Alternatives to Prey

Compare Prey alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Prey in 2024. Compare features, ratings, user reviews, pricing, and more from Prey competitors and alternatives in order to make an informed decision for your business.

  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
    Leader badge
    Compare vs. Prey View Software
    Visit Website
  • 2
    IBM Security MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.
    Compare vs. Prey View Software
    Visit Website
  • 3
    ManageEngine Endpoint Central
    ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Compare vs. Prey View Software
    Visit Website
  • 4
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Partner badge
    Compare vs. Prey View Software
    Visit Website
  • 5
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Partner badge
    Compare vs. Prey View Software
    Visit Website
  • 6
    Kandji

    Kandji

    Kandji

    We’re Kandji: the Apple device management and security platform that empowers secure and productive global work. Through advanced automation and thoughtful experiences, we’re bringing much-needed harmony to the way admins, end-users, and global teams work today and tomorrow. Kandji brings zero-touch deployment, self-healing remediation, click-and-go security, and powerful automation to boost technology teams' efficiency while improving the employee experience with their work.
    Compare vs. Prey View Software
    Visit Website
  • 7
    Miradore MDM
    Miradore is a cloud-based Mobile Device Management (MDM) platform that was acquired by GoTo in 2022. Miradore provides a smarter way to securely manage both company-owned and personal Android, iOS, macOS, and Windows devices. GoTo (Miradore) has been recognized as a Leader in the IDC MarketScape: Worldwide Unified Endpoint Management (UEM) Software for SMBs 2024 Vendor Assessment, for its ease of use, flexibility and strong multi-platform support for Android, Mac, iOS, and Windows devices. With Miradore, you can stay up to date with your device fleet, automate device management across multiple operating systems, distribute business-critical apps, and secure your company data. Getting started is simple and always free, and when needed, you can unlock additional features with the Premium or Premium+ plans. You can test all the features risk-free with a 14-day trial of the Premium+ plan. No credit card information is required.
    Leader badge
    Compare vs. Prey View Software
    Visit Website
  • 8
    Syncro

    Syncro

    Syncro

    Syncro is the integrated business platform for running a profitable MSP. Enjoy PSA, RMM and remote access in one affordable package. Integrations to 50+ MSP and business tools you also love and use amp your efficiency even more. Onboarding with Syncro is fast and free. Our bulk agent installer can have you up and running on all your client endpoints in a matter of hours. (Coming from another RMM? Our library of migration and import tools makes for a smooth switch.) Amp your efficiency even more with integrations to 50+ MSP and business tools you also love and use. Syncro pricing is refreshingly simple—one flat fee for all features. Unlimited endpoints, no contracts, no minimums.
    Leader badge
    Partner badge
    Compare vs. Prey View Software
    Visit Website
  • 9
    Esper

    Esper

    Esper

    Esper powers exceptional Android and iOS device experiences by revolutionizing the way companies manage their device fleets. Through advanced capabilities, such as remote control & debugging, Pipelines for software deployment, Esper device SDK and APIs, Blueprints for dynamic configuration, and no-touch Seamless Provisioning, Esper provides a solution beyond standard MDM, into the modern era of DevOps for devices and beyond. Recognized as one of Deloitte’s Fast500 in 2023, Esper supports some of the world’s most innovative brands in retail, hospitality, logistics, healthcare, education, and more. Traditional mobile device management and mobility solutions (like MDMs, MAMs, EMMs, and UEMs) weren’t built for today’s growing, modern hardware fleets. That’s why Esper goes beyond device management with intelligent tooling and infrastructure for company-owned and managed devices, providing a single pane of glass for both Android and iOS devices.
    Starting Price: Free Trial
  • 10
    Jamf Pro
    Formerly known as Casper Suite, Jamf Pro is an enterprise mobility management (EMM) tool for Apple macOS and iOS devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily: - Choose a zero-touch, hands-free experience or go hands-on through imaging. Either way, enroll devices and deploy them with ease. - Go beyond configuration profiles and use policies and scripts to customize devices for the optimal user experience. - Purchase apps in bulk and make them available automatically or through a Self Service catalog. - Manage device settings and configurations, restrict malicious software, and patch all of your Apple devices without user interaction. Jamf Pro works seamlessly with your existing IT services and technologies, including: Apple Business Manager, Active Directory, SSO/SAML, SCCM, APIs, Cisco ISE, Security Connector and Fast Lane, Conditional Access for Mac.
  • 11
    Electric

