Average Ratings 0 Ratings
Average Ratings 3,071 Ratings
Description
Ivanti delivers a suite of integrated IT management products that help organizations automate workflows, enhance security, and improve employee satisfaction. Their Unified Endpoint Management platform offers centralized, easy-to-use controls to manage devices and ensure consistent policy enforcement across any location. Enterprise Service Management provides deeper visibility into IT processes, helping reduce disruptions and increase efficiency. Ivanti’s network security solutions enable secure access from anywhere, while their exposure management tools help identify and prioritize cybersecurity risks. Serving more than 34,000 global customers like GNC Holdings and Weber, Ivanti is committed to supporting modern, flexible workforces. The company also conducts original research on IT trends, cybersecurity, and digital employee experience to guide innovation. Ivanti’s customer advocacy programs highlight the value of strong partnerships and dedicated support. Their offerings empower businesses to manage technology proactively and securely at scale.
Description
NinjaOne automates the hardest parts of IT, empowering more than 20,000 IT teams. By providing deep insights into endpoints, robust security measures, and centralized control, NinjaOne boosts efficiency while safeguarding sensitive data and cutting IT expenses. This comprehensive platform offers a versatile toolkit for managing and securing endpoints, including patch management, mobile device oversight, software distribution, remote support, backup solutions, and more, thanks to its extensive IT and security integrations.
API Access
Has API
API Access
Has API
Screenshots View All
No images available
Integrations
Accelo
Bitdefender GravityZone
ConnectWise PSA
Control D
ITBoost
Ivanti Endpoint Manager
Ivanti File Director
Ivanti Neurons for Discovery
Ivanti Neurons for Mobile Threat Defense
Ivanti Neurons for UEM
Integrations
Accelo
Bitdefender GravityZone
ConnectWise PSA
Control D
ITBoost
Ivanti Endpoint Manager
Ivanti File Director
Ivanti Neurons for Discovery
Ivanti Neurons for Mobile Threat Defense
Ivanti Neurons for UEM
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Ivanti
Founded
2017
Country
United States
Website
www.ivanti.com
Vendor Details
Company Name
NinjaOne
Founded
2013
Country
United States
Website
www.ninjaone.com
Product Features
Application Delivery Controllers (ADC)
CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Business Intelligence
Ad Hoc Reports
Benchmarking
Budgeting & Forecasting
Dashboard
Data Analysis
Key Performance Indicators
Natural Language Generation (NLG)
Performance Metrics
Predictive Analytics
Profitability Analysis
Strategic Planning
Trend / Problem Indicators
Visual Analytics
Cloud Cost Management
Cost Reduction Optimization
Dashboard
Data Import/Export
Data Storage
Data Visualization
Resource Usage Reporting
Roles / Permissions
Spend and Cost Reporting
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Document Management
Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
File Sync
Audit Trail
Backup and Recovery
Conflict Detection
Real Time Synchronization
Remote Synchronization
Synchronization Scheduling
Two-Way Synchronization
GRC
Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management
Help Desk
Alerts / Escalation
Automated Routing
Community Forums
Customizable Branding
Document Storage
Email Integration
IT Asset Management
Incident Management
Interaction Tracking
Knowledge Base
Known Issue Management
Live Chat
Multi-Channel Communication
Multiple Brands / Products
Network Monitoring
Real-time Chat
Self Service Portal
Service Level Agreement (SLA) Management
Ticket Management
IT Asset Management
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
IT Service
Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
ITSM
Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal
License Management
Automatic SKU Recognition
Central LM Server
Copy Protection
History Tracking
Node Management
Online Activation
Portable License
Sarbanes-Oxley Compliance
Timing Rights
Trial License
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Network Access Control (NAC)
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Patch Management
Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning
Project Portfolio Management
Budget Management
Collaboration
Dashboard
Issue Management
Milestone Tracking
Portfolio Management
Project Planning
Requirements Management
Resource Management
Status Tracking
Task Management
Time & Expense Tracking
Reporting
Customizable Dashboard
Data Source Connectors
Drag & Drop
Drill Down
Email Reports
Financial Reports
Forecasting
Marketing Reports
OLAP
Report Export
Sales Reports
Scheduled / Automated Reports
VPN
Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention
Product Features
Backup
Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Data Recovery
Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Disaster Recovery
Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage
Disk Imaging
Backup Scheduling
Bare-Metal Restore
Compression
Differential Backup
Disk Cloning
Encryption
Image Deployment
Incremental Backup
Web Access / Restoration
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Help Desk
Alerts / Escalation
Automated Routing
Community Forums
Customizable Branding
Document Storage
Email Integration
IT Asset Management
Incident Management
Interaction Tracking
Knowledge Base
Known Issue Management
Live Chat
Multi-Channel Communication
Multiple Brands / Products
Network Monitoring
Real-time Chat
Self Service Portal
Service Level Agreement (SLA) Management
Ticket Management
IT Asset Management
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
IT Infrastructure Monitoring
Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
ITSM
Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
MSP
Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Patch Management
Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Remote Support
Diagnostic Tools
File Transfer
Live Chat
Real-time Chat
Remote Control
Screen Sharing
Session Recording
Session Transfer
Surveys & Feedback
RMM
Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management
Server Backup
Backup Scheduling
Bare-Metal Restore
Compression
Continuous Backup
Differential Backup
Disaster Recovery
Encryption
Incremental Backup
VM Backup
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
System Monitoring
Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Website Monitoring
Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting