Alternatives to OpenText ZENworks Configuration Management

Compare OpenText ZENworks Configuration Management alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to OpenText ZENworks Configuration Management in 2026. Compare features, ratings, user reviews, pricing, and more from OpenText ZENworks Configuration Management competitors and alternatives in order to make an informed decision for your business.

  • 1
    Guardz

    Guardz

    Guardz

    Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native framework designed for operational efficiency. Our identity-centric approach connects the dots across vectors, reducing the gaps that siloed tools leave behind so MSPs can see, understand, and act on user risk in real time. Backed by an elite research and threat hunting team, Guardz strengthens detection across environments, turning signals into actionable insights. With 24/7 AI + human-led MDR, Guardz utilizes agentic AI to triage at machine speed while expert analysts validate, mitigate, and guide response, giving MSPs scalable protection without adding headcount. Our mission is simple: give MSPs the scale, confidence, and clarity they need to stay ahead of attackers and deliver protection to every SMB they serve.
    Partner badge
    Compare vs. OpenText ZENworks Configuration Management View Software
    Visit Website
  • 2
    JDisc Discovery
    JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices. One of the standout features of JDisc Discovery is its agentless discovery process, meaning it does not require the installation of any software on individual devices, reducing deployment time and minimizing network impact. It supports a wide range of protocols (e.g., SNMP, SSH, WMI) to gather data, making it compatible with diverse IT environments, whether they are Windows, Linux, or Unix-based.
    Compare vs. OpenText ZENworks Configuration Management View Software
    Visit Website
  • 3
    Unimus

    Unimus

    NetCore j.s.a. (Unimus)

    Unimus is a powerful, on-premise Network Automation and Configuration Management (NCM) solution designed for fast deployment and ease of use. As one of the most versatile NCM solutions available, it simplifies network management with features such as: 🔹 Disaster Recovery – Automated configuration backups ensure business continuity. 🔹 Change Management – Detect, review, and audit configuration changes with real-time notifications. 🔹 Configuration Auditing – Instantly search and validate configurations & run-time state across your entire network. 🔹 Network Automation – Push large-scale configuration changes or perform firmware upgrades in minutes. 🔹 Integrated Device CLI – Access device terminals directly within Unimus. Supporting 400+ device types across 150+ vendors, Unimus is a complete network-agnostic NCM solution that eliminates manual errors, enhances security, and accelerates network operations—without requiring programming expertise.
    Leader badge
    Compare vs. OpenText ZENworks Configuration Management View Software
    Visit Website
  • 4
    AdRem NetCrunch

    AdRem NetCrunch

    AdRem Software

    NetCrunch is a powerful, scalable, all-in-one network monitoring system built for modern IT environments. It supports agentless monitoring of thousands of devices, covering SNMP, servers, virtualization (VMware, Hyper-V), cloud (AWS, Azure, GCP), traffic flows (NetFlow, sFlow), logs, and custom data via REST or scripts. With 670+ monitoring packs and dynamic views, it automates discovery, configuration, alerting, and automates self-healing actions for efficient remote remediation in response to alerts. Its node-based licensing eliminates sensor sprawl and complexity, providing a clear, cost-effective path to scale. Real-time dashboards, policy-driven setup, advanced alert tuning and 40+ alert actions including remote script execution, service restart, process kill or device reboot-make NetCrunch ideal for organizations replacing legacy tools like PRTG, SolarWinds, or WhatsUp Gold. Fast to deploy and future-proof. Can be installed on prem, self hosted in the cloud, or mixed.
    Leader badge
    Partner badge
    Compare vs. OpenText ZENworks Configuration Management View Software
    Visit Website
  • 5
    DriveLock

