Best PolicyPak Alternatives in 2024

Find the top alternatives to PolicyPak currently available. Compare ratings, reviews, pricing, and features of PolicyPak alternatives in 2024. Slashdot lists the best PolicyPak alternatives on the market that offer competing products that are similar to PolicyPak. Sort through PolicyPak alternatives below to make the best choice for your needs

  • 1
    Heimdal Endpoint Detection and Response (EDR) Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines the most advanced threat-hunting technologies in existence: Heimdal Next-Gen Antivirus, Heimdal Privileged Access Management, Heimdal Application Control, Heimdal Ransomware Encryption Protection, Heimdal Patch & Asset Management, and Heimdal Threat Prevention. With 6 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
  • 2
    Securden Endpoint Privilege Manager Reviews
    See Software
    Learn More
    Compare Both
    Identify and populate all local administrator accounts on endpoints across your IT network. Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission based system for smooth employee experience. Discover and add applications that require elevated privileges to run automatically. Whitelist and blacklist applications using comprehensive application control policies. Enforce principle of least privilege and principle of zero-trust across the organization. Comply with industry regulations with complete audit trails and record all activities. Track application usage across the organization using comprehensive reports and gain insights that help you with creating policies for smoother experience.
  • 3
    Jamf Pro Reviews
    Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro is the Apple device management tool that empowers IT pros and the users they support by delivering on the promise of unified ecosystem management for Apple devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily.
  • 4
    Esper Reviews
    Esper transforms the way companies manage device fleets. Esper's advanced capabilities include remote control and debugging, Pipelines, Esper SDK, APIs, Blueprints, dynamic configuration and Seamless Provisioning. Esper goes beyond traditional MDM and into the modern age of DevOps. Esper was named one of Deloitte Fast500 in 2023. It supports some of the most innovative brands around, including those in retail, hospitality and logistics, healthcare, education and more. The traditional mobile device management solutions (like MDMs and MAMs), as well as mobility solutions like EMMs and UEMs, were not designed for the modern hardware fleets that are growing today. Esper provides a single pane-of-glass for both Android and iOS devices.
  • 5
    Hexnode UEM Reviews

    Hexnode UEM

    Mitsogo Inc

    $1 per device/month
    3 Ratings
    Hexnode UEM is a Unified Endpoint Management solution that manages devices across multiple platforms from a single pane of glass. With a user-centric approach, the management process is streamlined throughout the entire device lifecycle- starting from enrollment up until device retirement. Trusted by SMBs to Fortune 500 companies around the world, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams. These include endpoint management for all types of devices (including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS), an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking and so much more.
  • 6
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 7
    Heimdal Application Control Reviews
    Heimdal Application Control offers a new approach to integrative app management and user rights curation. App Control is modular and easy to set-up. It allows the system administrator to create all encompassing rule-based frameworks and streamline auto-dismissal and auto-approval flows. It also enforces individual rights per Active Directory group. The uniqueness of the tool comes from its ability, in perfect coordination with a (PAM), Privileged Access Management solution. This allows for the user to have granular oversight over software inventories and hardware assets.
  • 8
    Zscaler Reviews
    Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
  • 9
    BlackBerry Enterprise BRIDGE Reviews
    BlackBerry® Enterprise BRIDGE is a highly-secure option for using native Microsoft mobile applications on iOS and Android. Microsoft Office mobile apps are now easier to use and more secure. BlackBerry Dynamics apps, such as BlackBerry Work, can now provide users with the full native experience of Microsoft PowerPoint, Word and Excel. Some employees may use their personal Office 365 accounts in order to access corporate files due to the rapid adoption of Office 365 among business and consumer users. The collaboration between BlackBerry and Microsoft means that users will no longer have to use this workaround. The secure bridge ensures data encryption and document integrity are preserved during the document sharing process, and that common data leakage policy is applied. BlackBerry Enterprise BRIDGE enables users to view, edit and annotate Office documents on their mobile devices of choice within a secure managed app.
  • 10
    Check Point Application Control Reviews
    Application Control offers the industry's strongest identity and application security to all organizations. Application Control is integrated into the Check Point Next Generation Firewalls. This allows businesses to create granular policies based upon users or groups to block, limit, or identify the use of applications and widgets. Applications can be classified into different categories based on various criteria, such as their type, security risk level and resource usage. There are also productivity implications. Granular control over social networks, applications, as well as application features, allows you to identify, allow, block or limit usage. The world's largest app library is used to group apps into categories, simplifying policy creation and protecting against malware and threats. Next Generation Firewalls integrates with Next Generation Firewalls to simplify security controls and reduce costs. Only authorized users and devices have access to your protected assets.
  • 11
    SP Policy Management Reviews