    Electric

    Electric

    Electric is reinventing how businesses manage their IT. Providing real-time IT support to 30,000 users and centralized IT management to over 600 customers, Electric offers companies a 50% reduction in IT spend and standardized security across devices, apps, and networks, whether you're on-site or remote. We have an 100+ person team ready and willing to help with IT support. Once the Electric App is enabled in your Slack workspace or Microsoft Teams tenant, your team will have access to chat with Electric whenever they need help. They'll get a response from a member of our team in 10 minutes or less (our average is 6 minutes). Electric's team of experts is trained to handle a wide range of support needs. From the most basic password reset through device crashes, we've got your team covered.
  • 12
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution supporting cross-platform-functionalities. They support all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS and support out-of-the-box enrollment. The management process, streamlining the entire device lifecycle starting from enrollment up until device retirement can be monitored and managed from a unified central console. The automated device enrollment, geofencing, remote access, remote control of device/user grouping functionalities, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 13
    SanerNow

    SanerNow

    SecPod Technologies

    SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
    Starting Price: $50/year/device
  • 14
    Codeproof

    Codeproof

    Codeproof Technologies

    Codeproof Technologies Inc. is an American software and technology company that offers a suite of cloud mobile device management (MDM) software and integrated security solutions. The company offers software as a service (SaaS) environment. The company’s flagship platform is the Codeproof platform, an MDM solution that offers customers an industry-leading feature set, easy onboarding, and a simple interface. Codeproof also offers DriveSafe, SiteSecure, and Managed Mobile Hotspot, which allows individuals and companies to manage and secure mobile devices. Their offerings are built on a patent granted in July 2015. The company is best known for associating with medium and large organizations and helps them create a centralized environment for endpoint management of their workforce. The company is headquartered in Redmond, Washington.
    Starting Price: $3/device/month
  • 15
    HiddenApp

    HiddenApp

    HiddenApp

    HiddenApp protects Apple, Chromebook, Windows, and Android devices against loss or theft through a suite of location tracking, device monitoring, and advanced recovery features. > Fleet location tracking Using HiddenApp's global map view, you can keep track of all of your devices, at a glance. You can also track down individual devices with pinpoint accuracy in real-time or historically, as we also store device location history for up to a year. > Monitoring and incident detection Make sure your devices don't leave the premises of your institution without your knowledge. You can safely rely on our geofencing and IP whitelisting features to get incident notifications on your email whenever a device leaves your designated area or connects to an unauthorized network. > Mass notifications Whenever needed, you can quickly send out an urgent or important message to your entire fleet and choose for it to either be displayed on the screen or to be read aloud on the device.
  • 16
    Zip Security

    Zip Security

    Zip Security

    No expertise is needed to run a full security program with Zip. Minimize hassle with single-click workflows for everything from account recovery to deploying CrowdStrike. We provide everything you need to execute instantly. Never worry about missing a compliance standard. Monitor your system’s devices, identities, and 3rd party tools at a bird’s eye view and get each metric to where it needs to be. We integrate the best-in-class security tooling like CrowdStrike, Jamf, and Intune to build the enterprise security stack that scales with you, and it’s all behind a single pane of glass. Set consistent security policies across Windows and macOS devices without juggling platform-specific configuration. Zip is your single partner to procure, deploy, configure, and manage your enterprise security program. We’ll manage all of the software you need to buy to meet the standards of your customers, insurers, and compliance regimes.
  • 17
    Absolute

    Absolute

    Absolute Software

    Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it.
  • 18
    Chimpa

    Chimpa

    Chimpa

    It takes just a few minutes to activate Chimpa and its ease of use makes it suitable even for inexperienced users. Chimpa supports iOS, iPadOS, tvOS and Android operating systems. The MDM is generally a distribution of a combination of applications and configurations on the device, company policies and certificates and back-end infrastructure, in order to simplify and improve the IT management of end-user devices. In modern corporate IT environments, the number and variety of managed devices (and user behavior) is the basis of MDM solutions that allow the management of devices and users in a coherent and scalable way. The general role of MDM is to increase the user-friendliness, security and functionality, while maintaining a certain flexibility for the user. Kiosk mode, security functions, blocking, remote initialization. Collection of analytical data on the use of the App and the network.
  • 19
    Quest KACE

    Quest KACE

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
    Starting Price: As low as $3/mo/device
  • 20
    Emteria

