Introducing G2.ai, the future of software buying.Try now

Best Endpoint Management Software - Page 7

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Endpoint management software products help users keep track of devices in a system and ensure their software is secure and up to date. Typical features of endpoint management products are asset management, patch management, and compliance evaluation. Companies use these tools to make sure no unapproved devices are linked to the system. They also use these products to ensure each endpoint device has up-to-date software that has been patched properly to prevent intrusion. These tools have many overlapping features with vulnerability management and mobile device management (MDM) products. Endpoint management solutions simply have a wider scope of capabilities than vulnerability management tools including device governance and device compliance. While endpoint management software helps secure all sorts of endpoints, MDM tools typically only manage remote workers and mobile devices.

To qualify for inclusion in the Endpoint Management category, a product must:

Manage endpoint assets connected to a network
Manage patch updates and ensure device compliance
Detect new or suspicious devices connected to a network
Have the ability to install new operating systems or applications to an endpoint device
Show More
Show Less

Featured Endpoint Management Software At A Glance

Free Plan Available:
Heimdal
Sponsored
Leader:
Easiest to Use:
Top Trending:
Show LessShow More
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
152 Listings in Endpoint Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface withou

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 50% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberark Endpoint Privilege Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Management
    1
    Communication
    1
    Ease of Use
    1
    Easy Access
    1
    Features
    1
    Cons
    Authentication Issues
    1
    Login Issues
    1
    System Instability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberark Endpoint Privilege Manager features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    6.7
    Ease of Admin
    Average: 8.8
    9.2
    Quality of Support
    Average: 8.7
    7.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,022 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Endpoint Privilege Manager enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface withou

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 50% Enterprise
Cyberark Endpoint Privilege Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Management
1
Communication
1
Ease of Use
1
Easy Access
1
Features
1
Cons
Authentication Issues
1
Login Issues
1
System Instability
1
Cyberark Endpoint Privilege Manager features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
6.7
Ease of Admin
Average: 8.8
9.2
Quality of Support
Average: 8.7
7.5
Ease of Use
Average: 8.8
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,662 Twitter followers
LinkedIn® Page
www.linkedin.com
5,022 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardio covers your security blind spots. When you work in a business, one click can take the whole team down, along with your customer base. That one click can quickly lead to company data and custom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Guardio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    System Protection
    2
    Threat Detection
    2
    Antivirus Software
    1
    Blocking
    1
    Console Management
    1
    Cons
    Advertisement Issues
    1
    Alert Issues
    1
    Excessive Blocking
    1
    False Positives
    1
    Inaccurate Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardio features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.7
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guard.io
    Year Founded
    2018
    HQ Location
    Tel Aviv , IL
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardio covers your security blind spots. When you work in a business, one click can take the whole team down, along with your customer base. That one click can quickly lead to company data and custom

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Guardio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
System Protection
2
Threat Detection
2
Antivirus Software
1
Blocking
1
Console Management
1
Cons
Advertisement Issues
1
Alert Issues
1
Excessive Blocking
1
False Positives
1
Inaccurate Information
1
Guardio features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Quality of Support
Average: 8.7
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
Guard.io
Year Founded
2018
HQ Location
Tel Aviv , IL
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Haikiki iQ - AI-assisted threat hunting Haikiki is a German AI company applying artificial intelligence to detect cyberattackers. Haikiki iQ´s anomaly detection analyzes all network interactions

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Haikiki iQ features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Haikiki
    HQ Location
    Köln, DE
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Haikiki iQ - AI-assisted threat hunting Haikiki is a German AI company applying artificial intelligence to detect cyberattackers. Haikiki iQ´s anomaly detection analyzes all network interactions

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Haikiki iQ features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Haikiki
HQ Location
Köln, DE
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bromium has pioneered a completely new approach to defeat cyber attacks in real time and provide unmatched threat intelligence hardware-enforced isolation.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HP Wolf Enterprise Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Ease of Admin
    Average: 8.8
    9.2
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HP
    HQ Location
    Palo Alto, CA
    Twitter
    @HP
    1,097,197 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139,044 employees on LinkedIn®
    Ownership
    HPQ
    Total Revenue (USD mm)
    $56,639
Product Description
How are these determined?Information
This description is provided by the seller.

Bromium has pioneered a completely new approach to defeat cyber attacks in real time and provide unmatched threat intelligence hardware-enforced isolation.

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
HP Wolf Enterprise Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Ease of Admin
Average: 8.8
9.2
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.8
Seller Details
Seller
HP
HQ Location
Palo Alto, CA
Twitter
@HP
1,097,197 Twitter followers
LinkedIn® Page
www.linkedin.com
139,044 employees on LinkedIn®
Ownership
HPQ
Total Revenue (USD mm)
$56,639
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Improve HCL Notes, Streamline Your Operations, Empower Your Workforce MarvelClient helps you optimize your HCL Notes and Nomad environment. With it, you can configure, manage, deploy, monitor, and se

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MarvelClient features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    panagenda
    Year Founded
    2007
    HQ Location
    Vienna, Vienna, Austria
    Twitter
    @panagenda
    1,335 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Improve HCL Notes, Streamline Your Operations, Empower Your Workforce MarvelClient helps you optimize your HCL Notes and Nomad environment. With it, you can configure, manage, deploy, monitor, and se

