What Integrates with ThreatAware?
Find out what ThreatAware integrations exist in 2025. Learn what software and services currently integrate with ThreatAware, and sort them by reviews, cost, features, and more. Below is a list of products that ThreatAware currently integrates with:
-
1
Atera
Atera
30-DAY FREE TRIAL 2,689 RatingsThe all-in-one IT management platform, powered by Action AI™ Atera is the all-in-one IT management platform that combines RMM, Helpdesk, and ticketing with AI to boost organizational efficiency at scale. Try Atera Free Now! -
2
Device42 is a robust and comprehensive data center and network management software designed by IT engineers to help them discover, document and manage Data Centers and overall IT. Device42 provides actionable insight into enterprise infrastructures. It clearly identifies hardware, software, services, and network interdependencies. It also features powerful visualizations and an easy-to-use user interface, webhooks and APIs. Device42 can help you plan for network changes and reduce MTTR in case of an unexpected outage. It provides everything you need for maintenance, audits and warranty, license certificate, warranty and lifecycle management, passwords/secrets and inventory, asset tracking and budgeting, building rooms and rack layouts... Device42 can integrate with your favorite IT management tools. This includes integration with SIEM, CM and ITSM; data mapping; and many more! As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
-
3
ConnectWise Automate
ConnectWise
488 RatingsConnectWise Automate makes it easy to solve IT problems at lightning speed. ConnectWise Automate is a robust platform for remote monitoring and management (RMM). It helps IT teams increase their effectiveness. It allows teams to identify all devices and users that require proactive monitoring, remove delivery roadblocks and support more endpoints without adding to their workloads. -
4
Action1 redefines patch management by enabling enterprises to rapidly discover and remediate vulnerabilities with a 99% patch success rate solution. Streamline your third-party patching, including custom software, through Action1’s Software Repository maintained in-house by security experts, and manage OS updates – fully integrated altogether with full feature-parity and uniformity. Identify vulnerabilities in real-time and remediate them by applying available patches, removing unsupported or legacy software, or centralizing documentation of compensating controls for vulnerabilities that cannot be patched. Optimize network traffic usage when large software packages up to 32Gb in size are deployed on the same network and deliver patches faster thanks to Action1’s P2P Distribution technology. Action1 is the easiest-to-use patch management platform on the market, which you can set up in 5 minutes and automate your patching right away through its intuitive UI. Thanks to its cloud-native architecture, Action1 is infinitely scalable and works equally well for office-based and remote employee endpoints, servers, and cloud workloads, requiring no VPN. Action1 is the first patch management vendor to achieve SOC 2, ISO 2
-
5
ThreatLocker
ThreatLocker
331 RatingsFor IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. -
6
Cynet equips MSPs and MSSPs with a fully managed, all-in-one cybersecurity platform that brings together essential security functions in a single, user-friendly solution. By consolidating these capabilities, Cynet simplifies cybersecurity management, reduces complexity, and lowers costs, eliminating the need for multiple vendors and integrations. With multi-layered breach protection, Cynet delivers robust security for endpoints, networks, and SaaS/Cloud environments, ensuring comprehensive defense against evolving threats. Its advanced automation enhances incident response, enabling swift detection, prevention, and resolution. Supported by a 24/7 Security Operations Center (SOC), Cynet’s CyOps team provides continuous monitoring and expert guidance to keep client environments secure. Partnering with Cynet allows you to deliver cutting-edge, proactive cybersecurity services while improving operational efficiency. See how Cynet can redefine your security offerings and empower your clients today.
