Learn More
Learn More

Average Ratings 54 Ratings

Total
ease
features
design
support

Average Ratings 123 Ratings

Total
ease
features
design
support

Description

Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines the most advanced threat-hunting technologies in existence: Heimdal Next-Gen Antivirus, Heimdal Privileged Access Management, Heimdal Application Control, Heimdal Ransomware Encryption Protection, Heimdal Patch & Asset Management, and Heimdal Threat Prevention. With 6 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.

Description

Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Audacity
Brave Browser
Chromium
ConnectWise RMM
Discord
Fedora
FileZilla Pro
GIMP
Google Chrome
HaloPSA
Keycloak
Maltego
Microsoft Entra ID
Okta
Oracle Cloud Container Registry
SUSE Linux Enterprise Desktop
Slack
Ubuntu
Ubuntu Core
Windows 365

Integrations

Audacity
Brave Browser
Chromium
ConnectWise RMM
Discord
Fedora
FileZilla Pro
GIMP
Google Chrome
HaloPSA
Keycloak
Maltego
Microsoft Entra ID
Okta
Oracle Cloud Container Registry
SUSE Linux Enterprise Desktop
Slack
Ubuntu
Ubuntu Core
Windows 365

Pricing Details

$0/month
Free Trial
Free Version

Pricing Details

$0 Free Community Edition
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Heimdal®

Founded

2014

Country

Denmark

Website

heimdalsecurity.com

Vendor Details

Company Name

Kasm Technologies

Founded

2017

Country

United States

Website

www.kasmweb.com

Product Features

Antivirus

Utilize the advanced capabilities of Heimdal’s exclusive Extended Threat Protection (XTP) engine through a cutting-edge endpoint security solution crafted for unparalleled identification of complex digital dangers. Safeguard your organization from ransomware, concealed backdoors, rootkits, brute-force intrusions, stealthy malware, and beyond.

Application Control

Enhance the capabilities of your system administrators and users with App Control. Select from a variety of criteria such as file location, publisher, certificate, vendor name, software title, MD5 hash, and additional options to easily permit or restrict application launches. Gain mastery over your system according to your preferences.

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cybersecurity

Strengthen your cybersecurity and IT departments with Heimdal's integrated platform, designed to combat the latest threats and offer extensive protection on various levels. Whether it's safeguarding endpoints, networks, emails, or identities, Heimdal ensures robust defense with its superior detection and response features.

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

DNS Security

Harnessing the strength of cybercrime insights, cutting-edge machine learning, and AI-driven defense mechanisms, Heimdal DNS Security Endpoint offers unmatched precision in safeguarding your organization against potential dangers. Safeguard your enterprise and maintain an advantage over threats with our innovative DNS security solution.

Email Security

Our state-of-the-art protection system offers robust defense against phishing, ransomware, and the ever-changing landscape of email threats. Seamlessly integrating with your current infrastructure, our solution fortifies your security measures, whether implemented in the cloud or on-site.

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR)

Heimdal Endpoint Detection and Response serves as a formidable cybersecurity solution that continuously observes, evaluates, and reacts to threats as they occur. Utilizing sophisticated detection methods and preemptive incident management features, it offers strong safeguarding for your organization's endpoints, facilitating prompt threat neutralization and reducing the risk of significant harm.

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Management

Heimdal Endpoint Detection and Response is an advanced security solution designed to continuously oversee, evaluate, and react to threats as they occur. Utilizing sophisticated detection methods and proactive measures for incident management, it offers strong defense for your organization's endpoints, facilitating prompt threat resolution and reducing the risk of damage.

Endpoint Privilege Management

Boost your security measures, optimize privilege oversight, and maintain adherence to regulations with our PAM solutions designed for autopilot readiness. Our offerings include Privilege Elevation and Delegation Management (PEDM), Privileged Account and Session Management (PASM), and Application Control.

Endpoint Protection

Heimdal Endpoint Detection and Response is an advanced security solution designed to continuously observe, evaluate, and react to threats as they occur. Utilizing sophisticated detection techniques alongside proactive incident management features, it delivers strong safeguarding for your organization's endpoints, enabling prompt threat resolution and reducing the risk of significant harm.

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Extended Detection and Response (XDR)

By utilizing Heimdal XDR, you can simplify the management of various security tools and enjoy the reassurance that comes from a holistic and unified strategy for cybersecurity.

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

IT Asset Management

Having full transparency and detailed oversight of your entire software collection ensures that you won't have to stress about overlooking an important update ever again.

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Managed Detection and Response (MDR)

Enhance your security return on investment by utilizing Heimdal MXDR—our budget-friendly offerings deliver top-tier protection for enterprises without requiring extra personnel or infrastructure.

MSP

Heimdal provides tailored security solutions designed to elevate your MSP service portfolio. Partner with us to offer a wide-ranging, efficient, and cohesive approach to cybersecurity services.

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Network Detection and Response (NDR)

Strengthen your network with an integrated AI defense system designed to effectively search for, thwart, identify, and address any threat, no matter how sophisticated. The Heimdal DNS Security Network equips you with the tools to take charge of your BYOD policies and safeguard every device used by your users, all from one cohesive and user-friendly platform.

Patch Management

Achieve optimal results with a streamlined patch management system designed for IT experts. Seamlessly deploy and update software around the clock, every day of the year, from any location globally, and customize your schedule to suit your needs.

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Privileged Access Management

Boost your security measures, simplify privilege oversight, and maintain adherence to regulations with our autopilot-capable Privileged Access Management (PAM) solutions. This includes Privilege Elevation and Delegation Management (PEDM), Privileged Account and Session Management (PASM), and Application Control.

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Ransomware Protection

Introducing our cutting-edge anti-ransomware encryption technology—an innovative solution that operates entirely without signatures. This state-of-the-art product safeguards your devices from harmful encryption efforts associated with ransomware attacks. Ensure the safety of your endpoints and network by defending against even the most sophisticated ransomware threats, continuously and in real-time.

Remote Desktop

Elevate your efficiency with Heimdal’s Remote Desktop solution. Tailored for hybrid businesses, IT specialists, and managed service providers, our cutting-edge technology simplifies your remote access requirements. Wave goodbye to complicated configurations and embrace seamless connectivity.

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

RMM

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

SIEM

The Heimdal Threat-Hunting and Action Center equips security teams with a sophisticated perspective focused on threats and risks throughout their entire IT environment. It delivers detailed telemetry from both endpoints and networks, enabling rapid and informed decision-making.

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Threat Hunting

The Heimdal Threat-Hunting and Action Center equips security teams with a comprehensive, risk-focused perspective of their complete IT environment, delivering detailed telemetry from endpoints and networks to facilitate rapid decision-making.

Threat Intelligence

The Heimdal Threat-Hunting and Action Center equips security teams with a sophisticated, risk-focused perspective of their complete IT environment. It delivers detailed telemetry from both endpoints and networks, enabling rapid and informed decision-making.

Vulnerability Management

Consolidate updates for Microsoft Windows, Apple MacOS, Linux Ubuntu, and various other platforms into one comprehensive patch and asset management system. Gain in-depth visibility into vulnerabilities categorized by severity, CVE, and classification, irrespective of the operating system. Seamlessly install, deploy, and distribute both security and non-security updates across any system, at any location, and at any time, all while avoiding compatibility challenges.

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Product Features

Application Virtualization

Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Management

Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Desktop as a Service (DaaS)

Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Digital Workplace

Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

Virtual Desktop (VDI)

Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Alternatives

Alternatives

ZTX Platform Reviews

ZTX Platform

SecureTrust Cyber
SparkView Reviews

SparkView

beyond SSL