Best IT Management Software for Trellix Endpoint Security (HX)

Find and compare the best IT Management software for Trellix Endpoint Security (HX) in 2024

Use the comparison tool below to compare the top IT Management software for Trellix Endpoint Security (HX) on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,132 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    Microsoft Exchange Reviews
    Business-class email and calendaring make it easier to work smarter. Exchange allows you to collaborate on critical documents and gives an organized inbox that prioritizes important messages. It adapts to your work style and adapts to your needs so you can get more done faster. Access to a personalized inbox with helpful features, a smarter way to view and interact via email and a smarter way to organize it. Search enhancements provide faster and more complete results. Add-ins allow for powerful customization and extensibility that connects you to modern services as well as internal line-of business applications. A calendaring system that does more than just schedule appointments and make commitments will help you organize your time. Automatically capture events such as hotel reservations and flights from email. Get suggestions based on where you are located about where to meet. Microsoft 365 offers many benefits that can help you and your company be more productive.
  • 3
    BackBox Reviews
    Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
  • 4
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 5
    Forcepoint Trusted Gateway System Reviews
    Forcepoint Trusted Gateway System Secure data transfers to your mission-critical files every time. Transfer unstructured files reliably. PDF and Microsoft Office files can be transferred between and within different classifications for federal, state, local, and international entities. Raise the Bar Initiatives Comply With Mission-safe, breach-resistant architectural design that meets the U.S. government's Raise the Bar requirements. Streamline file transfers and eliminate the air gap risks associated with portable media. System administrators and security administrators have the right permissions to perform administration, monitoring, auditing, and monitoring from the server. Forcepoint Trusted Print Delivery (FTPS) and Trusted Post System can further reduce operational infrastructure costs. Forcepoint is widely used and listed on NCDSMO's baseline list. It supports transfer environments with 38+ network connections.
  • 6
    AppSmart Identity Reviews
    Securely connect everyone with everything. Digital transformation requires that you connect with people, apps, and devices. AppSmart Identity provides identity management and access management for all users across all applications and interconnected systems. This allows you to securely access and manage all cloud migration services as well as all other services from one place. Users don't want multiple passwords. Single sign-on allows users to access business systems from one account. This ensures seamless user experience for all cloud migration services and cloud managed service. Users can ensure that all identities that have access to business systems are verified with strong authentication and multi-factor authentication. Policy-based MFA stops unauthorized users from accessing corporate information with passwords alone. All your cloud managed services, eg. Manage all your users, groups, and devices.
  • Previous
  • You're on page 1
  • Next