-
7
Cisco Duo
Cisco
$3 per user per month 1,290 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
8
Cisco Umbrella
Cisco
1,114 RatingsAre you enforcing acceptable web use in accordance with your internal policies? Are you required by law to comply with internet safety regulations like CIPA? Umbrella allows you to effectively manage your user's internet connection through category-based content filtering, allow/block list enforcement, and SafeSearch browsing enforcement. -
9
Kandji
Kandji
581 RatingsKandji, an Apple device management (MDM), solution, was created exclusively for IT departments in organizations that use Apple. Kandji is a cloud-based platform that centrally manages and secures your Mac, iPhone and iPad as well as Apple TV devices, saves IT teams hours of repetitive, manual work. It also includes 150+ pre-built automations and apps. -
10
ISL Light is a remote desktop software that is easy to use for security-conscious users. It offers great value-performance. ISL Light is a powerful tool for IT staff and support personnel to solve problems remotely via remote support, unattended access, or screen-sharing from mobile devices. It is cross-platform and provides 256-bit encrypted sessions, all the standard remote access features, as well as session recording, chat, videocall and multi-monitor support, file transfers, reporting, and many other important extras. Users can choose between cloud and on-premise services. ISL Online license doesn't limit the number or workstations of clients, users, and users you can support. It is a reliable, highly secure software that can be used in all industries, including banks, hospitals, government institutions, and insurances.
-
11
Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
-
12
SentinelOne Singularity
SentinelOne
$45 per user per year 6 RatingsOne intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI. -
13
Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
-
14
Amazon EC2
Amazon
2 RatingsAmazon Elastic Compute Cloud (Amazon EC2) provides secure, resizable cloud computing capacity. It was designed to make cloud computing at web scale easier for developers. Amazon EC2's web service interface makes it easy to configure and obtain capacity with minimal effort. It gives you complete control over your computing resources and allows you to run on Amazon's proven computing environment. -
15
Microsoft Defender XDR
Microsoft
2 RatingsMicrosoft Defender XDR is a comprehensive extended detection and response (XDR) solution designed to streamline security operations by providing unified protection across endpoints, IoT devices, identities, cloud apps, and collaboration tools. It delivers centralized visibility and advanced analytics to detect, investigate, and respond to threats with greater speed and accuracy. By integrating seamlessly with tools like Defender for Endpoint, Office 365, Identity, and Cloud Apps, the platform enables security teams to correlate signals from multiple sources, uncovering complex attack patterns. With automated threat disruption and asset self-healing capabilities, it enhances resilience against cyberattacks. The platform also offers cross-product threat hunting and a unified management experience, helping organizations simplify operations and improve their overall security posture. -
16
Secure endpoints against cyberattacks. Detect anomalous behavior in real-time and remediate. IBM®, QRadar®, EDR remediates known or unknown endpoint threats with ease-of-use intelligent automation, requiring little to no human interaction. With attack visualization storyboards, you can make quick, informed decisions and use automated alert management. A user-friendly interface and AI capabilities that are constantly learning put security staff in control, and help to safeguard business continuity. The average organization manages thousands of endpoints, which are the most vulnerable and exploited parts of any network. As malicious and automated cyber activities targeting endpoints increase, organizations that rely solely on traditional endpoint protection methods are left struggling to protect themselves against attackers who easily exploit zero-day vulnerabilities and launch a barrage ransomware attacks.
-
17
ManageEngine Patch Manager Plus
ManageEngine
$245 per year 1 RatingAutomate the entire patching process with Patch Manager Plus to keep all your production businesses current. Patch Manager Plus is available as both cloud-based software and on-premise software. It features features such as automatic scheduled patch deployments, scanning for missing patches, approval testing, patch tracking, patch compliance, reporting, and patch tracking. Patch Manager Plus allows users to create detailed audit and compliance reports. -
18
DNSFilter is a cloud-based DNS security platform designed to protect users from malicious websites, phishing attacks, and inappropriate content in real time. Using its AI-powered Webshrinker technology, it continuously analyzes and categorizes web domains to ensure up-to-date threat protection. The solution offers flexible deployment, including agentless configurations and dedicated clients for various operating systems, making it ideal for both on-premise and remote environments. With detailed reporting, customizable filtering policies, and compliance support for regulations like CIPA, DNSFilter caters to industries such as education, healthcare, and enterprise security. Its global Anycast network enhances speed and reliability, providing seamless protection without compromising browsing performance.
