NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, ba
Also listed in Patch Management, Unified Endpoint Management (UEM), Enterprise IT Management, Mobile Device Management (MDM), Remote Support

Automations work as expected, patching (software and OS) is reliable, Ninja Remote is easy to use for both us and end user, remote powershell/cmd works well too. (There's now even background remote so we can log on and view event viewer for example without disturbing end user). NinjaOne is very easy to set up, customer service is fantastic and I often hear from my account manager who wants to check in with us. Active Discord community where both other customers and NinjaOne staff are on hand to assist.
I like how I can see everything in one portal and that they are always adding new features. Even better is we can SSO onto the platform and it supports passkeys!
We are using it for documentation and our IT knowledge base and it is good to have everything in one place for our techs.
I have recently started testing backups with my NAS and this was so easy to set up, I am speechless! We use it to backup our servers too and even doing an image back up lets us go on and download individual documents for when a user has 'misplaced' something and we don't want to do a full server recovery. Although it does let us do a full recovery too easily using the tool that NinjaOne provide. That has worked well with our vSphere environment and provided a full server image recovery.
I use NinjaOne every day and I honestly would be lost without it. Review collected by and hosted on G2.com.
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
Also listed in Password Policy Enforcement, Security Compliance, Unified Endpoint Management (UEM), Mobile Device Management (MDM), Privileged Access Management (PAM)

• General ease of use and setup
• Extremely flexible with robust options to manage Macs, PCs, and Linux machines as well as iOS and Android mobile devices
• Fantastic customer support with the ability to both chat with someone and call someone. Chat now support ChatGPT style results (so you can chat at anytime of day), which works surprisingly well.
• Constantly introducing new features and solutions
• Integrates well with existing workflows, including Active Directory and Googel Workspace
• Supports different forms of SSO integration including SAML and JIT provisioning Review collected by and hosted on G2.com.
Time tracking software with proof of work, screenshots, activity tracking, application monitoring and in-depth reports.
Also listed in Contractor Payments, Contractor Management, Absence Management, Project Cost Management, Time & Attendance

Recently, I’ve appreciated the improved reporting dashboards and better timesheet accuracy. The automated weekly reports save time, and the activity tracking feels more optimized than before. Integration with project management tools has also become smoother, making workflow tracking more centralized and efficient. Review collected by and hosted on G2.com.
Employee Monitoring Software to enhance your employee productivity. Maximise your profits and increase employee efficiency. Now powered with fast efficient project and task ma
Also listed in Time Tracking
what i like most about we360.ai is how clearly it helps HR teams understand employee productivity without micromanaging. The dashboards are easy to read, activity insights are accurate, and it is saves a lot of time during performance reviews, audits and workforce planning
It brings transparency while still respecting professional work boundaries.
The most helpful part is the real time visibility into work patterns, attendance accuracy and activity timeline trends. It allows me to support managers with data driven discussions instead of assumptions which improves employee trust and engagement. Review collected by and hosted on G2.com.
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastr
Also listed in AI IT Agents, AI Agents For Business Operations, AIOps Platforms, Unified Endpoint Management (UEM), IT Service Management (ITSM) Tools
What I like most about Atera is how easy it makes it to manage all my clients from one platform. Remote access is fast and reliable, patch management is straightforward, and the monitoring alerts help me stay proactive rather than reactive. Overall, it saves me a lot of time in my day-to-day IT work. I highly recommend Atera to any IT professional or MSP who’s looking for an all-in-one solution that’s efficient and cost-effective. Review collected by and hosted on G2.com.
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most tr
Also listed in Non-Human Identity Management (NHIM) Solutions, AWS Marketplace, Identity Threat Detection and Response (ITDR), Customer Identity and Access Management (CIAM), User Provisioning and Governance Tools
Okta also makes it easy for me to log in to essential systems like Costpoint, both online and on mobile, without having to remember multiple passwords. In addition, I can quickly access UKG through Okta, which keeps all of my HR information—such as payroll, PTO, and personal records—organized in one place. Review collected by and hosted on G2.com.
Pandora FMS is the most flexible monitoring software in the market.
Also listed in Observability Software, Server Monitoring, Log Monitoring, Cloud Infrastructure Monitoring, Application Performance Monitoring (APM)
My opinion of Pandora FMS's cybersecurity features and resources is very good because it is software that offers extremely high performance in detecting and eliminating all types of virtual threats and risks, issuing all kinds of notifications when your systems are at risk of damage or information theft.
Pandora FMS also stands out for its remarkable updates, ensuring that your systems operate with the best digital security technology, allowing you to work in a digital environment free of virtual risks. Review collected by and hosted on G2.com.
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
Also listed in Extended Detection and Response (XDR) Platforms, Digital Forensics, Network Traffic Analysis (NTA), Intrusion Detection and Prevention Systems (IDPS), Container Security
What I like most about ExtraHop is the ability to monitor and analyze all traffic passing through the network. Generally, companies have strong endpoint controls through tools like EDR; however, network is often limited to firewalls with intrusion detection and intrusion prevention rules. Where I find ExtraHop excels is through complete network visibility by mapping assets, learning network traffic and spotting anomalies, and giving Security Operations teams visibility into what is occurring on their network.
ExtraHop is easy to deploy through either and appliance on physical networks our through a virtual appliance in the cloud. The Customer Success teams are deeply knowledgable and provide great support to customers. Review collected by and hosted on G2.com.
Paessler PRTG is a network management software solution that monitors your network using a range of technologies to assure the availability of network components by measuring
Also listed in Server Monitoring, Hardware Monitoring, Database Monitoring, Cloud Infrastructure Monitoring, Application Performance Monitoring (APM)
When I drop a new core switch or a hypervisor onto the network, PRTG’s "Auto-discovery" finds about 90% of what I need (CPU, traffic, disk) without me having to manually look up OIDs or hunt for templates. It’s the "lazy man’s" dream that makes me look like I’m working much harder than I am. Review collected by and hosted on G2.com.
Galgus unleashes the value that Wi-Fi technology can bring to your business with user experience as its core, equipping you with cloud, intelligent and self-optimized networks
The security and peace of mind that having total control over my wifi gives me. Review collected by and hosted on G2.com.
Entuity's highly automated, enterprise-class solution puts deep network insight at your fingertips, frees IT staff to focus on strategic projects, and easily integrates with m
Also listed in Network Automation Tools, Network Management Tools, Enterprise Monitoring

