SmartShield

SmartShield Alternatives & Competitors

Looking for alternatives to SmartShield? Tons of people want Endpoint Management software. What's difficult is finding out whether or not the software you choose is right for you.

content
Market Segment

Top 20 Alternatives & Competitors to SmartShield

    #1
    #1
  1. LogMeIn Central

    (148)4.2 out of 5
    Helping people and businesses access their digital lives from virtually anywhere, on any device.
  2. Helping people and businesses access their digital lives from virtually anywhere, on any device.

    LogMeIn Central review by James H.
    "Stable and accurate remote attention: The administration of applications and updates is an aspect that we use a lot, since from there it is easily reviewed that everything is in the latest version and working correctly. You can also access the workstation remotely, so it is much easier to use, this is a great addition to the application. This remote access is usually quite stable, there are hardly any connection cuts or access failures, which is what I wanted from this program, stability in its operation. On the other hand, connectivity improves with its application for Android and IOS, since through both you can also access and make changes and I think you have optimized it quite well."
    #2
    #2
  3. Kaspersky Endpoint Security

    (104)4.2 out of 5
    Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.
  4. Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.

    Kaspersky review by Kamran A.
    "Protection at Enterprise level with ease of Management: We have found it the best solution for Enterprise. Not only it protects All our Endpoints it also achieves better Detection. Easy to deploy and manage through Administration Console with Enterprise level policies. From blocking un-trusted apps to websites all functions are very helpful. Apart from normal security features, Kaspersky has made excellent modifications with Advanced Behavior Detection based on Machine Learning which helps to block malicious actions before they harm your business."
    #3
    #3
  5. Sophos Intercept X: Next-Gen Endpoint

    (104)3.9 out of 5
    Complete security that includes encryption, web filtering and patch assessment
  6. Complete security that includes encryption, web filtering and patch assessment

    Sophos Intercept X: Next-Gen Endpoint review by Jorge R.
    "Sophos Intercept X: The main feature of Sophos Intercept X is that it is a next-generation enpoint security product that stops zero-day malware, stealthy attacks and unknown exploit variants, and includes advanced anti-ansomware functionality that detects previous unknown attacks in seconds. Sophos Intercept X is installed alongside existing endpoint security software from any vendor and does not cause conflicts between them. The solution is very complete and innovative and has a bright future as it is currently one of the market leaders in its area. The solution in general I love, is very friendly and is not very difficult to configure or implement besides that they are very accessible on their technical support platforms and doubt forums also have their forums for future ideas to add complements to the solution.They have their customer portal and certifications to personally prepare their products to have an easy administration and greater knowledge of each of their tools in the market and I think that in the future will improve by much and there will be no one who can compete. They have their customer portal and certifications to personally prepare their products to have an easy administration and greater knowledge of each of their tools in the market and I think that in the future will improve by much and there will be no one who can compete. "
    #4
    #4
  7. Panda Security

    (80)4.3 out of 5
    Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.
  8. Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.

    Panda Security review by Maikol Jose S.
    "Panda Security the best antivirus. : I like Panda Security. for being a perfect antivirus it helped me a lot to eliminate any type of threat that tries to damage my files and programs stored in my computer or Android phone, it gives me alert when it detects a virus and I have the option to scan all my files, programs, documents, completely eliminating the threat and very easy to use. "
    #5
    #5
  9. Absolute

    (57)4.6 out of 5
    Absolute provides a single platform to manage and secure any endpoint, ensure continuous compliance and automate asset intelligence. Powered by patented Persistence technology, Absolute’s endpoint visibility and control solution is embedded in the firmware of most major device manufacturers to ensure tamper-proof resilience, reduce devices or data drifting out of your control, and minimize security risks.
  10. Absolute provides a single platform to manage and secure any endpoint, ensure continuous compliance and automate asset intelligence. Powered by patented Persistence technology, Absolute’s endpoint visibility and control solution is embedded in the firmware of most major device manufacturers to ensure tamper-proof resilience, reduce devices or data drifting out of your control, and minimize security risks.

    Absolute review by Ian R.
    "Clean UI with many features and capabilities: I like the separation of software and hardware assets. It is easy to find a device you are looking for based on name, device model, user, etc. I also like the setting of multiple policies to multiple devices. Easier to maintain settings for different groups."
    #6
    #6
  11. IBM BigFix

    (74)4.1 out of 5
    Optimized for quick response
    Lack of visibility and control makes you vulnerable to security breaches and financial loss. The question is no longer if you'll be breached but when. IBM BigFix lets you find, fix, and secure endpoints. Fast.
  12. Lack of visibility and control makes you vulnerable to security breaches and financial loss. The question is no longer if you'll be breached but when. IBM BigFix lets you find, fix, and secure endpoints. Fast.