    DriveLock

    DriveLock

    Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized policies, DriveLock ensures employees and endpoints access only what they need—following the golden rule of cybersecurity: ''never trust, always verify''.
    Compare vs. OpenText ZENworks Configuration Management View Software
    Visit Website
  • 6
    IBM MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.
  • 7
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features such as automated device enrollment, geofencing, Remote Monitoring and Management, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 8
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 9
    OpenText ZENworks Suite
    OpenText ZENworks Suite is a unified endpoint management platform designed to simplify the way organizations manage devices, applications, security policies, and software updates. It centralizes control of thousands of endpoints, ensuring consistent deployment, compliance, and visibility across the organization. With automated patching, encryption, and policy-driven security, ZENworks strengthens protection while reducing IT workload. The suite helps IT teams eliminate tool sprawl by consolidating asset management, endpoint security, software delivery, and device configuration into one solution. Hybrid work support makes it easy to manage devices remotely and securely without complicated infrastructure. Ultimately, ZENworks improves operational efficiency, lowers IT costs, and enhances organizational productivity.
  • 10
    OpenText Universal Discovery
    Configuration management for hybrid IT. OpenText™ Universal Discovery and Universal CMDB discovers, maps, and manages your IT configurations and can be deployed on-premises or via SaaS. Increase your IT visibility and reduce your IT service disruptions with robust discovery, service dependency mapping, and proactive impact analysis. Get a complete IT asset and configuration inventory across on-premises, multi-cloud, virtualized, and containerized hardware, software, and endpoints. Knowing how your infrastructure delivers business critical applications and services is a must for effective change and configuration management. Change is constant in IT, but before you or a service agent makes one, you should see how it’s going to affect your service delivery.
  • 11
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility.
  • 12
    SolarWinds Kiwi CatTools
    Powerful network automation and configuration management software. Affordable network configuration management for small business networks. Schedule automatic backup activities and roll out configuration changes to multiple devices at the same time. Pre-schedule changes to your network device configurations to occur only on the devices you choose, and only when you want them to. Get alerted on changes to your network equipment so you can head off any malicious activities. Quickly rollback configuration changes when needed to avoid issues before their impact is felt. Schedule automated backups of network device configuration from routers, switches, firewalls, etc. Managing one-off config changes isn’t easy, not to mention the impact a minor issue can have on your entire network. Simultaneously perform or schedule configuration changes across multiple network devices with great ease. Changes to config files, outside of your knowledge, could be a sign of something insidious.
  • 13
    Microsoft Configuration Manager
    ​Microsoft Configuration Manager is a comprehensive systems management solution that enhances IT productivity by automating tasks such as the secure deployment of applications, software updates, and operating systems across servers, desktops, and laptops. It offers real-time device management, cloud-powered analytics for both on-premises and internet-based devices and compliance settings management. It integrates seamlessly with Microsoft technologies including Intune for co-managing diverse mobile device platforms, Azure for hosting cloud services, and Windows Server Update Services (WSUS) for software update management. Additionally, it utilizes Active Directory Domain Services and Microsoft Entra ID for security and configuration, as well as SQL Server for database management, integrating with SQL Server Reporting Services (SSRS) for comprehensive reporting.
  • 14
    Google Endpoint Management
    Keep things simple—and moving. Endpoint management for Android, iOS, Windows, Chrome OS, MacOS, and Linux is easy to set up and use. Lost phone? Stolen tablet? These things happen. Keep your company's data secure with endpoint management. You can require screen locks and strong passwords and erase confidential data with device wipe or selective account wipe for Android and iOS, as well as block access to specific Windows, Chrome OS, Linux, and MacOS sessions. Simplify endpoint management in your organization with G Suite. Enforce passcodes and wipe specific accounts without installing software on a user's Android and iOS device with agentless endpoint management. This feature is on by default. Manage and secure Windows 10 devices through the Admin console. Distribute business applications from the Admin console on Google Play (agentless) or Apple’s App Store. Host internal-only Android apps in the Play Private Channel.
  • 15
    Cruz RMM

    Cruz RMM

    Dorado Software

    Single Pane-of-glass to automate your customers' IT operations. Cruz Remote Monitoring and Management (RMM) is designed for Managed IT Service Providers (MSPs) to proactively and remotely monitor and manage the IT infrastructure, networks, client endpoints, and computers, from anywhere! Whether you are an MSP looking for ways to enhance your business, or a reseller/VAR breaking into the MSP business, Dorado can help you monitor and manage your environment securely and remotely from a single console. All of this is included in an affordable, easy-to-use, and scalable solution. Dorado Software is a leading provider of resource management, performance monitoring, and service orchestration software to automate cloud operations across converged infrastructure fabrics. Dorado helps operators and IT professionals monitor, configure, and manage converged infrastructures (physical and virtual storage, servers, networking devices), virtualized network functions, and cloud services.
  • 16
    KACE by Quest

