Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
Streamlining your processes is essential, especially when it comes to endpoint management across various operating systems like Android, iOS, Windows, Chrome OS, MacOS, and Linux, which can be easily configured and managed. Instances of lost phones or stolen tablets are common, so safeguarding your organization’s data is crucial with effective endpoint management solutions. By enforcing screen locks and requiring robust passwords, you can secure your sensitive information, while options like device wipe or selective account wipe for Android and iOS can further protect your data. Additionally, restricting access to certain sessions on Windows, Chrome OS, Linux, and MacOS can enhance security measures. G Suite offers a straightforward approach to streamline endpoint management, allowing you to enforce passcodes and remotely wipe specific accounts without needing to install any software on users' Android and iOS devices, thanks to its agentless endpoint management feature that is enabled by default. You can also oversee and secure Windows 10 devices directly through the Admin console, and easily distribute business applications via the Admin console on Google Play or Apple’s App Store, as well as host internal-only Android applications within the Play Private Channel for added convenience. By taking advantage of these tools, organizations can ensure a more secure and efficient management of their devices.
Description
Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights.
Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes.
Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7.
Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
API Access
Has API
API Access
Has API
Integrations
Akitra Andromeda
Bigtincan
CentreStack
Check Point IPS
Check Point Infinity
ConnectWise RMM
CopperheadOS
Cynerio
ExpenseSmart
F5 BIG-IP Access Policy Manager
Integrations
Akitra Andromeda
Bigtincan
CentreStack
Check Point IPS
Check Point Infinity
ConnectWise RMM
CopperheadOS
Cynerio
ExpenseSmart
F5 BIG-IP Access Policy Manager
Pricing Details
$6 per user per month
Free Trial
Free Version
Pricing Details
$5/device and $10/user/month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Founded
1998
Country
United States
Website
gsuite.google.com/products/admin/endpoint/
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/maas360
Product Features
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Product Features
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Mobility
App Management
Barcode Scanning
Compliance Management
Content Management
Data Collection
Data Management
File Management
Forms Automation
Mobile Messaging
Remote Access
Remote Systems Monitoring