    IBM BigFix review by Administrator in Information Technology and Services
    "IBM Bigfix - great for software patching and even better for system reporting: We use SCCM as well, so we only use the patching aspect of IBM Bigfix as a supplemental product. Where IBM Bigfix (or IEM) really excels is in the reporting. I can find out nearly anything in my environment with it. Our system inventory has never been this complete. The reports are very useful and easy to share with others. The software captures everything--and I mean everything--on your systems. If you have regulatory compliance or just need to identify and fix your vulnerabilities, this will tell you where to look."
    #7
    #7
  13. Cisco Anyconnect Secure Mobility Client

    (49)4.4 out of 5
    AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected.
  14. AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected.

    Cisco Anyconnect Secure Mobility Client review by daniel c.
    "Cisco Any Conect. Trabaja desde cualquier lugar como ten tu despacho.: Cisco AnyConnect simplifica el acceso seguro a la red corporativa desde fuera de ella y proporciona la seguridad necesaria para ayudar a mantener a su organización segura y protegida. Desde cualquier dispositivo electrónico, con conexión a internet, con este programa instalado podrás acceder de forma encriptada mediante VPN al ordenador de la red LAN de tu empresa y lo podrás manejar en remoto como si estuvieras allí, pudiendo acceder fácilmente a los archivos y otros recursos que allá tuvieses. Todo mediante una interfaz muy sencilla de usar, pues solo hay que poner dirección de enalce y credenciales de usuario para poder acceder. "
    #8
    #8
  15. Trend Micro Endpoint Security

    (44)4.0 out of 5
    Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks
  16. Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks

    Trend Micro review by Oscar Z.
    "Security with the TrendMicro antivirus.: To maintain the safety of the network, we must start with the final equipment that we know as PC, laptops, servers. For better protection of the equipment, antivirus is installed, in the company Oceanica de Seguros we install TrendMicro in the final equipment. TrendMicro is an antiviru that communicates with the database that is in the cloud that is constantly being updated to always have the malware and spyware updated and lacking in the blacklist. The endpoints agents communicate by connecting to the internet with the database of the cloud to be updated and be prepared for any new malware."
    #9
    #9
  17. Lookout

    (40)4.1 out of 5
    Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.
  18. Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

    Lookout review by Gerald B. A.
    "Data protection and access to information.: Lookout is a complete protection system for all types of uses, whether personal or business, I personally love it, its way of making a complete scan for viruses, and especially malware, I think it is one of their strongest points, the detection of all types of malware, is very effective, performs a deep scan to the file or folders and detects any type of threat of this type that may affect us, besides it is not like other antivirus, which takes an eternity to perform a complete scan, with Lookout, this type of scans, does not take more than 1 to 2 minutes, also has a protection for browsers,which protects personal data, of possible websites that contain software or malicious code that try to access your information, creating real alerts of possible threats."
    #10
    #10
  19. Cb Protection

    (34)4.5 out of 5
    Cb Protection is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.
  20. Cb Protection is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.

    Cb Protection review by Administrator in Oil & Energy
    "Highly Effective, if a bit involved: This is, hands down, my favorite application whitelisting I've ever used. It can approve by the file's hash value (SHA-256), the publisher/certificate, or a number of other custom options. High customizable across the environment, and even enabled me to completely eradicate bloatware (such as ASK Toolbar) within two weeks of full implementation. If your installation is on a server that can access the internet, it can also use VirusTotal and CB's own reputation service to auto-approve some programs based on collective input from other customers (reducing management time). Other providers tried to get me to switch because CB Protection uses a lot of man-hours to manage (which is true), but they cannot reliably block some"benign but unwanted" programs without using a blacklisting approach. CB Protection means I can block unwanted programs from the get-go, even if they are basically harmless."
    #11
    #11
  21. Symantec Endpoint Encryption

    (24)3.5 out of 5
    Protect sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.
  22. Protect sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.

    Symantec Endpoint Encryption review by Lissett d.
    "Endpoint Encryption : This program protects all my equipment, making the handling of all my files and emails more secure, now with the implementation of the GDRP we have benefited with this tool, since users do not have to do anything while protecting the emails and files that we use."
    #12
    #12
  23. Avast Business CloudCare

    (23)4.3 out of 5
    CloudCare is a free, cloud-based, endpoint security administration platform that makes it significantly faster and easier to monitor threats, resolve issues, and deliver multiple layers of protection to your customers.
  24. CloudCare is a free, cloud-based, endpoint security administration platform that makes it significantly faster and easier to monitor threats, resolve issues, and deliver multiple layers of protection to your customers.

    Avast Business CloudCare review by Kipkoech K.
    "Avast My best Security Software: I like the fact that Avast is the most affordable software to secure your computer from getting infected with the malware attack. It protects the computer from being damaged by viruses during run time processes. avast comprises of features such as DoS where it will be able to protect us from being attack by hackers by alerting us about the malicious act intruding into our systems. It is easy to learn and install"
    #13
    #13
  25. Check Point Endpoint Security

    (16)4.5 out of 5
    Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
  26. Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.