    Emteria

    emteria GmbH

    What if making use of Android’s benefits in your professional solution was as easy as pie? With emteria you can build customer-facing Android™ products at scale, operate them remotely and ensure long-term security. emteria is a tech company from Aachen, Germany. Its core product emteria.OS is a managed version of Android, extended for industrial use cases and professional applications. Besides the operating system itself, emteria provides embedded expertise, device management, and web services to build, scale and operate fleets of Android IoT devices. To enable faster time-to-market, Android-based emteria.OS supports Raspberry Pi and other cost-effective single-board computers (SBC). Also, emteria ensures a seamless transfer from Raspberry Pi onto industry-grade hardware, like i.MX8 based boards. Moreover, support includes custom hardware, e.g. provided by our partner network.
    Starting Price: €80/month
  • 21
    Relution

    Relution

    Relution

    Manage iOS, Android, and Windows 10/11 devices. Secure via restrictions and configurations. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Inventory and manage native and public Apple, Android, and Windows mobile apps. Review, approve, and publish apps for usage on mobile devices. Enable employees, partners, and external stakeholders to access your enterprise apps through your own app store in your corporate identity. Manage your Apple iOS and Android tablets easily and securely and deploy the right apps in your school. Companies, Authorities and Teams of every size benefit from Relution's Mobile Device and App Management. Resellers, Educational Institutions and IT Retailers use Relution to provide the service to their customers. Relution is one of the most relevant IT applications in the digital education space. For over 10 years, Relution has been the mobile device management solution for privacy-compliant and cross-platform device management.
    Starting Price: $2 per month
  • 22
    SecurePIM

    SecurePIM

    Virtual Solution

    Smartphones and tablets are becoming increasingly important for day-to-day work in government agencies and companies. SecurePIM for iOS and Android combines all important functions, such as e-mail, messenger and telephony, calendar, documents and much more, in a single application. The container technology ensures the highest security standards with encrypted data and true end-to-end encryption. Protects the personal data of citizens, customers and employees and avoids the risk of high fines for GDPR violations. Provides a quick start and low training and administration effort for employees and administrators. Saves hardware costs & increases employee satisfaction. Allows the use of private devices for business communication (BYOD). Less operational effort and greater flexibility Cross-platform and device-independent available for iOS and Android.
  • 23
    Quixxi

    Quixxi

    Quixxi Security

    Quixxi is a leading provider of mobile app security solutions that empowers enterprises and security professionals to secure their mobile applications. Quixxi is proud to be the only provider of a patented and proprietary mobile app security solution. Our services includes SCAN, SHIELD, and SUPERVISE. SCAN (SAST/DAST/WebAPI) is a comprehensive application vulnerability assessment tool that automates and integrates with the development process, providing full explanations and recommendations to identify and fix vulnerabilities. SHIELD (RASP), on the other hand, is an application shielding tool that provides baseline security controls to protect the intellectual property in mobile apps and shield them against malicious attacks by third parties with one click. SUPERVISE is a runtime application monitoring tool that enables remote disabling, messaging, security logs, and customer analytics for better app management.
    Starting Price: $29 for One-Off plan
  • 24
    BlackBerry Cyber Suite
    Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working? In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption.
  • 25
    Trio

    Trio

    Trio Technology

    From businesses to educational institutions, Trio breaks down conventional management methods and rebuilds them gapless, automated, and simply secure. As a one-of-a-kind mobile device management solution, Trio is here to not only meet your security and productivity expectations but to exceed them. Trio is a platform that not only manages devices but also takes care of vulnerability management, endpoint detection and response (EDR), compliance monitoring, and provides visibility into endpoints.
    Leader badge
    Starting Price: $6.00/employee
  • 26
    Rippling

    Rippling

    Rippling

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
  • 27
    Blackberry Spark
    Trusted Unified Endpoint Security and Unified Endpoint Management. BlackBerry Spark® offers visibility and protection across all endpoints, including personal laptops and smartphones used for work. It leverages AI, machine learning and automation to provide improved cyber threat prevention. BlackBerry Spark includes a comprehensive Unified Endpoint Security (UES) layer that seamlessly works with BlackBerry Unified Endpoint Management (UEM) to deliver Zero Trust security with Zero Touch experience. But one size rarely fits all, especially with a remote workforce using devices that may or may not be owned by your organization. That's why BlackBerry Spark Suites are available with a range of offerings to meet your needs for UEM and/or UES. BlackBerry Spark offers the broadest set of security capabilities, management tools and visibility covering people, devices, networks, apps, and automation.
  • 28
    Timly