    SP Policy Management

    SP Marketplace

    $15 per user per year
    SP Policy Management streamlines all phases of a policy or procedure's life cycle, from its development to electronic acknowledgment by employees and contractors. SP Policy Management, which is built on SharePoint, Microsoft Teams and the Power Platform, is an easy-to use, out-of-the box solution that ensures compliance with policies from IT, HR, Security, Safety and more. Once approved, publish policies to the Policies Portal so that employees can access them. Employees can search, browse, and view the most recent policies from one central location. View their acknowledgments. Track and manage policy renewals, expiration, and retention. Notifications to policy owners. Policy calendar for upcoming renewals. Email employee groups to request that they acknowledge having read and understood policies. Schedule and Track Policy Acknowledgement By Group
  • 12
    VMware Carbon Black App Control Reviews
    To prevent unwanted changes and ensure compliance with regulatory mandates, lock down servers and critical systems to protect them. Protect corporate systems and protect legacy and new systems from unwanted change. VMware Carbon Black®, App Control™, is one of the most reliable and scalable applications control solutions available. Unify multiple endpoint security capabilities and work faster and more efficiently with one cloud-native platform. Stop ransomware, malware, zero-day, and other malicious attacks. File-integrity monitoring, device control, and memory protection can prevent unauthorized changes. To assess risk and protect the system, monitor critical activity. Secure EOL systems using powerful change-control policies and application control policies. Management overhead is kept low with out-of-the box templates.
  • 13
    ManageEngine Application Control Plus Reviews
    Application Control Plus is an enterprise solution that combines application control and privilege management features to strengthen endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses.
  • 14
    AirDroid Business Reviews
    Top Pick
    AirDroid Business, an enterprise-grade Mobile Device Management(MDM) solution, is designed to help businesses manage and control Android devices fleets from a central dashboard. With AirDroid Business, businesses can easily monitor device usage, deploy apps and updates, and remotely troubleshoot issues. It offers features such as kiosk mode, security policy, alerts & notifications, location tracking, file transfer in bulk, and more. It aims to simplify the device management process, increase productivity and efficiency, and reduce management costs.
  • 15
    Airlock Digital Reviews
    Airlock Allowlisting & Execution Control can stop targeted attacks. Airlock was specifically designed to allow application allowlisting at large scale in complex and changing enterprise environments. Airlock makes it easy to create, deploy, and manage application allowlists quickly, which allows organizations to become compliant and secure sooner. Airlock supports execution control for all binary files (executables / dlls), including scripts (PowerShell and VBScript, MSI JavaScript, Batch Files & HTML executables). Airlock partners with ReversingLabs in order to determine which files can be added to the allowlist. This service will also identify suspicious and malicious files in your environment. Airlock does not compromise security for efficiency. Airlock enforces allowlisting to ensure compliance with all security standards. Airlock is a secure, efficient, and easy-to-use execution control solution for businesses.
  • 16
    DriveLock Reviews
    DriveLock makes it easy to protect your business data, IT systems and endpoints. DriveLock makes it easier than you might think. We share our knowledge and use the latest technologies. You don't need to worry about data security throughout its lifecycle or across all your endpoints. DriveLock Zero Trust Platform - Instead of closing gaps in an environment with independent and individual security silos, this model prevents access to all data. DriveLock’s centralized policies only allow access to data and applications needed by individual employees and endpoints, in line with the maxim “never trust, never verify”.
  • 17
    SureMDM Reviews