    KACE by Quest

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
  • 17
    GLPI

    GLPI

    TECLIB

    GLPI is an incredible Service Management software based on open source technologies. It helps you plan and manage IT changes in an easy way, solve problems efficiently, automate your business processes and gain control over your IT infrastructure. Key features of GLPI: 1. Service Desk 2. Asset management and automatic inventory 3. Rationality for data quality control 4. Administrative and financial management of assets 5. Software inventory and licences management 6. Knowledge and frequently asked questions 7. Statistics and reports 8. Profound integration 9. Android-based devices inventory
  • 18
    Right Click Tools

    Right Click Tools

    Recast Software

    In every environment, there are potential vulnerabilities. Finding and addressing all of them is near impossible without the right tools. Right Click Tools helps to reduce overall enterprise risk, ensuring compliance of encryption, privileged access, software updates, and more. Plus, save hundreds of hours per year by automating tedious and error-prone tasks. Empower your team to surface critical intel, reveal vulnerabilities, quickly remediate issues, ensure compliance, enhance security, and maintain clear visibility across all devices. Some aspects of system management infrastructure can keep you up at night. Make sure what you intend to manage actually gets done. Reaching and maintaining your system management goals is easier and more reliable than ever with Right Click Tools.
  • 19
    Open-AudIT

    Open-AudIT

    FirstWave

    ​Open-AudIT is a powerful network discovery and inventory software that intelligently scans an organization’s network and stores the configurations of the discovered devices. This provides immediate access to software licensing, configuration changes, non-authorized devices, capacity utilization, and hardware warranty status reports. Open-AudIT can collect significant amounts of data from large and varying networks that are cataloged and can easily be configured into meaningful reports. It enables users to easily create network discovery profiles for their organization and then run a discovery with a single click or even on an automated schedule. It audits the organization’s network daily without impacting the user experience and intelligently stores the configuration of every discovered component. Open-AudIT tracks and reports on IT asset configuration changes, software licensing, shadow IT, and hardware warranty status.
  • 20
    UVexplorer

    UVexplorer

    UV Networks

    UVexplorer PRO automatically and quickly discovers all of the information about the devices on your network and the connections between them. UVexplorer creates network maps for documentation, meetings, presentations, sharing with your boss, or hanging on the wall. Export UVexplorer's automated network maps to PRTG, LucidChart, Microsoft Visio™, PDF, and SVG file types. UVexplorer also backups and provides change notifications for configurations of your network devices, such as routers, switches, and firewalls. Track how device configurations change over time. With UVexplorer's PRTG Connector, add powerful network discovery, detailed device inventory, and automatic network maps to PRTG Network Monitor. Capture detailed device and network inventory information to help meet documentation requirements of governmental regulations like PCI, HIPAA, FISMA, SOX, etc. Analyze and solve network and device problems with UVexplorer's suite of diagnostic tools.
  • 21
    Syxense Manage
    Syxsense Manage lets users see and manage all endpoints inside and outside the network with coverage for all major operating systems and endpoints, including IoT devices. Syxsense provides users with a complete view of their IT infrastructure with an intuitive interface, and all-inclusive features. The service is designed to provide full endpoint intelligence with OS, hardware, and software inventory details. Know if patches are missing or security standards are compromised. Critical devices are color coded in the datagrid, dashboards, and reports. Use sites, queries, and groups to target and view devices in logical subsets. Scan and prioritize security and patching priorities relative to exposed risk. Find out which patches have been released, their severity, and if vulnerabilities are being exploited. Automated Maintenance and Blackout Windows protect business productivity while deploying updates.
  • 22
    Microsoft Defender for Business
    Microsoft Defender for Business is an AI-powered device security solution designed for small and medium-sized businesses with up to 300 users. It goes beyond traditional antivirus by providing enterprise-grade endpoint protection across Windows, macOS, iOS, and Android devices. The platform helps organizations identify vulnerabilities, protect devices, detect threats, and rapidly respond to cyberattacks. AI-driven endpoint detection and response automatically disrupt ransomware and other in-progress attacks in real time. Defender for Business includes vulnerability management to prioritize and remediate security weaknesses. Its simplified onboarding and management experience makes it easy to deploy without complex security expertise. Overall, Microsoft Defender for Business delivers cost-effective, scalable security tailored to modern hybrid work environments.
  • 23
    OpenText ZENworks Endpoint Security Management
    OpenText ZENworks Endpoint Security Management provides fine-grained, policybased control over all your Windows desktop and mobile PCs—including the ability to automatically change security configurations depending on a user’s role and location. By creating and managing policies from a central console, ZENworks makes it possible to implement and enforce tightly controlled, highly adaptive security policies without placing any configuration or enforcement burden on end users. ZENworks Endpoint Security Management also features robust client selfdefense capabilities that provide assurance that security policies are not circumvented; in addition, it has a complete suite of monitoring, alert, reporting, and auditing tools. Bring comprehensive, centralized security to your most vulnerable IT assets—the mobile PCs at the edges of your organization.
  • 24
    EMMI Soti

