Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 3 Ratings

Total
ease
features
design
support

Description

Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights. Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes. Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7. Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.

Description

Securing networks presents significant challenges, with existing solutions often being intricate and cumbersome to deploy. Discover how Cisco Meraki can streamline your security measures! Renowned globally, it is trusted by leading brands for its dependable solutions. With more than a million active networks, organizations everywhere rely on Meraki for exceptional service. All Meraki devices are managed centrally and securely from the cloud through a unified web dashboard. Our user-friendly and feature-rich architecture allows clients to save time, minimize operational expenses, and address emerging business challenges effectively. Recognized as the industry benchmark for easy management, fast, and reliable Wi-Fi, it ensures robust protection and connectivity for what you value most, no matter where you are. Experience unparalleled performance and dependability at the core of your network, along with remote monitoring and identity-based configuration for every device. This innovative approach not only enhances security but also optimizes network functionality for businesses of all sizes.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Akitra Andromeda
Axonius
Analytiks
Arctic Wolf
AuthControl Sentry
Bigtincan
Cisco Defense Orchestrator
Colligso SpotIn
Datacom Datapay
Electric
Genea Submeter Billing
Josys
Network Glue
OfficeRnD Hybrid
OfficeSpace Software
Rublon
ScalePad
Sign In Enterprise
Zenreach
Zimperium Mobile Threat Defense (MTD)

Integrations

Akitra Andromeda
Axonius
Analytiks
Arctic Wolf
AuthControl Sentry
Bigtincan
Cisco Defense Orchestrator
Colligso SpotIn
Datacom Datapay
Electric
Genea Submeter Billing
Josys
Network Glue
OfficeRnD Hybrid
OfficeSpace Software
Rublon
ScalePad
Sign In Enterprise
Zenreach
Zimperium Mobile Threat Defense (MTD)

Pricing Details

$5/device and $10/user/month
Free Trial
Free Version

Pricing Details

$40.00
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/maas360

Vendor Details

Company Name

Cisco

Founded

1984

Country

United States

Website

meraki.cisco.com/platform/

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Mobility

App Management
Barcode Scanning
Compliance Management
Content Management
Data Collection
Data Management
File Management
Forms Automation
Mobile Messaging
Remote Access
Remote Systems Monitoring

Product Features

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

SD-WAN

Application Delivery Control
Centralized Orchestration
Dynamic Path Selection
Multi-Cloud Management
Policy-based Management
VPN
WAN Optimization
Zero-Touch Provisioning

Alternatives

Hexnode UEM Reviews

Hexnode UEM

Mitsogo Inc

Alternatives

Bigleaf Reviews

Bigleaf

Bigleaf Networks
Codeproof Reviews

Codeproof

Codeproof Technologies
Jamf Pro Reviews

Jamf Pro

Jamf