    Timly

    Timly Software

    Whether it’s IT assets, furniture, tools, equipment, or machinery, Timly is fully modular and allows you to manage any type of inventory, whether on desktop or on the go with mobile devices. By automating maintenance processes, Timly optimizes productivity and efficiency, resulting in reduced downtime, improved asset reliability, and enhanced operational effectiveness. Track and optimize the consumption of your consumables such as safety equipment, parts, or office supplies. Timly keeps you informed about incoming and outgoing inventory, as well as low stock levels. With the 360° overview in Timly, you conduct your annual inventory in a time-optimized manner. Innovative features provide a comprehensive view of your company’s assets, including home office inventory. Through advanced IoT live tracking technology, you can effortlessly monitor real-time data such as location, consumption, fill levels, and more.
    Starting Price: €185 per month
  • 29
    Jamf Now
    Jamf Now, formerly Bushel, is an on-demand mobile device management software solution specifically created for the iPhones, iPads, and Macs in the workplace. Fast, accessible, and affordable, this device management platform enables Apple users to set up, manage, and protect their workplace with ease. With Jamf Now, you can easily configure company email account and protect crucial information by keeping personal and company data separate, and automatically install work apps to devices.
    Starting Price: $2.00/month/user
  • 30
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 31
    APPVISORY

    APPVISORY

    mediaTest digital

    APPVISORY is Europe’s leading Mobile Threat Defense Software. In combination with leading mobile device management systems (such as MobileIron, Workspace ONE, Microsoft Intune, Sophos, etc.) or as a stand-alone solution, the SaaS solution ensures the protection of sensitive company data by using mobile devices. You can enforce your individual IT security guidelines and requirements according to the GDPR on your employee devices. APPVISORY‘s App-Client contributes to the users‘ education and awareness and enables mobile business processes. APPVISORY secures smartphones and tablets of several hundred customers worldwide ranging from three to 50,000 devices. DAX30 companies as well as numerous small and medium-sized enterprises in sectors such as banking, automotive, energy, retail and government comprise our satisfied customers. APPVISORY is developed and hosted in Germany.
    Starting Price: 490€ per year
  • 32
    AirDroid Business
    AirDroid Business is a full-fledged Enterprise Mobile Device Management (EMM/MDM) Solution for managing and securing all Android endpoints with powerful remote monitoring and remote control features. Some popular device types are smartphones and tablets, digital signages, POS, restaurant kiosks, IoT, and other OEM Android endpoints. It is a solution that can ensure SMBs and Enterprises enhance their business mobility and device security, along with an excellent support team for the best customer service. AirDroid Business MDM Solution Highlights: *Multiple enrollment options: Zero-Touch Enrollment, AE Enrollment, Enroll with Device Owner, Regular Enrollment *Google Play apps management *Unattended remote access *Batch operations *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS) *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications
    Leader badge
    Starting Price: $12 /device/year
  • 33
    Lightspeed Mobile Device Management
    Lightspeed Mobile Device Management™ equips district IT leaders with a centralized, cloud-based solution for infinitely scalable device, application, and policy controls. Ensure safe and secure management of student learning resources with real-time visibility and reporting essential for effective distance learning. Lightspeed MDM™ makes app management intuitive and flexible with remote configuration and deployment by school, grade, classroom, and student without handling devices. Lessen the workload on the IT team with the Self-Service App Library where teachers and students can access and install approved curriculum and learning tools. Lightspeed Systems® empowers district technology teams with a hierarchical device management platform for tier-based admin permissions and visibility. IT teams can remotely deploy, change, and revoke hundreds of policies without handling any devices, while reducing typical downtime and costs.
  • 34
    NSYS Tools

    NSYS Tools

    NSYS GROUP

    Multi-functional solution for companies operating with pre-owned mobile phones. NSYS Diagnostics. Provides detailed, fast and automated diagnostics of mobile devices with minimal human involvement in the process. NSYS Buyback. Estimates an accurate and fair price for mobile devices, depending on customizable settings and automated functionality diagnostics. NSYS Data Transfer. Provides new technology of data transfer between iOS devices without using additional apps. The detailed progress bar tracks the remaining time and data size. NSYS RMA. Provides a new way of RMA claims process. It’s a unique product with an online mix of RMA requests and chat, with the possibility of discussion by full batch or particular IMEI. NSYS software fully translated into 10 languages. Personal training for you and your staff.
  • 35
    Fluid Mobility

