Endpoint management software products help users keep track of devices in a system and ensure their software is secure and up to date. Typical features of endpoint management products are asset management, patch management, and compliance evaluation. Companies use these tools to make sure no unapproved devices are linked to the system. They also use these products to ensure each endpoint device has up-to-date software that has been patched properly to prevent intrusion. These tools have many overlapping features with vulnerability management and mobile device management (MDM) products. Endpoint management solutions simply have a wider scope of capabilities than vulnerability management tools including device governance and device compliance. While endpoint management software helps secure all sorts of endpoints, MDM tools typically only manage remote workers and mobile devices.
To qualify for inclusion in the Endpoint Management category, a product must:
Endpoint Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
ESET’s Endpoint Security solutions leverage a multilayered approach that utilizes multiple technologies working in a dynamic equilibrium, which has the ability to constantly balance performance, detection and false positives. ESET Security Management Center can be installed on Windows, Linux or via Virtual Appliance. After install, all management is done via a web-console, allowing easy access and management from any device or operating system. All ESET Endpoint products despite the OS can be
Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. Identify and remediate vulnerable or compromised hosts across your attack surface.
LogMeIn Central is a pure, cloud-based endpoint management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk.
IBM® BigFix® addresses a major challenge faced by many organizations — how to gain full visibility into the constantly changing endpoint landscape while bridging the gap between threat detection and remediation. See clearly: Discover and audit endpoints on or off the corporate network. Detect evasive attacks with behavioral analytics. Understand completely: Guided investigations to define the scope of detected attacks. Define what remediation action you need to take. Act precisely: Immediatel
Symantec Endpoint Protection (SEP) is designed to protect against malware attacks including targeted attacks, advanced persistent threats, and zero-day threats with a layered approach to security at the endpoint. Superior protection that fuses essential and next-gen technologies in a multi-layered fashion. High-performance, lightweight single client, single management console across both physical and virtual protection and orchestrated response delivered at scale
Absolute empowers more than 12,000 customers worldwide to protect devices, data, applications and users against theft or attack—both on and off the corporate network. With the industry’s only tamper-proof endpoint visibility and control solution, Absolute allows IT to enforce asset management, security hygiene, and data compliance for today’s remote digital workforces. Patented Absolute Persistence™ is embedded in the firmware of Dell, HP, Lenovo, and 26 other manufacturers’ devices for vendor-a
inSync provides a comprehensive IT solution for protecting and governing enterprise data being managed by today’s mobile workforce, thereby enabling IT with visibility and control over mobile data without compromising end-user productivity. Designed from the ground up as a unified on-prem or cloud solution, inSync offers rich features like seamless, enterprise-grade backup for endpoints and cloud applications, secure file-sharing, data loss prevention (DLP), and data governance capabilities. In
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise orchestration across siloed IT and Security organizations, simplifying security management and making response effective. Malwarebytes makes endpoints resilient
Symantec Endpoint Management allows you to proactively manage patches and software updates by automating the collection, analysis, and delivery of patches across your enterprise. The solution can significantly help you decrease the costs involved in testing and delivering patches to protect your environment.
Ivanti Management Suite increases user and IT productivity. It helps you establish intelligent, integrated control over your user’s multi-platform desktops and mobile devices. Empower administrators to automate software and operating systems deployments, quickly fix user issues, and discover software assets. Management Suite provides foundational data and actions that integrate with multiple Ivanti solutions within a unified management experience—reducing operational overhead and delivering a qu
VIPRE products are designed to defend against evolving threats without compromising the needs of modern business. We offer flexible cloud configurations for rapid, affordable deployment, plus native mobile interfaces that enable instant threat response—anywhere, anytime. Add in our consistently high ratings from the world’s most widely-trusted independent testing labs, and it’s no wonder that millions of global users depend on VIPRE for a complete approach to cybersecurity. - VIPRE Endpoint Sec
Rippling is the first way for businesses to manage their HR & IT in one system — from employee payroll and benefits, to computers and software. Want to hire someone, for example? Just click a button, and Rippling can instantly: add new hires to your payroll and benefits, create their email, ship their work computer, and even create their user account across all your cloud apps, like Gmail, Slack, and Microsoft Office.