    SureMDM

    42Gears Mobility Systems

    $3.49 per month
    Secure, Monitor, Manage, and Manage employee-owned devices. You can avoid security risks and resolve maintenance issues throughout the device's lifecycle. 42Gears SureMDM is an intuitive and powerful MDM software and app for Android, iOS/iPadOS and Windows. It can also be used on iOS/iPadOS and Windows. You can manage, secure, monitor and manage company-owned devices. Employee-owned devices can also be used to access company data (BYOD). SureMDM integrates all aspects enterprise mobility through unified endpoint administration, including Mobile Application Management and Mobile Device Management. SureLock is available for kiosk lockdown, SureFox is a secure browser for lockdown, and SureVideo is a secure digital signage solution.
  • 18
    Stacklet Reviews
    Stacklet is a Cloud Custodian-based solution that provides a complete out-of-the box solution that offers powerful management capabilities and advanced features for businesses to realize their potential. Stacklet was developed by Cloud Custodian's original developer. Cloud Custodian is used today by thousands of globally recognized brands. The project's community includes hundreds of active contributors, including Capital One, Microsoft, and Amazon. It is growing rapidly. Stacklet is a best-of breed solution for cloud governance that addresses security, cost optimization and regulatory compliance. Cloud Custodian can be managed at scale across thousands cloud accounts, policies, and regions. Access to best-practice policy sets that solve business problems outside-of-the box. Data and visualizations for understanding policy health, resource auditing trends, and anomalies. Cloud assets can be accessed in real-time, with historical revisions and changed management.
  • 19
    Ivanti Application Control Reviews
    Application Control combines privilege management with dynamic allowed and denied list to prevent unauthorized code execution. IT does not have to manage large lists manually and it does not constrain users. Automated requests and approvals through helpdesk systems reduce the IT staff's workload while providing users with a simplified experience. Application Control allows you to manage user privileges and policy at a granular level. It also allows for optional self-elevation in the event of exceptions. With seamless app access, your users will have quick access to the information they need. This is possible thanks to context-aware, granular policies. To ensure that only trusted and known applications are allowed to execute on a system, create flexible preventive policies. Automated requests for emergency privilege elevation and application access via integrated IT helpdesk systems.
  • 20
    IBM Security MaaS360 Reviews

    IBM Security MaaS360

    IBM

    $5/device and $10/user/month
    1 Rating
    Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM Security® MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights. Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes. Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7. Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
  • 21
    StealthINTERCEPT Reviews
    Audit and block any ad requests, authentications, or changes. Active Directory security and compliance requires that you monitor and prevent unwanted or unauthorized activities in real time. Organizations have struggled for years to get contextual, actionable intelligence from Microsoft's critical infrastructure to address their security, compliance and operational needs. Even after filling SIEM or other log aggregation technology with every event, crucial details can get lost in the noise. Security and compliance are essential as attackers develop more sophisticated ways to evade detection. This means that there is a need for a better way of detecting and controlling changes and activities that go against policy. StealthINTERCEPT can detect and optionally block any Active Directory change, authentication or request in real-time, without relying on native logging. It does this with surgical accuracy.
  • 22
    PolicyStat Reviews
    Healthcare staffing and operating environments are becoming more complex. Low policy adoption rates by staff, poor communication and poor communication make it harder to comply with regulatory compliance. However, it is crucial to establish policies and communicate them effectively to all employees throughout the environment to ensure patient safety. Due to increasing regulations and requirements, it is becoming more difficult to remain compliant (with safe patient treatment, a priority). Our powerful policy compliance software automatically tracks expiration dates and notifies managers about expired policies. Our policy compliance software allows you to tag and group policies and procedures related to a particular audit. This makes it easy to find all policies related either to Joint Commission or HIPAA with one search.
  • 23
    Trellix Application Control Reviews
    Advanced persistent threats (APTs), which can control servers, points, and fixed devices via remote attacks or social engineering, make it more difficult to protect your business. Trellix Application Control is a tool that helps you outsmart cybercriminals. It keeps your business safe and productive. You can ensure that only trusted apps run on desktops, servers, and devices. Trellix Application Control offers organizations the ability to increase their whitelisting strategy to prevent threats. Users are demanding more flexibility in using applications in their cloud-enabled social and business worlds. Trellix Application Control gives IT multiple options to allow users to install unknown applications. These include user notifications and user self-approvals. By blocking execution of unauthorized apps, you can prevent zero-day attacks and APT attacks. To quickly identify and fix compliance and security problems in your environment, use inventory search and predefined reports.
  • 24
    Security Auditor Reviews
    Simplified security policy management, file integrity monitoring software. Security Auditor centralizes security administration in your cloud, hybrid, or on-premise environment. Our agentless technology makes it easy to enforce security policies quickly and reduce the risk of security misconfigurations, which are a major cause of data breaches. Security Auditor automatically protects all new systems as they are created and monitors them continuously to identify any configuration settings that do not meet your requirements. An easy-to-use web-based console allows you to make changes and receive notifications about any policy exceptions. This simplifies compliance reporting requirements and simplifies tasks. You can also run the FixIt function to automate the process and let Security Auditor handle the rest. Security Auditor makes it easy to identify and configure security settings for your elastic cloud infrastructure.
  • 25
    Nirmata Reviews