    EMMI Soti

    Million Tech Development

    EMMI Soti is an Enterprise Mobility Management Infrastructure (EMMI) that delivers management and security for these new mobile devices, sensors and endpoints, as well as their applications and back-end systems. It takes mobility to endless possibilities, and frees your workforce to transform your business. EMMI Soti is a Mobile Device Management (MDM) solution that secures and manages Apple® iOS, Google Android™, and Microsoft Windows® devices, throughout their entire lifecycle, from deployment to retirement. It controls all aspects of business mobility, tracking physical assets, managing applications and content, as well as keeping devices and data safe and secure. EMMI Soti is the proven solution for managing rugged, special-purpose devices used in key industries, such as: healthcare, transportation, logistics, retail and field services. It removes the complexity from managing a multi-OS, multi-vendor and multi-purpose business mobility program.
  • 25
    BeyondTrust Pathfinder
    BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring.
  • 26
    Ivanti Endpoint Manager
    From Windows to macOS, from iOS to Android and beyond to IoT—one place to manage all devices—plus user profiles. Do more than keep your business up and running. Consolidate your endpoint and workspace management, satisfy growing user expectations, and simplify your management processes through a single, unified endpoint management suite. Ivanti Endpoint Manager is proven, reliable endpoint and user-profile management software that is core to: 1) discovering everything that touches your network; 2) automating software delivery; 3) reducing headaches with login performance; and 4) integrating actions with multiple IT solutions. Experience UEM today. Discover, inventory, and configure all devices—PCs, laptops, servers, tablets, and smartphones. Also remote control Windows and Mac devices.
  • 27
    Ensure Endpoint

    Ensure Endpoint

    Ensure Endpoint Technologies Inc.

    Ensure Endpoint is a cloud-native endpoint validation and device security tool that enforces Zero Trust by checking the security posture of devices before they connect to enterprise applications and SaaS platforms without requiring mobile device management (MDM) enrollment or admin rights. Using its patented Device Trust Passport technology, Ensure verifies critical security hygiene such as encryption, antivirus status, firewall, operating system updates, passphrase settings, and the absence of risky software, and it provides real-time guidance to help users fix compliance issues without helpdesk intervention. It is vendor-agnostic and works across Windows, macOS, iOS, and Android devices, integrates with FIDO and multi-factor authentication workflows, and can scale across multiple tenants with a single agent deployment. Ensure Endpoint helps bridge the gap for unmanaged, contractor, and BYOD devices that traditional endpoint management tools can’t secure.
  • 28
    SUSE Manager
    SUSE Manager was designed to help your enterprise DevOps and IT Operations teams reduce complexity and regain control of your IT assets with a single tool to manage Linux systems across a variety of hardware architectures, hypervisors as well as container, IoT and cloud platforms. It automates Linux server and IoT device provisioning, patching and configuration for faster, consistent and repeatable server deployment helping to optimize operations and reduce costs. And with automated monitoring, tracking, auditing and reporting of your systems, VMs, and containers across your development, test and production environments, you can ensure compliance with internal security policies and external regulations.
  • 29
    Applivery