The deployment of ENA has allowed us to retire multiple other products and reduce the number of management IPs we have to configure in SNMP from 7-9 down to just two. Since that initial deployment, we have expanded it's use globally we allowed us to retire an additional 7 tools.
Possibly more than technical side, the relationship we have been able to build with the owners, Park Place, and the level of access to development and their senior leadership team as mean that we continue to get to steer direction on new features in the product to make sure it fits our needs as a service provider. I believe this is the best partnership we have had with any vendor in our history. Review collected by and hosted on G2.com.
Manage guest users in Microsoft Teams: Maintain control over your data by easily managing external users! Stay in control with the integrated approval workflow: enable your
External User Manager helps us control which guest users have access to our tenant. We let them sign NDAs before they can access the teams through an integrated process. With the lifecycle setting we have added automated access reviews that remove the externals automatically if they no longer need access to a project. Review collected by and hosted on G2.com.
Observium is a comprehensive network monitoring and management platform designed to provide real-time visibility into network health and performance. It automatically discover

I started with a free community edition, which was great for testing. Eventually, I upgraded to the professional edition for daily updates and real-time alerting features. I get it at an affordable price, and I feel it's a solid investment. Low maintenance. Once it's up and running, it just works. It's been running smoothly for over a year with minimal intervention. Clean web interface, I can drill down into device performance, historical graph, and spot trends easily. The good thing is that it can handle and monitor any networking device via SNMP, so it is very easy for our monitoring team to handle multiple types of network devices. Review collected by and hosted on G2.com.
Kentik is a network intelligence company that specializes in helping deliver optimal network experience to customers and users.
Also listed in Network Monitoring
Insights, Dashboards, Graphics and flow analyse. Review collected by and hosted on G2.com.
Corporate security relies greatly on User Access Management. A US FDA 483 Observation for Pharmaceutical and Biotech Companies may be issued in GMP environments if illegal acc
This web-based product is very user-friendly. We can enhance the security of the product in which it is installed . It specify user access level to our every model i.e. QMS, EDMS , LIMS , We are now easily give permission to users . Review collected by and hosted on G2.com.
PropelAuth is the best solution for B2B authentication and user management. Whether you're selling to small startups, SMBs or large enterprises, you'll always be ready with Pr
Also listed in Customer Identity and Access Management (CIAM), Multi-Factor Authentication (MFA), Single Sign-On (SSO)

The best thing about PropelAuth is simple: it just works. When you’re dealing with user management and authentication, what you want most is a “quiet” product — something reliable that fades into the background and lets you focus on building your app. PropelAuth delivers that experience across multiple scenarios: from fast integration to advanced features like organization management, SAML SSO, and robust user authentication flows. Their support team is fantastic — fast, knowledgeable, and genuinely helpful. We’ve had nothing but smooth interactions. I evaluated several auth providers, and PropelAuth came out ahead in nearly every aspect — simplicity, pricing, SAML support, onboarding experience, and developer experience. Review collected by and hosted on G2.com.
Identity Governance, powered by Agent Cake 🤖🍰 1) Consolidate all access, apps and AI agents. 2) Fully automate IGA workflows. 3) Get guidance based on insights. 🤖🍰 Enabling yo
Also listed in User Provisioning and Governance Tools

Cakewalk has a really nice, light-touch UX that allows your team to easily integrate and record their third-party apps as they use them. No need to review and record all of oyur apps in one go, just add them as you go and manage them easily in the central web app. The data is super powerful once you get people using it too! The team are also really friendly and helpful.
Update: also love the new admin reporting section! Review collected by and hosted on G2.com.
Controlio is a cloud-based employee monitoring software designed to enhance workforce productivity and ensure compliance with organizational policies. It offers real-time surv
Also listed in Time Tracking, HR Analytics

The timeline view is excellent I can see exactly when people log in, which apps they use, and how active they are. Also the reports are clear and useful; great for weekly performance reviews and spotting inefficiencies. Review collected by and hosted on G2.com.
Modern IT and Security teams use our platform to orchestrate modern identity governance at scale. Access reviews, account (de)provisioning and overall identity lifecycle opera
Also listed in Identity and Access Management (IAM), User Provisioning and Governance Tools

Zygon supports us in carrying out our regular access reviews. Indeed, the tool has features such as identifying users connected to third-party applications. This allows us to review the list with application managers. Review collected by and hosted on G2.com.
Our technology has some thoughtful innovations to secure your network from unauthorized access, without jeopardizing genuine users trying to work with your in-house applicatio
Also listed in Software-Defined Perimeter (SDP), Identity and Access Management (IAM), Multi-Factor Authentication (MFA)
Its Zero Trust Network Access (ZTNA) capabilities, helping organizations improve their security posture by providing secure access to applications and resources based on identity and context. Its ease of use helps organizations enhance their security, reduce the attack surface, and protect sensitive data from unauthorized access. Superior dedicated customer support. Ease of intergrationacross products Review collected by and hosted on G2.com.