Best IT Management Software for Symantec Endpoint Protection

Find and compare the best IT Management software for Symantec Endpoint Protection in 2025

Use the comparison tool below to compare the top IT Management software for Symantec Endpoint Protection on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    BackBox Reviews
    Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
  • 2
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 3
    NXLog Reviews
    Log data can provide powerful insights to help you achieve complete security observability. Multi-platform tool that enhances threat prevention and improves infrastructure visibility. With over 120 configurable modules and support for more than 100 operating system versions, you can gain comprehensive insights as well as increased security. Reduce the cost of your SIEM by reducing noise and unnecessary log data. Filter events, trim unused fields and remove duplicates in order to improve the quality of your logs. With a single tool, you can collect and aggregate logs across your entire organization. Reduce the complexity of managing security-related incidents and reduce detection and response time. By centralizing certain logs into an SIEM, and archiving other logs on your long-term storage, you can empower your organization to meet compliance regulations. NXLog Platform provides centralized log management with flexible processing.
  • 4
    FortiADC Reviews
    FortiGSLB delivers quickly and securely. Applications everywhere. When designing and deploying internet-based solutions and services for enterprise and carrier networks, horizontal scalability is crucial. These organizations must be able quickly and easily to add new network resources and to deploy cloud-based apps to ensure business continuity and smooth disaster recovery in case of server or data center failure. These efforts can be slowed if the internet connectivity or security are not reliable. To meet these challenges, businesses often need to upgrade to more powerful hardware devices. These upgrades can be expensive and increase the total cost of ownership (TCO), without taking into account the issues of service availability and failover.
  • 5
    KeyScaler Reviews

    KeyScaler

    Device Authority

    KeyScaler®, a purpose-built IAM platform that focuses on device identity and is compatible with IoT/Blockchain, is available. It allows customers secure registration, provisioning, and connection of devices to IoT applications, platforms, and services. The platform makes it easy to establish a solid, end-to-end security architecture for the IoT. It also delivers efficiencies at scale via security automation without the need for human intervention. This is due to the IoT's dynamic scale, where new devices are being provisioned constantly, and it quickly becomes difficult to manage without automation. The IoT requires a method of identification that starts with individual devices. These devices can be authenticated automatically and dynamically without any manual intervention. Device Authority has created a flexible protocol for interface with KeyScaler®, which allows for the delivery of automated PKI for IoT device - offering two options for device authentication.
  • Previous
  • You're on page 1
  • Next