Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
Boundless presents adaptable and scalable pricing solutions tailored to the specific number of networks and services required by your business. It allows for the automation of deploying, migrating, and configuring extensive Cisco Meraki infrastructures, thereby enhancing the efficiency of overall network management. With the capability to collect logs on activities occurring within any network infrastructure and devices, troubleshooting becomes significantly quicker. The platform simplifies the configuration and management of public WiFi networks across numerous locations, enabling the creation of visually appealing captive portals with a diverse range of sign-on options. It enhances the security of guest WiFi services available to your users. You can swiftly deploy thousands of networks in just minutes using a CSV file, providing increased flexibility to make bulk configuration adjustments. It also allows for the cloning of configuration standards, facilitating the creation or migration of organizations. Advanced filters can be utilized to expedite the research of client devices, granting you heightened control over the level of access you offer to your organizations. Additionally, the comprehensive features ensure that your network management needs are met effectively and efficiently.
Description
Symantec Ghost Solution Suite is a distinguished software program designed for the imaging and deployment of desktops, laptops, tablets, and servers. It enables swift and seamless transitions to the latest operating systems, facilitates custom configurations, and allows for software deployment across various hardware platforms and operating systems. When migrating to any version of Windows, numerous factors must be taken into account. Our network of 123 million sensors captures thousands of threat incidents every second from 157 countries, successfully blocking an impressive 142 million threats on a daily basis. Leverage insights from the largest civilian threat network globally to bolster your defense strategies. The GSS Agent, which includes DAgent and ADLAgent, necessitates an active network connection and requires a minimum of 10 MB of disk space, with additional system prerequisites aligning with those of the host operating system. It’s worth noting that these agents are essential for maximizing the functionality of the Ghost Solution Suite.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Mailchimp
ReachFive
Twilio
WebTitan
Integrations
Amazon Web Services (AWS)
Mailchimp
ReachFive
Twilio
WebTitan
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Boundless Digital
Founded
2016
Country
France
Website
www.boundlessdigital.com
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/endpoint-management/ghost-solutions-suite
Product Features
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Service
Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
MSP
Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling
Product Features
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Service
Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management