    Applivery

    Applivery

    Applivery is a modern, cloud-based Unified Endpoint Management UEM / MDM platform that provides comprehensive control over Android, Apple, and Windows devices. It offers seamless integration with identity providers, enabling single sign-on (SSO) for enhanced security. The platform supports zero-touch deployment, allowing for efficient device provisioning without manual intervention. Applivery’s advanced analytics deliver insights into device performance and user experience, facilitating proactive management. Its user-friendly interface ensures quick setup and smooth integration across organizations of all sizes, aligning with the latest industry standards. Additionally, Applivery provides features designed to help organizations achieve and maintain compliance with security certifications and standards, such as ISO 27001, SOC2, CIS and more. 
  • 30
    RANCID

    RANCID

    Shrubbery

    RANCID monitors a router's (or more generally a device's) configuration, including software and hardware (cards, serial numbers, etc) and uses CVS (Concurrent Version System), Subversion or Git to maintain history of changes. RANCID also includes looking glass software. It is based on Ed Kern's looking glass which was once used for http://nitrous.digex.net/, for the old-school folks who remember it. Our version has added functions, supports cisco, juniper, and foundry and uses the login scripts that come with rancid; so it can use telnet or ssh to connect to your devices(s). Rancid currently supports Allied Telesis switches running AW+, Cisco routers, Juniper routers, Catalyst switches, Foundry switches (now Brocade), Redback NASs, ADC EZT3 muxes, MRTd (and thus likely IRRd), Alteon switches, and HP Procurve switches and a host of others.
  • 31
    OpenText ZENworks Full Disk Encryption
    OpenText ZENworks Full Disk Encryption enables you to centrally enforce policies for encrypting entire hard disks on Windows 7, Windows 8, and Windows 10 machines in your organization. You manage them using the same web-based console and adaptive agent that you use for other ZENworks products. Protect your company data with the proven reliability of encrypting the entire hard disk drive. Ensure that encrypted devices remain easy to manage across the enterprise. You can remotely unlock devices that are protected by full disk encryption and keep users productive while they work remotely. Ensure that you meet critical industry guidelines and government regulations for protecting customer and patient data. Leverage your experience with ZENworks to reduce the cost of implementing Full Disk Encryption.
  • 32
    Cruz Wireless Controller
    Cruz Wireless Controller lets IT departments view, monitor, and configure multi-vendor wireless IT infrastructures. It provides end-to-end visibility and control over the wireless devices on your network. With Cruz Wireless Controller, automate discovery, performance monitoring, configuration backup and restore, firmware management, scheduling, traffic flow analysis, configuration audit capabilities, scripting, reporting, and more, all from a single-pane-of-glass and an affordable price. --Performance statistics, real-time health monitoring, firmware/SW management, backup, restore, deploy, one-to-one or groups, enforce device security policies, push and monitor configurations to wireless controllers, APs, and network switches. --Trigger network health alerts, automate repetitive tasks, simplify live/remote troubleshooting, ensure service availability, and multi-vendor features. --IT departments can simplify deployment and management with a single tool to manage their operations
  • 33
    Hillstone Security Management Platform
    Hillstone’s Security Manager enhances network security by allowing businesses to segment their networks into multiple virtual domains. Domains can be based on geography, business unit or security function. It provides the versatility needed to manage Hillstone’s infrastructure while simplifying configuration, accelerating deployment cycles, and reducing management overhead. Most companies face security challenges when their business spans offices located in several regions or countries. Multiple security gateways, multiple sites requiring different security policies and multiple administrators can quickly create a complex security environment. Organizations need the tools to manage global security policies while allowing regional administrators to manage devices and users in their geographic location or business division. Hillstone’s Security Manager allows the primary administrator to segment security management into multiple virtual domains.
  • 34
    CruzNow

    CruzNow

    Dorado Software

    CruzNow is a SaaS-based, single-pane-of-glass infrastructure management solution for IT teams to configure, monitor, troubleshoot, and manage your multi-vendor/technology infrastructure including routers, switches, servers, operating systems, software stacks, any physical or virtual device! By moving your infrastructure management to a SaaS solution, you can reduce overhead, save time and money, and free IT staff to focus on more strategic initiatives.
    Starting Price: Contact Dorado for pricing.
  • 35
    Relution