    Nirmata

    Nirmata

    $50 per node per month
    Deploy production-ready Kubernetes clusters in days. Rapidly onboard users. With an intuitive and powerful DevOps tool, you can conquer Kubernetes complexity. Reduce friction between teams, improve alignment, and increase productivity. Nirmata's Kubernetes policy manager will ensure that you have the right security, compliance, and Kubernetes governance in order to scale efficiently. The DevSecOps Platform allows you to manage all your Kubernetes applications, policies, and clusters from one place, while streamlining operations. Nirmata's DevSecOps platform can integrate with cloud providers (EKS/AKS, GKE/OKE, etc.). and infrastructure-based solutions (VMware and Nutanix, Bare Metal) and solves Kubernetes operation challenges for enterprise DevOps team members with powerful Kubernetes governance and management capabilities.
  • 26
    AhnLab TrusGuard Reviews
    A thorough market assessment has recognized the NGFW TrusGuard for its technology, performance, and stability. The business environment is protected by the firewall, IPS and application control, VPN, C&C as well as Anti-Virus/AntiSpam and DLP. TrusGuard offers a full range of models, from low-end to high-end. Protects high-performance networks. Optimized for high-performance multicore environments, this optimizer is capable of handling increasing network traffic. Network stability. The 3-step defense protects network resources (such websites, databases servers, applications servers and client machines) against unknown network attacks. Protects IPv6 network environments. Complete support for IPv6 networks. Reduces total cost-of-operation (TCO). Cost savings compared to integrating multiple products. Reduces operational and labor costs associated managing multiple security solutions. This increases productivity and network efficiency.
  • 27
    Digital.ai App Management Reviews
    Enterprise mobile app management (MAM), enables IT to balance unique needs of remote users and IT. Connect with our MAM BYOD mobile security experts to hear an in-depth discussion about the mobile security landscape, and see a product demo. Get guidance on the capabilities of enterprise app stores and the value of internal app-store tests. MAM, in conjunction with existing MDM solutions, allows you to manage and update any application. You can also complete the security management of app data right down to the mobile device. Distribute apps with policy-enabled through existing app stores and support the secure management and distribution of any app by using MAM central policy management, App Store or Google Play. By collecting user feedback and data, developers can improve the overall quality of their apps, improve 'time to market' metrics, and continually innovate on features. Securely manage and distribute applications to trusted internal or external employees.
  • 28
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 29
    ProMDM Reviews
    ProMDM provides mobile device management solutions that provide end-to-end control over all mobile devices across the IT infrastructure. It uses standard MDM specifications for iOS and Android devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Management of Dynamic Groups based on AD/LDAP group, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automate administrative tasks with the Health check service Administration of the role base SSO with Client Certificate Authentication to Exchange, Sharepoint, and Web Sites iOS SSO with Kerberos Safari and Native Apps (integration with ADFS, websites directly) MAM - Mobile App Management Samsung KNOX support Document management - Managed Media Support Photo sync for Android Tracking and GPS location Android for Work Support (ProMDM is a Google Partner certified)
  • 30
    OpenText ZENworks Mobile Workspace Reviews
    OpenText™, ZENworks Mobile Workspace, is a secure solution for managing mobile access. It balances mobile security with usability, so you can benefit from BYOD's cost savings and users can stay productive with access to everything they need, wherever they are. Mobile accounts that are containerized and secure. Allow your employees to access corporate accounts on their mobile devices in a secure container. Safeguard corporate data and keep mobile users happy. Manage corporate workspaces on mobile devices centrally. Keystores and encryption eliminate potential vulnerabilities for securing data without having to control the entire device. Offsite access to intranet resources and web applications without exposing them to the internet. Keep corporate data safe in secure containers. Control shared data by enforcing policies for threat detection. Remote workspace wipes prevent data theft from lost devices. Isolate important data and encrypt it.
  • 31
    Cubed Mobile Reviews
    It's easy to get mobile security from start to finish. In just two steps, you can get the protection your business needs. Cubed Mobile eliminates the need for additional devices and/or SIMs from employees while creating a secure separation between personal workspaces and business workspaces. Securely keep sensitive data safe and secure. Secure Wi-Fi networks should only be used by employees. Your team should be empowered to secure the Internet. Protect your network, apps, privilege abuse, advanced attacks, and more A new approach to managing BYOD is easy to set up and can be used to improve security, communication coordination, and management. You can create workspaces with different settings, apps, or access rights based on user parameters. Your admins can invite and remove users, edit personal information, settings, virtual lines, and filter devices. Remote backup, restore, or wipe entire workspaces in an instant.
  • 32
    NovaEMM Reviews