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
MarvelClient features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Ease of Admin
Average: 8.8
10.0
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
panagenda
Year Founded
2007
HQ Location
Vienna, Vienna, Austria
Twitter
@panagenda
1,335 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A comprehensive endpoint solution that prevents attacks through trickery and deception.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Minerva Anti-Evasion Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Boston, US
    Twitter
    @MinervaLabs
    1,864 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,157 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A comprehensive endpoint solution that prevents attacks through trickery and deception.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Minerva Anti-Evasion Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2014
HQ Location
Boston, US
Twitter
@MinervaLabs
1,864 Twitter followers
LinkedIn® Page
www.linkedin.com
3,157 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock delivers Identity & Access Management (IAM) for organizations built on Microsoft Active Directory. It protects logins to corporate networks and SaaS applications across hybrid, remote, an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Setup
    2
    Setup Ease
    2
    2FA Security
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
    Limited Features
    1
    Limited OS Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.1
    9.7
    Ease of Admin
    Average: 8.8
    9.4
    Quality of Support
    Average: 8.7
    9.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock delivers Identity & Access Management (IAM) for organizations built on Microsoft Active Directory. It protects logins to corporate networks and SaaS applications across hybrid, remote, an

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Setup
2
Setup Ease
2
2FA Security
1
Customer Support
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
Limited Features
1
Limited OS Compatibility
1
UserLock features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.1
9.7
Ease of Admin
Average: 8.8
9.4
Quality of Support
Average: 8.7
9.4
Ease of Use
Average: 8.8
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZoomEye is a comprehensive cyberspace search engine developed by Knownsec Inc., designed to map and analyze internet-connected devices and services globally. By continuously scanning the entire IPv4 a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZoomEye Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Ease of Use
    1
    Features
    1
    Cons
    Learning Curve
    1
    Limitations
    1
    Pricing Issues
    1
    Search Difficulties
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZoomEye features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZoomEye
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZoomEye is a comprehensive cyberspace search engine developed by Knownsec Inc., designed to map and analyze internet-connected devices and services globally. By continuously scanning the entire IPv4 a

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
ZoomEye Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Ease of Use
1
Features
1
Cons
Learning Curve
1
Limitations
1
Pricing Issues
1
Search Difficulties
1
Slow Performance
1
ZoomEye features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Ease of Admin
Average: 8.8
10.0
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.8
Seller Details
Seller
ZoomEye
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlarmKey is a security system installer software that manages operations, customer service, accounting, business analysis and planning inefficient, cost-effective ways.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlarmKey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Features
    1
    Cons
    Complexity
    1
    Missing Features
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlarmKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlarmKey is a security system installer software that manages operations, customer service, accounting, business analysis and planning inefficient, cost-effective ways.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
AlarmKey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Features
1
Cons
Complexity
1
Missing Features
1
Poor Interface Design
1
AlarmKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
6.7
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.8
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bufferzone is a patented containment solution designed to defend endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BUFFERZONE features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Herzeliya, IL
    Twitter
    @BufferZoneSec
    684 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bufferzone is a patented containment solution designed to defend endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BUFFERZONE features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2014
HQ Location
Herzeliya, IL
Twitter
@BufferZoneSec
684 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Devicie is a SaaS automation tool for device management. Devicie rapidly accelerates Intune implementation, delivering a best practice, automatically updated and optimised Intune instance in days

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devicie features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Devicie
    Year Founded
    2018
    HQ Location
    St Petersburg, US
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Devicie is a SaaS automation tool for device management. Devicie rapidly accelerates Intune implementation, delivering a best practice, automatically updated and optimised Intune instance in days

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Devicie features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Devicie
Year Founded
2018
HQ Location
St Petersburg, US
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. It enables you to remotely locate, lock, and wipe devices you manage to prevent data compromise. From For

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DriveStrike features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.7
    6.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Salt Lake City, US
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. It enables you to remotely locate, lock, and wipe devices you manage to prevent data compromise. From For

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
DriveStrike features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Quality of Support
Average: 8.7
6.7
Ease of Use
Average: 8.8
Seller Details
Year Founded
2012
HQ Location
Salt Lake City, US
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    G DATA Endpoint Security is a comprehensive cybersecurity solution designed to protect businesses from a wide range of digital threats. It offers robust defense mechanisms for workstations, servers, a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • G DATA Endpoint Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Ease of Admin
    Average: 8.8
    9.2
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Bochum, DE
    Twitter
    @GDataSoftwareAG
    14 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

G DATA Endpoint Security is a comprehensive cybersecurity solution designed to protect businesses from a wide range of digital threats. It offers robust defense mechanisms for workstations, servers, a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
G DATA Endpoint Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Ease of Admin
Average: 8.8
9.2
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
1985
HQ Location
Bochum, DE
Twitter
@GDataSoftwareAG
14 Twitter followers
LinkedIn® Page
www.linkedin.com
214 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Complete IT Asset Management and Reporting NetSupport DNA provides organizations with the tools to manage technology across all platforms in and out of the office/school, whilst achieving best practi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetSupport DNA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1989
    HQ Location
    Market Deeping, United Kingdom
    Twitter
    @NetSupportGroup
    6,813 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Complete IT Asset Management and Reporting NetSupport DNA provides organizations with the tools to manage technology across all platforms in and out of the office/school, whilst achieving best practi

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
NetSupport DNA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1989
HQ Location
Market Deeping, United Kingdom
Twitter
@NetSupportGroup
6,813 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Micro Focus ZENworks Endpoint Security Management (formerly Novell ZENworks Endpoint Security Management) is a location-aware, policy-based solution that protects the data on every PC, controls how en

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText ZENworks Endpoint Security Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,624 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23,270 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Micro Focus ZENworks Endpoint Security Management (formerly Novell ZENworks Endpoint Security Management) is a location-aware, policy-based solution that protects the data on every PC, controls how en

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText ZENworks Endpoint Security Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
6.7
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,624 Twitter followers
LinkedIn® Page
www.linkedin.com
23,270 employees on LinkedIn®
Ownership
NASDAQ:OTEX