Check out our list of free Endpoint Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.
If you'd like to see more products and to evaluate additional feature options, compare all Endpoint Management Software to ensure you get the right product.
Malwarebytes is the cybersecurity company that millions worldwide trust. Malwarebytes proactively protects organizations and their employees against advanced malicious threats, including ransomware, that traditional antivirus tools and other endpoint protection products miss. Driven from the cloud through a single pane of glass, Malwarebytes solutions provide flexible management and speed for organizations of all sizes. Malwarebytes Endpoint Protection is a complete malware protection and remed
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. From endpoint and mobile security to endpoint detection and response, as well as encryption and multifactor authentication, ESET’s high-performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating defenses in real time to keep users safe and businesses runn
LogMeIn Central is a pure, cloud-based remote monitoring and management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk.
It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack methods to maximize the likelihood of success. That's why Webroot Business Endpoint Protection is backed by real-time threat intelligence to protect businesses from threats across email, web browsing, files, URLs, malicious ads, apps, and more. Plus, in the event that a system does get compromised, We
inSync provides a comprehensive IT solution for protecting and governing enterprise data being managed by today’s mobile workforce, thereby enabling IT with visibility and control over mobile data without compromising end-user productivity. Designed from the ground up as a unified on-prem or cloud solution, inSync offers rich features like seamless, enterprise-grade backup for endpoints and cloud applications, secure file-sharing, data loss prevention (DLP), and data governance capabilities. In
NinjaRMM is an all-in-one remote monitoring and management platform that combines powerful, time-saving functionality with an intuitive, easy-to-use UI that MSPs and IT pros actually love to use. NinjaRMM increases business efficiency by combining monitoring, alerting, patching, antivirus, backup, and IT automation all within a single pane of glass. NinjaRMM has been named a Leader by G2Crowd and rated the #1 RMM across 8 categories, including ease of use, product direction, quality of support a
Rippling makes it easy to manage your company's Payroll, Benefits, HR, and IT—all in one, modern platform. It brings all of your employee systems and data together, and helps automate your busy work. Take onboarding, for example. With Rippling, you can just click a button, and in 90 seconds set up a new hires’ payroll, health insurance, 401K, work computer, and third-party apps — like Slack, Zoom, and Office 365 — 100% online and paperlessly. And that's just one reason why Rippling is The #1 R
VIPRE products are designed to defend against evolving threats without compromising the needs of modern business. We offer flexible cloud configurations for rapid, affordable deployment, plus native mobile interfaces that enable instant threat response—anywhere, anytime. Add in our consistently high ratings from the world’s most widely-trusted independent testing labs, and it’s no wonder that millions of global users depend on VIPRE for a complete approach to cybersecurity. - VIPRE Endpoint Sec
IBM Security MaaS360 with Watson is a unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across every type of device. Its open, cloud-based platform integrates with preferred security and productivity tools, allowing modern business leaders to derive immediate value.
Atera is the ultimate all-in-one Remote IT Monitoring & Management (RMM) solution for MSPs & IT service providers. Atera includes everything you need and nothing you don't: full RMM, built-in PSA, free remote access, patch management, IT automation, alerts, helpdesk, ticketing, chat reports, billing and so much more! You can save $1,000's by switching to Atera today. With affordable fixed-cost pricing and unlimited devices, you can grow your IT service business with no extra costs. Try A
SentinelOne is the only cybersecurity solution encompassing AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous platform. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. To learn more visit www.sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook. Our team
Panda Security, a WatchGuard Brand, has been providing advanced cybersecurity for over 30 years. Their Adaptive Defense 360 (AD360) Endpoint Protection Platform (EPP) suite, combines next-generation antivirus protection, endpoint detection and response (EDR), patch management, content filtering, email security, full disk encryption, and more, into one package. The AD360 platform touts a unique zero-trust security service that certifies the legitimacy and safety of all running applications thanks
Replace your manual processes, non-integrated point solutions, or overly complex software suite with the industry’s most comprehensive endpoint systems management solution and give your IT team more time to innovate. KACE fast-to-implement, easy-to-use systems management and deployment solutions provision, manage, secure, and service your growing organization’s network-connected devices, including Windows PCs, Macs, Chromebooks, tablets, Linux, UNIX, and Windows Servers, printers, storage and th
SmartDeploy is a leading provider of modern endpoint management solutions. With a flexible layered architecture, IT can achieve centralized, single-image management to support 50 to 50,000 endpoints. SmartDeploy’s award-winning technology combines the best of progressive solutions like SCCM, centralized solutions like VDI and legacy imaging solutions like Ghost, without the common drawbacks. More than 3,000 organizations, including Aetna, the US Department of Transportation, Nissan, Nintendo, ET
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 larges
Desktop Central is a Unified Endpoint Management (UEM) solution that helps in managing servers, desktops, laptops, smartphones, tablets and POS devices from a central location. Automate your regular desktop management routines like installing patches, distributing software, imaging and deploying OS, managing your IT Assets, managing software licenses, monitoring software usage statistics, managing USB device usage, taking control of remote desktops, and more. It supports managing Windows, Mac a
Prey is a software and online platform for mobile device tracking, management, and data protection available for laptops, tablets, and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., the successor of the funding company Fork Ltd. The Prey service is the property of Prey Inc., a small software company that operates in Chile and San Francisco. To this day, Prey has over 7.000.000 users and protect
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from blocking known threats, to blocking everything that is not trusted. Combined with Ringfencing and storage policies, you enhance your zero-trust protection and block attacks that live off the land.
FileWave gives IT the ability to proactively and automatically provision and maintain every device. FileWave makes multi-platform endpoint management simple.
Secure Active Directory user logins with two-factor authentication, contextual access controls and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT. Powerful protection for all Windows logins, RDP, VPN and IIS sessions, even when credentials are compromised.
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection – increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license – removing complexity and risks associated with non-integrated solutions. Integration of multiple protection technologies into one solution not only increases reliability – it also decreases the time requir
Falcon Discover allows you to quickly identify and eliminate malicious or noncompliant activity by providing unmatched real-time visibility into the devices, users and applications in your network.
HiddenApp makes managing a fleet of devices easy! It’s a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate capability, advanced anti-theft features, custom remote lock & wipe and a whole lot more, from one simple user-friendly dashboard. Secure your Windows 10 PCs, Apple Macs, iPads and iPhones in minutes, with zero-touch deployment with our MDM ready solution. Features Device Tracking: - Location Tr
Kolide is an endpoint security solution for teams that value productivity, transparency, and employee happiness. We believe that device security starts with the user. With Kolide, you can clearly communicate your organization's security guidelines through our Slack App, and help users achieve compliance without resorting to rigid management.
LuJam helps eliminate 95% of cyber threats by compliance monitoring.
The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud-centric. Wandera provides a unified cloud security solution to protect the modern workplace. We enable zero-trust access to all your applications, secure your data and devices against cyber threats and help you apply policies to filter internet access a