    NovaEMM

    Tabnova

    $1 per device
    NovaEMM is a powerful mobile management solution, which provides complete control over all devices used at work. This includes BYOD devices and COPE devices. Our EMM solution enables businesses to manage devices from a central console, eliminating threats and vulnerabilities and optimizing device performance. NovaEMM offers comprehensive, turnkey analytics that are based on data, network and location usage. These insights allow organizations to collect and utilize actionable data about the elements that influence their mobile device productivity. A single view provides a consolidated overview, highlighting each device and making it a paramount solution. NovaEMM offers a streamlined way to create and manage a variety lockdown/kiosk profiles on a single platform. Our platform allows you to easily set passwords and other configurations.
  • 33
    Applivery Reviews

    Applivery

    Applivery

    €2/device
    Applivery's Unified Endpoint Management platform (UEM) is the most powerful UEM platform, which allows you to manage Android, Windows and Apple devices. Cloud-based Mobile Device Management solution allows for efficient remote management and top-notch security. It integrates seamlessly into organizations of any size, and only takes a few moments to set up.
  • 34
    Appaloosa Reviews

    Appaloosa

    Appaloosa

    $1.49 per month
    We provide a secure and enjoyable experience for personal devices that are used at work. We simplify the configuration of corporate devices for security, network, and apps. Appaloosa is scalable to your needs, whether you need to distribute one app to a few beta testers or deploy to thousands. We offer a variety of enterprise mobility management packages that will meet your specific needs. Everything you need to send your private apps within minutes. You can quickly deploy and manage apps without the hassles of large MDM systems. You can configure, update and remove apps silently. This is the most comprehensive solution and best suited to large organizations. Install apps, enroll devices, and manage them all. Trusted by the most demanding production environments. Get your free trial today. Last year, we were down for 12 minutes.
  • 35
    Perscale Reviews