    Relution

    Relution

    Manage iOS, Android, and Windows 10/11 devices. Secure via restrictions and configurations. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Inventory and manage native and public Apple, Android, and Windows mobile apps. Review, approve, and publish apps for usage on mobile devices. Enable employees, partners, and external stakeholders to access your enterprise apps through your own app store in your corporate identity. Manage your Apple iOS and Android tablets easily and securely and deploy the right apps in your school. Companies, Authorities and Teams of every size benefit from Relution's Mobile Device and App Management. Resellers, Educational Institutions and IT Retailers use Relution to provide the service to their customers. Relution is one of the most relevant IT applications in the digital education space. For over 10 years, Relution has been the mobile device management solution for privacy-compliant and cross-platform device management.
  • 36
    OpenText Connected Vehicle Platform
    The evolution of technology has created unprecedented change in the Automotive industry. Consumer transportation preferences have shifted towards electrification, global connectivity, diverse mobility and autonomous driving. As connected vehicles become platforms for customer experience, the digital driving experience will heavily influence consumer loyalty and brand preference. Controlling the in-vehicle user experience is paramount. Consumers expect a connected vehicle experience similar to that of their connected experience at home, work and via their smartphone device. Vehicles without the right kind of connectivity to accommodate mobile lifestyles will quickly fall off the consumer’s consideration list. OpenText™ Connected Vehicle Platform is a cloud-based environment that offers an identity-centric approach to improving the vehicle ownership experience. Secure IoT data across the connected supply chain.
  • 37
    Semperis

    Semperis

    Semperis

    In today’s cloud-first, mobile-first world, dependency on Active Directory is rapidly growing—and so is the attack surface. Expose blind spots. Paralyze attackers. Minimize downtime. Identity-driven cyber resilience for the hybrid enterprise. With the ever-expanding ecosystem of mobile workers, cloud services, and devices, identity is the only remaining control plane for keeping the bad guys out. And identity-centric security relies on the integrity of Active Directory to be effective. Semperis protects the heart of your identity infrastructure so you can go forth boldly into the digital future. For 90% of enterprises, Active Directory is the primary source of trust for identity and access. But it’s also the cyber kill chain’s weakest link – exploited in virtually every modern attack. And since Active Directory extends to the cloud, any tampering of it will cause a ripple effect across the entire identity infrastructure.
  • 38
    OTbase

    OTbase

    Langner

    OTbase is a productivity and collaboration tool for your journey towards secure and resilient OT networks. It enables users in cyber security and engineering roles to stay on top of hyper-complex OT networks with hundreds of thousands of devices. OTbase not just inventories your OT systems automatically, it also acts as a plattform to streamline, plan, and document your digital transformation journey. OTbase provides full transparency on all aspects of your OT networks, from minute configuration details to high level KPIs in a CISO dashboard. OTbase enables cyber security experts, control engineers, maintenance experts, plant planners, process engineers, and SOC analysts to get the information they need in an instant.
  • 39
    Microsoft Defender for Endpoint
    Gain the upper hand against sophisticated threats like ransomware and nation-state attacks. Put time back in the hands of defenders to prioritize risks and elevate your security posture. Advance beyond endpoint silos and mature your security based on a foundation for XDR and Zero Trust. Microsoft Defender for Endpoint delivers industry-leading endpoint security for Windows, macOS, Linux, Android, iOS, and network devices and helps to rapidly stop attacks, scale your security resources, and evolve your defenses. It’s delivered at cloud scale, with built-in AI that reasons over the industry’s broadest threat intelligence. Our comprehensive solution enables discovery of all endpoints and even network devices, such as routers, in your environment. It offers vulnerability management, endpoint protection, endpoint detection and response (EDR), mobile threat defense, and managed hunting all in a single, unified platform.
  • 40
    Scalefusion

    Scalefusion

    ProMobi Technologies

    Scalefusion is an all-in-one platform designed for comprehensive endpoint, user, and access management. With its Unified Endpoint Management (UEM), Zero Trust Access (ZTA), and endpoint security solutions, Scalefusion helps businesses manage their devices and users while ensuring robust security. The platform provides seamless device deployment, real-time compliance checks, and remote support across all major operating systems, including Windows, macOS, Android, iOS, Linux, and ChromeOS. Scalefusion enables organizations to streamline operations, minimize security risks, and enhance productivity with AI-powered automation and customizable workflows, making it a go-to solution for modern enterprises.
  • 41
    Sophos Mobile
    Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices. Sophos Mobile lets you secure any combination of personal and corporate-owned devices with minimal effort. When users bring their personal macOS, Windows 10, or mobile devices to work, the flexible self-service portal lets them enroll their device, reset passwords, and get help, with no involvement from IT, making your life easier. Container-only Management gives admins control over corporate content in the Sophos Secure Email and Sophos Secure Workspace apps without requiring management of the mobile device itself. Ensure business data doesn’t go adrift and isn’t threatened by malware.
  • 42
    Mosyle

