G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing, patching, and securing desktops and laptops so organizations can reduce the cost and effort of ma
Applivery is a modern, cloud-based Unified Endpoint Management (UEM) platform designed to help organizations manage and secure their Android, Apple, and Windows devices effectively. This solution prov
Stratodesk is the leading innovator of an ultra-secure endpoint OS engineered with precision to meet the unique demands of modern enterprises. With zero-trust principles embedded in its core, NoTouch
Veritas Desktop and Laptop Option is a user centric backup solution that provides flexible implementation and centralized administration for endpoint data protection of Windows and Mac desktops and la
DeviceAtlas is a device detection solution which identifies and verifies connected devices for rich, actionable intelligence across every customer touch point. Analyze web traffic, segment or adapt c
The leading solution for smart, scalable device posture management, Remedio goes beyond detection to deliver easy, effective, and enduring remediation. Through context-aware current state monitoring a
Symantec Integrated Cyber Defense (ICD is a comprehensive cybersecurity platform designed to unify and streamline security across an organization's entire digital infrastructure. By integrating advanc
ANSA is a patch management software that allows for cross-platform capabilities, reporting on every device within the enterprise, and deploying custom applications.
Centurion SmartShield endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising system integrity.
Bacon Unlimited is a cross-platform endpoint management and vulnerability remediation platform designed to help IT teams manage vulnerabilities and system updates. Built for organizations that are tir
DeepArmor leverages the power of big data and patented machine learning algorithms to predict and prevent the most advanced attacks in a simple, lightweight solution. Security operations teams can use
IGEL’s endpoint management software is designed to allow users to convert any x86 device and control every PC from one easy-to-manage platform.
The Full Protect product utilizes a unique proactive signature-less technology which protects efficiently against unknown and sophisticated attacks.
Control Manager - Centralized Visibility and Investigation Lower the burden on IT and improve security posture. Centralized visibility and investigation monitor and rapidly understand security posture
Secure and manage a wide range of company and employee owned laptops, phones and tablets.