    Fluid Mobility

    Fluid Mobility

    Empower your organization with FLUID’s dynamic Location Intelligence services. Create geospatial data in real-time to better understand the ins and outs of your business. Identify bottlenecks in your business ecology, digitally tag equipment to easily locate and secure against theft, monitor workflow, and much more with Fluid’s Location Intelligence service. Ensure that your organization can track vital equipment in real-time with FLUID's indoor-Realtime Location System. Create a more efficient work environment while securing your organization against loss and theft with wireless tags. Set mobile device permissions within your building(s) to safeguard trade secrets, confidential information, and better manage the movement of assets, and much, much more! Empower your organization with Fluid’s dynamic Location Intelligence services. Create geospatial data in real-time to better understand the ins and outs of your business.
    Starting Price: $5.00/month/user
  • 36
    deeploi

    deeploi

    deeploi

    Managing IT can be nerve-racking. deeploi offers an all-in-one IT solution from onboarding to cybersecurity. State-of-the-art hardware and software security and cybersecurity. Cut your IT spending by up to 50% by switching to deeploi. deeploi covers the most crucial IT processes by connecting important tools and automating painful workflows. Upgrade your security infrastructure, protect endpoints, and fortify your cloud. State-of-the-art technology, managed by deeploi. We help IT owners establish and maintain a best-practice infrastructure. Easy-to-use, highly automated, and integrated platform for IT workflows. Experienced helpdesk assists your employees with any IT issues. Robust protection against threats minimizes cybersecurity risk. deeploi costs less than 50% of an internal IT team. deeploi costs less than 50% of an internal IT team. Our IT-as-a-service solution transforms pain into peace by eliminating all IT-related inefficiencies and insecurities.
  • 37
    Sequretek Percept EDR
    Secure your endpoints with cloud-native Percept EDR - a comprehensive centrally-managed, cross-platform technology with an end-to-end response mechanism to detect and protect against advanced threats. Percept EDR is an intelligent, easy-to-manage, simple-to-deploy product that works efficiently in heterogeneous environments. Percept EDR uses AI-ML and endpoint detection and response (EDR) telemetry analytics for enhanced detection capabilities. It is one of the very few products that features on-agent AI ensuring that devices stay protected even in an offline mode. Percept EDR provides a real-time defense against zero-day threats, advanced persistent threats, ransomware attacks, and any other malicious activities. Beyond advanced threat protection, Percept EDR also integrates components such as device control, application whitelisting, and vulnerability management into a single product with a single dashboard view over your endpoint security.
  • 38
    Next DLP

    Next DLP

    Next DLP

    Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.
  • 39
    CybrHawk SIEM XDR
    CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks. We also pioneered an integrated approach that provides a wide range of cyber security solutions for organizations of varying size and complexity. Our solutions enable organizations to define their cyber defences to prevent security breaches, detect real-time malicious activity, prioritize and respond quickly to security breaches, and predict emerging threats. CybrHawk XDR provides all the critical tools: IDS, intelligence risk, behavior, machine learning & cloud info. The goal is to provide the entire enterprise with full and total control systems.
  • 40
    Panda Adaptive Defense 360
    Unified Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities, with our unique Zero-Trust Application Service and Threat Hunting Service in one single solution, to effectively detect and classify 100% of processes running on all the endpoints within your organization. Cloud-delivered endpoint prevention, detection, containment and response technologies against advanced threat, zero-day malware, ransomware, phishing, in-memory exploits and malware-less attacks. It also provides IDS, firewall, device control, email protection, URL & content filtering capabilities. It automates the prevention, detection, containment and response to any advanced threat, zero day malware, ransomware, phishing, in-memory exploits, and fileless and malwareless attacks, inside and outside the corporate network.
  • 41
    Defense.com

    Defense.com

    Defense.com

    Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.
    Starting Price: $30 per node per month
  • 42
    Microsoft Endpoint Manager
    Transformative management and security that meets you where you are and helps you move to the cloud. The secure, integrated management solution. Deploy a seamless, end-to-end management solution that combines the functionality, data, and new intelligent actions of Microsoft Intune and Microsoft System Center Configuration Manager. Get native integration with cloud-powered security controls from Microsoft including risk-based conditional access for apps and data. Use analytics to help understand and remediate issues impacting users. Improve productivity and collaboration with the familiar experience users expect. Give IT flexibility to support diverse scenarios for both bring your own device (BYOD) and corporate owned devices. Accelerate time to value with fast rollout of services and devices with end-to-end integration across our stack. Minimize disruption to IT, users, and processes while maximizing your investment and security.
  • 43
    IGEL

