process owners have a convenient tool to track and act upon issues or enhancement opportunities identified in your audits. Our Enterprise Risk Management (ERM) system provides a centralized location to assess, monitor and update your company's risk profile at an enterprise, regional and process level. Automated surveys are periodically completed by risk owners to score risks and identify changes in your risk environment.
  • 50
    myPolicies

    myPolicies

    Info-Tech Research Group

    Policy management is complex, but it does not have to be. Restore order to your policies with our policy management software, simplifying the creation, approval, distribution, and monitoring of your corporate policies. Policy acknowledgment has never been easier with the effortless document distribution and tracking of myPolicies. Find and revise your policies quickly and efficiently by using an easy-to-navigate policy management platform. Protect against unforeseen risks by quickly and confidently reporting on policy activity that matters to you, your stakeholders, and your auditors. Never again will your policies become out of date or scattered across your organization. From policy creation through to retirement, myPolicies drives the document lifecycle, establishes individual accountability, and archives every step. myPolicies helps organizations stay compliant by restoring order to their policies.