Best IT Security Software for OpenDNS

Find and compare the best IT Security software for OpenDNS in 2024

Use the comparison tool below to compare the top IT Security software for OpenDNS on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Cisco Umbrella Reviews
    See Software
    Learn More
    Are you enforcing acceptable web use in accordance with your internal policies? Are you required by law to comply with internet safety regulations like CIPA? Umbrella allows you to effectively manage your user's internet connection through category-based content filtering, allow/block list enforcement, and SafeSearch browsing enforcement.
  • 2
    NinjaOne Reviews
    Top Pick
    See Software
    Learn More
    NinjaOne automates the hardest parts of IT, empowering more than 20,000 IT teams. By providing deep insights into endpoints, robust security measures, and centralized control, NinjaOne boosts efficiency while safeguarding sensitive data and cutting IT expenses. This comprehensive platform offers a versatile toolkit for managing and securing endpoints, including patch management, mobile device oversight, software distribution, remote support, backup solutions, and more, thanks to its extensive IT and security integrations.
  • 3
    ConnectWise Automate Reviews
    Top Pick
    See Software
    Learn More
    ConnectWise Automate makes it easy to solve IT problems at lightning speed. ConnectWise Automate is a robust platform for remote monitoring and management (RMM). It helps IT teams increase their effectiveness. It allows teams to identify all devices and users that require proactive monitoring, remove delivery roadblocks and support more endpoints without adding to their workloads.
  • 4
    Cisco Meraki Reviews
    Network security is difficult. Current solutions are difficult to implement and complex. Cisco Meraki simplifies security! Influential brands trust Cisco Meraki around the globe. Meraki is trusted by organizations around the world to deliver reliable, premium experiences. Cisco Meraki devices can be centrally and safely managed in the cloud via a single web dashboard. Our feature-rich and intuitive architecture allows customers to save money, reduce operating expenses, and solve new problems. Easy-to-manage Wi-Fi that is fast and reliable. Protect and securely connect the things that matter most, no matter where you are. Performance and reliability uncompromising at the core of your network. Remote monitoring and identity based configuration of all your devices.
  • 5
    Kasm Workspaces Reviews
    Top Pick

    Kasm Technologies

    $0 Free Community Edition
    46 Ratings
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 6
    N-able N‑central Reviews
    Join thousands of IT professionals and MSPs who use N-able™ Ncentral® remotely to monitor and manage complex networks and devices. These are the key features: * Monitor almost all devices, including Windows, Linux, and macOS * Get complete visibility across your network and cloud services without the use of additional network monitoring software * Automated patch management policies can be created to ensure that devices are always up-to-date * Automate your workflow with drag and drop scripting in automation manager. No need to write code! * Remote support across platforms and devices with the integrated Take Control feature * Use N-able MSP manager to manage tickets and billing. * Secure your data with integrated backup, EDR and AV. * Available on-premises and hosted cloud solutions to suit your business needs
  • 7
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 8
    Trust DNS Reviews

    Trust DNS

    Surfshark

    $2.50 per month
    DNS (Domain Naming Service), changer translates domain names like Surfshark.com to numerical IP addresses that machines use for communication. Your Internet Service Provider (ISP) is most likely your DNS provider. Your ISP can track your browsing history and see which websites you visit. DNS changer protects your privacy by encrypting DNS requests and allows for you to switch to a third-party public DNS server. It's easy to change your DNS. You can do it manually by clicking the Wi-Fi settings on your device and changing network. You can also use Trust DNS app to quickly switch DNS servers. Trust DNS app can be used in two ways. To make your browsing safer, activate Trust DNS server. Or connect to a third-party free DNS server provider for content filtering and ad blocking.
  • 9
    SpiderFoot Reviews
    SpiderFoot can automate the collection and surface of OSINT, regardless of your use case. You have found suspicious IP addresses or other indicators in your logs. Do you want to investigate them? Perhaps you need to investigate the e-mail address or links mentioned in a recent phishing attack against your company. SpiderFoot has over 200 modules that allow you to collect and analyze data. This will give you the best view of the Internet-facing attack surfaces in your company. SpiderFoot is loved by penetration testers and red teams for its OSINT reach. It identifies low hanging fuit and reveals long-forgotten or unmanaged IT assets. SpiderFoot can be used to continuously monitor OSINT data sources, and detect new intelligence about your organization.
  • Previous
  • You're on page 1
  • Next