Always-on protection for your laptops, desktops and servers
Cb Protection is the strongest security possible for data centers and critical systems. Using a ‘Default Deny’ approach, Cb Protection reduces your attack surface with a single security agent and reduces downtime by automating approval of trusted software and eliminating the burden of whitelist management. and drives automatic approvals through IT-driven policies, as well one of the most extensive trust and reputation databases in the world. Cb Protection helps organizations achieve continuous c
Replace your manual processes, non-integrated point solutions, or overly complex software suite with the industry’s most comprehensive endpoint systems management solution and give your IT team more time to innovate. KACE fast-to-implement, easy-to-use systems management and deployment solutions provision, manage, secure, and service your growing organization’s network-connected devices, including Windows PCs, Macs, Chromebooks, tablets, Linux, UNIX, and Windows Servers, printers, storage and th
Symantec IT Management Suite enables IT administrators to securely manage the entire lifecycle of desktops, laptops, and servers across Windows, Mac, Linux, Unix, and virtual environments including deployment, asset management, and patch management to reduce costs and increase productivity. IT Management Suite 8.0 brings significant new functionality and enhancements to this already feature rich solution. Before covering what’s new in version 8.0, here’s a quick overview of some of the key capab
Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Symantec Endpoint Encryption combines strong full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. Symantec provides maximum protection by encrypting each drive, sector-by-sector, ensuring that all files are encrypted. In
Ivanti Endpoint Security for Endpoint Manager prevents, detects, and remediates even the most sophisticated ransomware and other threats, protecting your users, systems, and critical data. Multi-layered defenses automate discovery, inventory, patch management, and application and device control. You can also isolate infected devices, take action to keep running malware from spreading, and provide the data business leaders need to swiftly assess and update the security strategy. And because our s
Experience unified endpoint management for PCs and Macs with Parallels Mac Management and Microsoft SCCM and manage Macs similar as PCs. Parallels Mac Management is a Microsoft certified plug-in for SCCM extending its management capabilities to Macs and allows IT administrators to discover, enroll and inventory Macs into SCCM, enforce compliance, administer FileVault 2 encryption, deploy software and patches, deploy macOS images with task sequence steps support, deploy user applications via a
Avast is the global leader in next-gen cyber security products for consumers and businesses and protects over 400 million people online. Avast offers products under the Avast and AVG brands, that protect people from threats on the internet with one of the most advanced threat detection networks in the world. Avast digital security products are top ranked for mobile, PC and Mac. For businesses, Avast offers comprehensive antivirus security that keeps your devices, data, and employees safe
Desktop Central is a Unified Endpoint Management (UEM) solution that helps in managing servers, desktops, laptops, smartphones, tablets and POS devices from a central location. Automate your regular desktop management routines like installing patches, distributing software, imaging and deploying OS, managing your IT Assets, managing software licenses, monitoring software usage statistics, managing USB device usage, taking control of remote desktops, and more. It supports managing Windows, Mac a
A group of defense and intelligence experts saw savvy attackers compromising endpoints seemingly at will. Traditional approaches failed to provide sufficient protection. They founded SentinelOne to develop a dramatic new approach to endpoint protection. It’s one that applies AI and machine learning to thwart known and unknown threats. Our team understands how much endpoints matter. When attackers come after our privacy, intellectual property, infrastructure, and collaborative modes of working,
Lumension Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise.
Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.
Endpoint Security Suite Enterprise offers strong data security for business data, systems and. reputations. The suite offers an integrated client that includes advanced threat prevention, Enterprise class encryption, all centrally-managed via a single console to help businesses reduce.