    Check Point review by Reyes P.
    "Makes me feel safe: This software provides high levels of security and allows secure access to other devices, I really liked how easy it is to use and configure it, the infertfaz is very intuitive, and easy to understand, the use of the vpn does not slow down the connection, which is appreciated, it has nice performance."
    #14
    #14
  27. Ivanti Security Suite

    (16)4.3 out of 5
    Enable IT to protect your data without compromising user productivity. Endpoint security integrated with systems management helps you reduce risk and gain control over your environment.
  28. Enable IT to protect your data without compromising user productivity. Endpoint security integrated with systems management helps you reduce risk and gain control over your environment.

    Ivanti Security Suite review by Pervaiz D.
    "Endpoint Security or Unified Computers: detection of all the well-known Vulnerabilities, it has many other functions which you are using and daily they are getting a new upgrade and soon it will get the whole market this is what I like. this is what I really like about this software it is giving you the solutions and the words they mentioned they are doing the same tasks which say unified computers and really it is a unified computer."
    #15
    #15
  29. Symantec IT Management Suite

    (15)4.5 out of 5
    Securely manage all your endpoints — deploy new devices and apps, manage software licenses, and remediate vulnerabilities.
  30. Securely manage all your endpoints — deploy new devices and apps, manage software licenses, and remediate vulnerabilities.

    Symantec IT Management Suite review by Sophia S.
    "Why Symantec IT Management suite over any other product??: It has a more streamlined and easy process for updating windows.It supports implementation in the cloud which is an amazing feature.It supports both windows and Mac systems.It has a lot of options for software deployment.It is easy to manage assets and easily identify how many are using and things like that."
    #16
    #16
  31. Symantec Deployment Solution

    (12)4.2 out of 5
    Symantec Ghost Solution Suite is an award-winning software solution for imaging and deploying desktops, laptops, tablets and servers. Quickly and easily migrate to the latest operating systems, perform custom configurations and deploy software across hardware platforms and operating systems.
  32. Symantec Ghost Solution Suite is an award-winning software solution for imaging and deploying desktops, laptops, tablets and servers. Quickly and easily migrate to the latest operating systems, perform custom configurations and deploy software across hardware platforms and operating systems.

    Symantec Deployment Solution review by Tania M O.
    "Ghost Solutions very good tool to clone and protect our information.: With this tool I made images of the operating systems that were later implemented and distributed them through the network or from point to point in the disks. To start ghost solution is easily done from cd, dvd / usb or from the network. The functionality of implementing operating systems on several computers at the same time is very good. I remember that we implemented up to 5 simultaneous computers. we had applications that we needed to have in all the pc and what we did was to pass the apps to the images and in this way we replicated it in all the machines. "
    #17
    #17
  33. Parallels Mac Management for Microsoft SCCM

    (5)4.5 out of 5
    Manage your Mac with Microsoft SCCM the same way as Windows PCs. Full lifecycle management of macOS and Mac applications.
  34. Manage your Mac with Microsoft SCCM the same way as Windows PCs. Full lifecycle management of macOS and Mac applications.

    Parallels Mac Management for Microsoft SCCM review by Alyssa C.
    "Paralles for Mac Users: I like the ease of downloading the software and powering up the program. I believe the subscription price is pretty fair for what it provides. It is easy to switch back and forth between mac and parallels. "
    #18
    #18
  35. Symantec Protection Suite Enterprise Edition

    (5)4.5 out of 5
    Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.
  36. Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.

    Symantec Protection Suite Enterprise Edition review by Ann K.
    "Symantec offers protection you need: I like that it is a user friendly software that works in the background to keep my system safe from both viruses and spyware. I don't have to worry about either of those when I am working. I know that my computer is protected from any attacks and I can work without worry."
    #19
    #19
  37. SolarWinds User Device Tracker

    (3)4.2 out of 5
    User Device Tracker know when and where users and endpoint devices are connected to your network
  38. User Device Tracker know when and where users and endpoint devices are connected to your network

    SolarWinds User Device Tracker review by Matthew S.
    "Device tracker makes tracking our 15k user devices easy!: We are a very large organization with over 15,000 employees across 150 sites. We use SolarWinds User Device Tracker UDT to actively monitor our user's devices in real time. The information is constantly update automatically and we can use it to locate, IP, Mac Address, and last logged in user. With this information we can easily locate a device and see who last logged into and where it exists on our network usually down to the port it's connected to. If we can locate the port, we can take the Mac Address and locate where it is."
    #20
    #20
  39. Lumension Endpoint Management and Security Suite

    (3)4.0 out of 5
    Lumension Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise.
  40. Lumension Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise.

    Lumension Endpoint Management and Security Suite review by Roman F.
    "Lumension Review: Ease of use, great reporting features. With no prior experience we were up and running in one day."