    Mosyle

    Mosyle

    An Enhanced MDM, an Endpoint Security, an Internet Privacy & Security, an Identity Management, an Application Management... NO LONGER five separate solutions. Mosyle is the only solution that fully integrates five different applications on a single Apple-only platform, allowing businesses and schools to easily and automatically deploy, manage and protect all Apple devices
  • 43
    CA Panvalet

    CA Panvalet

    Broadcom

    It can reduce the complexity and overhead associated with maintaining business applications by offering a single repository that provides visibility to and control of your programming environment. CA Panvalet establishes, maintains and protects a control library of source programs, JCL and card-image data files. It provides immediate access for maintenance and processing and effective control and protection against theft, disaster or other loss. CA Panvalet can increase staff efficiency, enable reliable and powerful change management and improve machine performance by providing a central library on a direct access storage device (DASD) and automating resource-intensive manual processes. Streamlines application development by providing immediate access to application components. Protects against inadvertant loss of source code and other program assets. Reduces complexity and overhead of developing applications.
  • 44
    Accops HyID

    Accops HyID

    Accops Systems

    Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 45
    ZENworks Asset Management
    ZENworks Asset Management combines sophisticated workstation inventory, network and device discovery, software management, license tracking, software usage, and contract management into a comprehensive asset management solution with a single, unified administration and management console. Micro Focus® ZENworks® Asset Management combines sophisticated workstation inventory, network and device discovery, software management, license tracking, software usage and contract management into a comprehensive asset management solution with a single, unified administration and management console. Improve license compliance and eliminate audit concerns by providing a complete, accurate view of software installations, accurate software usage data and sophisticated license reconciliation capabilities. Lower IT costs by gaining a comprehensive view of every IT asset in your organization and eliminating the risks of over- and under-purchasing.
  • 46
    Avast Small Office Protection
    Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all their business devices. Run your business online safely and with confidence. Our solution will keep hackers away so you can focus on growing your operations. Effortless, layered next-gen endpoint protection that is easy to install and requires no management or configuration. No experience or IT staff required! Advanced endpoint security for employees in the office or on the go. Covers up to 10 devices, including PCs, Mac computers, iPads, iPhone, and Android mobile devices. 24/5 fast and friendly support from our highly trained technical engineers, who can assist you via email, chat, or phone. We’re here for you. Small Office Protection works effortlessly with your business’ existing hardware and devices. It’s a cost-effective solution that boosts productivity while delivering robust next-gen endpoint security.
  • 47
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 48
    TeamCity

    TeamCity

    JetBrains

    Powerful Continuous Integration out of the box. Define up to 100 build configurations (jobs) and run unlimited builds. Run up to 3 builds concurrently. Add extra agents when necessary. Utilize the full potential of all the TeamCity features. This product includes features identical to those available to our largest customers. Receive peer support through the forum, alternatively file a bug or feature request, and vote for them in our public issue tracker. Unlimited users, unlimited build time. No strings attached. Build, check and run automated tests on the server even before committing your changes – keeping your code base clean at all times. Don’t wait for a build to finish to discover that something is wrong. Form your project tree to inherit parent settings and permissions. Create templates with common settings and inherit any number of build configurations from them.
  • 49
    PowerPlug Pro

    PowerPlug Pro

    PowerPlug Ltd

    PowerPlug Pro is a PC Power Management system and a (patented) PC Wake Up solution for medium to large organization. The product allows IT department to define multiple power policies for different group of PCs that specify the exact conditions in which PCs will enter power saving mode - without interrupting End-Users work. Our patented Wake Up solution allows IT technician to perform all PC maintenance jobs outside of normal business hours and increase the success rate of software distributions and patch distributions. A special Wake Up Portal also allows End Users to securely wake up and connect to their work PC remotely, helping organizations that allow employees working from home to continue their work un-interrupted and still save energy and money when PCs are not in use.
  • 50
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.