    Perscale

    Perscale

    $6 per month
    Perscale allows you to access all of your files, apps, and data. All you need to do is connect to wifi and use Photoshop on your phone, Chromebook, or desktop. Your hardware will never be obsolete again. All your files, documents, photos, and videos will remain in the cloud. Perscale offers online storage to ensure your files are always current. Perscale integrates seamlessly with all your applications and offers file sync, free storage, and sharing. Our integration with Dropbox allows you to save your files directly from your app to any online storage provider. You can say goodbye to viruses. Your apps are protected in the cloud so viruses, Trojans and other malware can't get to them. Perscale protects your files with two-step verification and 256-bit AES encryption. All of your files and apps are available no matter what happens to your device. Perscale allows you to access your apps wherever you are with Perscale.
  • 36
    Trend Micro Mobile Security Reviews
    No matter where you are or what you do, you can be safe. Get advanced security and privacy. Protect your mobile life with powerful protection. Improve performance. Optimize your mobile devices to make them more efficient. Avoid fraud and online scams. Flag malicious phishing emails. Trust experience. Mobile solutions based on almost 30 years of security experience give you peace of mind. To stop threats, you can rely on the cloud-based Smart Protection Network™ or mobile app reputation technology to prevent them from reaching you. You can surf anywhere, and mobile apps will not load dangerous or risky websites. Protects your device from malicious apps, ransomware and unsafe Wi-Fi networks. Optimize your mobile phone for peak performance.
  • 37
    PolicyPro Reviews
    PolicyPro®, Canada's leading online policy management platform, is Canada's best resource for current model policies, procedures, forms, and forms in HR, finance IT, accessibility, non profit, and more. PolicyPro®, which includes all the tools you need for creating and updating policies, as well as a platform to distribute policies to staff and track that they have read and comprehended them. PolicyPro®, the only policy management software that does everything, from Policy to Sign Off™, in a single secure cloud application hosted in Canada, is PolicyPro®. Organizations may be facing increasing claims for fraud, wrongful termination, harassment, privacy breaches, and other issues in the current work environment. Lawyers, courts, and tribunals will first ask: "Where are your policies? Can you show that your employees have read and understood them?"
  • 38
    Applicaster Reviews
    The only platform that allows you to create, launch and manage streaming apps across multiple technology stacks. App independence; developers optional. You can create and modify custom experiences with the built-in tools, connect your preferred integrations, and launch directly to the app store. You can scale and expand your streaming business with budget predictability and full control over time & resources. Your business's growing needs can be met in the most efficient operational manner. To ensure the best user experience and desired business outcomes, you must continue to experiment, personalize, and optimize your app experience. Non-developers can build and compile apps and manage releases. There are hundreds of integrations that can power client apps. Our APIs allow you to expand your capabilities. Features available OOTB, you configure your backend. Measurement, data source and UI across platforms. Continuously collect user data, rollout changes quickly.
  • 39
    Google Cloud Policy Intelligence Reviews
    Automated policy controls can reduce risk Security teams working in the cloud face an overwhelming amount information to process to protect their environments. It is difficult and never-ending work to keep up with all the information manually. Failure can have serious consequences. Google Cloud Policy Intelligence allows enterprises to understand and manage their policies in order to reduce risk. Customers can increase security without increasing workload by providing greater visibility and automation.
  • 40
    Kyverno Reviews
    Kyverno is a Kubernetes policy engine. Kyverno allows policies to be managed as Kubernetes resource and requires no additional language. This allows you to use familiar tools like kubectl and git to manage your policies. Kyverno policies are able to validate, mutate and generate Kubernetes resource resources. They also ensure OCI image supply chain security. The Kyverno CLI is used to validate resources and test policies as part of a CI/CD process. You may need to trust custom CA certificates in certain cases. It is a good idea to have the ConfigMap so you can automount them with a simple annotation. If the annotation called "inject-certs" with value enabled is found, this policy will add a volume to all containers within a Pod that contains the certificate.
  • 41
    Procedure Rock Reviews

    Procedure Rock

    Gerald Fanning Consulting

    $59 per month
    ProcedureRock is a cloud-based Operations and Procedures Management Software. It helps you to organize your business operations. It makes it easy to manage and document your procedures, processes and manuals. ProcedureRock was launched in April 2013 and is an online cloud-based tool that helps companies and organizations improve their policy and procedure management. We are a team of smart engineers, backed by experienced executives, and built to solve any problem in procedural management. Secure, cloud-based platform that allows you to manage procedures and policies throughout their entire lifecycle. Our user-friendly solution makes it easy to save time and cut down on paper costs.
  • 42
    TotalCompliance Reviews