    IGEL

    IGEL Technology

    IGEL provides the next-gen edge OS for cloud workspaces. Our solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. Work is now defined by what we do, not where we go. The widely distributed workforce is here to stay, and IGEL OS allows people to thrive in their work from anywhere, while organizations retain full management, control, and security of user endpoints regardless of which endpoint device they use. IGEL OS secures and simplifies digital workspaces in healthcare, finance, retail, higher education, government, and manufacturing organizations around the world. Its 100+ technology integrations lend full support of the latest unified communications tools, VDI platforms, DaaS, and SaaS-based applications from anywhere on any x86-64 device, including thin client, laptop, or tablet.
  • 44
    HCL BigFix

    HCL BigFix

    HCL Software

    HCL BigFix is the AI Digital+ endpoint management platform that leverages AI to improve employee experience and intelligently automate infrastructure management. HCL BigFix offers complete solutions to secure and manage endpoints across nearly 100 different operating systems, ensure continuous compliance with industry benchmarks, and revolutionize vulnerability management with award-winning cybersecurity analytics. HCL BigFix is the single solution to secure any endpoint, in any cloud, across any industry.
  • 45
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 46
    Modiverse
    Modiverse is a mobile device management platform which provides a web based managemant portal and a mobile application. You can securely manage your devices by defining user-profile based rules, configurations and definitions. Modiverse is a cloud based enterprise-grade mobile device management platform. It provides services for full customization of a mobile device based on the enterprise needs. Our platform turns an Android device into a mobile device dedicated to business needs instead of personal devices. which enables verticalization based on business needs and use cases. Our platform turns Android devices into a piece of hardware to serve by any varieties and aid the owner the way they need. Essential and Basic packages run functionalities through the Modiverse application installed on the mobile device. You can control any Android or iOS mobile devices. Advanced package offers deep security functionalities from hardware to the application with our software agent .
    Starting Price: $1.5 per month
  • 47
    Ordr Platform
    Automatically identify, classify, and locate all network-connected devices and systems. Within a few hours of deployment—via network tap or SPAN—we passively discover high-fidelity information about every connected device including make, location, serial number, and application/port usage. This visibility is provided in real time for any new connected device and can be integrated with asset inventory solutions. Understand vulnerabilities, recalls, weak passwords or certificates associated with every device. Ordr also provides deep insight into device utilization so teams can ensure data-driven moves, adds, and changes as teams scale their capacity. These device insights are also critical to determine the longevity of certain devices, and allows teams to schedule maintenance tickets and support procurement decisions. We automatically group fleet devices, and monitor usage for tracking and comparison purposes. We also integrate with identity systems like Active Directory.
  • 48
    Ivanti Neurons for MDM
    Effectively manage and secure all endpoints, so you can protect data everywhere work happens. Dealing with increasing demand for devices, applications and platforms? Ivanti Neurons for MDM is your single solution to manage iOS, iPadOS, Android, macOS, ChromeOS and Windows. Quickly and easily onboard devices and provision them over the air with all the apps, settings and security configurations they need. Deliver a delightful, native user experience across any device and OS while improving productivity. Manage and protect any iOS, iPadOS, Android, macOS, ChromeOS, Windows and VR/XR device, from a single cloud-based solution. Know the devices your supply chain workers rely on are updated and in good operating condition, ready for the day’s business.
  • 49
    Citrix Endpoint Management
    Let employees work how, when, and where they want with the power to manage all apps, devices, and platforms in one central location. Bring all applications and endpoints together in a single, unified view to deliver the digital workspace your users need to be productive. Protect every endpoint with a unified endpoint management solution. Manage all terminals from the same console. Equip all endpoints with a secure digital workspace. Simplify application and device management with a comprehensive, unified endpoint management solution. It provides device and application management for most devices and platforms and integrates seamlessly with the Citrix product portfolio.
    Starting Price: $4 per user per month
  • 50
    Mosyle

    Mosyle

    Mosyle

    An Enhanced MDM, an Endpoint Security, an Internet Privacy & Security, an Identity Management, an Application Management... NO LONGER five separate solutions. Mosyle is the only solution that fully integrates five different applications on a single Apple-only platform, allowing businesses and schools to easily and automatically deploy, manage and protect all Apple devices