    TotalCompliance

    ComplianceBridge

    $749 per user per year
    TotalCompliance®, the most cost-effective compliance program, covers policy and procedure management as well as efficient risk, audit, and assessment management. ComplianceBridge's mission is to simplify Policy and Procedure Management and Risk Management. TotalCompliance is the most powerful cloud-based compliance platform in the world. It makes everything easy. Take a look at some of the features that make TotalCompliance so popular with hundreds of organizations: The most recent version of policies or procedures is always available to users. Powerful workflows allow document editors, reviewers, and stakeholders to collaborate on one central version. Send new policies and procedures to the people who need them. Define by individuals, groups, and distribution lists. Notify users when documents or tasks are assigned. Keep track of who has signed off, read, and tested documents. Set up automated reminders.
  • 43
    myComplianceManager Reviews
    Our Audit Management system is more than just a tool to optimize audit life-cycle. We've combined it together with our Enterprise Risk Management, Issue Management, and IT Systems Inventory applications. It enhances the way that you conduct audits and allows senior management and the Audit Committee to assess how audit results impact the organization’s risk profile and determine the best post-audit actions to take. Our Issue Management system has been included, so process owners can track and respond to issues or enhancement opportunities that are identified during audits. Our Enterprise Risk Management (ERM), provides a central location for monitoring, updating, and assessing your company's risk profile at the enterprise, regional, and process levels. Risk owners periodically complete automated surveys to score risks and identify any changes in your risk environment.
  • 44
    JumpCloud Reviews
    JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud secures and connects users to their systems, files, networks, and applications. JumpCloud helps users manage their systems - Mac, Linux, and Windows - and gives them access to cloud and onprem resources like Office 365™, G Suite and AWS™. Cloud servers, Salesforce™, Jira®, and many other resources. The same login can also connect users to networks and file share via RADIUS or Samba, respectively, protecting your organization's WiFi access and file server access. IT organizations can use cloud-based directory services to choose the best IT resources, allowing users to be as productive and efficient as possible.
  • 45
    VMware AppDefense Reviews
    VMware AppDefense gives you 360-degree visibility into all workloads and improves the security of your applications. AppDefense helps you reduce the threat surface and prevents you from chasing after them. It models intended behavior and monitors for anomalous activity. AppDefense also provides application control, reputation scoring and security.
  • 46
    Delinea Privilege Manager Reviews
    Privilege Manager is the most complete endpoint privilege elevation and control solution, and it operates at cloud speed. By removing administrative rights from local endpoints and implementing policies-based controls on applications, you can prevent malware exploiting these applications. Privilege Manager prevents malware attacks and does not cause any friction for end users. This slows down productivity. Privilege Manager is available on-premises or in the cloud. Fast-growing companies and teams can manage hundreds to thousands of machines using Privilege Manager. Privilege Manager makes it easier than ever for executives and auditors to manage endpoints. It includes built-in application control, real time threat intelligence, and actionable reports.
  • 47
    baramundi Management Suite Reviews

    baramundi Management Suite

    baramundi Software USA

    $5000.00/one-time
    Unified Endpoint Management system that is modular, scalable, and highly affordable for IT management, security, and workflow automation. Modules can be accessed from one interface, a single database. You can choose from any of the 18 modules available now and add more as you need for OS Install & Cloning and Patch Management, Vulnerability Management and MDM.
  • 48
    PC Matic Reviews

    PC Matic

    PC Matic

    $50 per year
    PC Matic Pro's Application Whitelisting is a critical layer of cyber-protection. It sits on top of other endpoint security products. Zero trust whitelisting solutions stop hacking and other cyber-attacks. Stop all malware, ransomware, or malicious scripts from being executed. Our whitelist cybersecurity solution will protect your network, users, and business data. PC Matic Pro is a long-overdue shift in cybersecurity industry towards absolute prevention. The threats to critical infrastructure, industry, government, and all levels of government today demand nothing less. PC Matic Pro offers a patented default deny security layer at the device. This prevents all unknown executions and does not create headaches for IT. Contrary to traditional security solutions, customer infected are not required to strengthen whitelist architecture. Local overrides can also be added after prevention, with a focus upon accuracy and no concern for responding to an active infection.
  • 49
    BeyondTrust Endpoint Privilege Management Reviews
    Reduce unnecessary privileges and give Windows, Mac, Unix and Linux access without affecting productivity. Our experience with more than 50 million endpoints has allowed us to develop a rapid deployment process. BeyondTrust is available on-premise and in the cloud. It allows you to quickly and efficiently remove admin rights without affecting user productivity or increasing service desk tickets. External attackers and malicious insiders are high-value targets for Unix and Linux systems. The same applies to networked devices such as IoT and ICS, as well. An attacker can gain root or other privileged credentials to easily fly under the radar and gain access to sensitive systems and data. BeyondTrust Privilege Manager for Unix & Linux provides an enterprise-class, high-standard privilege management solution that assists IT organizations in achieving compliance.
  • 50
    WatchGuard Application Control Reviews
    Based on the user's job function, department, and time of day, you can allow, block, or limit access to applications. It's now easier than ever to determine who, what, where, why, and how applications are used in your network. WatchGuard Application Control is a part of the WatchGuard Basic Security Suite. The Basic Security Suite includes all of the traditional network security services that are typical to a UTM appliance, including Gateway AntiVirus, Intrusion Prevention Service, URL filtering and URL filtering. It also includes reputation lookup, spam blocking, spam blocking, and application control. It also includes our centralized management capabilities and network visibility capabilities as well as our standard 24-hour support.