-
19
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
20
Webroot DNS Protection
Webroot
1 RatingProtective filtering to increase security, visibility, privacy, and control. Maximize safety, minimize risks, and maximize productivity while surfing the internet. Businesses today need to have visible, secure, private, manageable, and visible control of internet traffic. The current domain name system (DNS), simply resolves internet requests via a global network of servers. These servers then translate those requests into unique Internet Protocol (IP), addresses. This vital service was not designed to be secure and there are many DNS vulnerabilities and exploits. Protective DNS services like Webroot®, DNS Protection allow organizations to manage their networks and ensure that they have the visibility, security, privacy, and visibility they need to protect their IT infrastructure and users. This includes remote workers. Its primary goal is to provide a secure, private, resilient, and manageable internet connection. Automated filtering uses Webroot BrightCloud® Internet Threat Intelligence in order to block requests. -
21
Lansweeper can help you discover your IT and build your central IT Asset System of Record. You can easily audit all assets within your company's network using the Lansweeper Deepscan IP scanner engine. You can create a network inventory that includes all hardware, software, and users. Scan Windows, Linux, or Mac devices. Keep track of all your licenses, serial numbers, and warranties from major brands such as Dell, IBM and HP. Detect Unauthorized Local Admins and unify Office 365/AD User Data. Get the netbios domain, check for Windows Updates and more. You can discover all assets in your IT environment you didn't know about and take full control over your network. Get your free trial to get started with IT asset management.
-
22
VNC Connect
RealVNC
$40 per user per year 1 RatingVNC®, Connect is screen-sharing software that allows you to connect to any remote computer around the world, view its screen in real time, and take control of the system as if you were sitting right in front. -
23
Jamf Connect
Jamf
$2 per user per month 1 RatingOrganizations need to be able manage and secure mobile employees and their company information without having to bind to Active Directory. Jamf Connect allows users to unbox their Macs, turn them on, and then access all their corporate applications by signing in with one set of cloud-identity credentials. Learn how cloud identity is changing Mac security, and the crucial role Jamf Connect plays in facilitating the process. This overview will show you how Jamf Connect allows users to be provisioned from a cloud identity service in an Apple provisioning workflow. It also includes multi-factor authentication. An identity management solution can save you time, money, and resources. Businesses must consider a new approach to identity management as part of their enterprise strategy, in order to keep up with changing security and deployment requirements. -
24
CylanceENDPOINT
BlackBerry
$29 per year 1 RatingSince more than a decade, Cylance AI has been used by businesses and governments all over the world to stop zero-day attacks, both current and future, with accuracy that is validated. Now it incorporates the intelligence generated by generative AI. Our generative AI model, Cylance®, is trained on BlackBerry's award winning cyber threat intelligence. It helps you accomplish more with less. It uses private LLMs to enhance privacy and accuracy, and to proactively anticipate your needs and provide expert advice. This feature is included with CylanceENDPOINTTM and provides security analysts with expert guidance at lightning speed. The result is faster investigations and efficient resolutions of potential security threats. -
25
Splunk Cloud Platform
Splunk
1 RatingSplunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance. -
26
Qualys VMDR
Qualys
1 RatingThe industry's most flexible, extensible and scalable solution for vulnerability management. Qualys' VMDR is fully cloud-based and provides global visibility into your IT assets and how to protect them. Enterprises are empowered with visibility into cyber risk exposure and can use it to prioritize assets, vulnerabilities, or groups of assets according to business risk. Security teams can take steps to reduce risk. This helps businesses measure their true risk and track the progress of risk reduction. You can identify, assess, prioritize, patch and fix critical vulnerabilities in real-time across your global hybrid IT, OT and IoT landscape. Qualys TruRisk™, which measures risk across assets, vulnerabilities, and groups, can help you organization prevent risk exposure and track the risk reduction over time. -
27
VMware Carbon Black EDR
Broadcom
1 RatingThreat hunting and incident response solutions provide continuous visibility in offline, disconnected, and air-gapped environments using threat intelligence and customizable detections. You can't stop something you don't see. Investigative tasks that normally take days or weeks can now be completed in minutes. VMware Carbon Black®, EDR™, collects and visualizes detailed information about endpoint events. This gives security professionals unprecedented visibility into their environments. Never hunt the same threat twice. VMware Carbon Black EDR is a combination of custom and cloud-delivered threat intelligence, automated watchlists, and integrations with other security tools to scale your hunt across large enterprises. No more need to reimagine your environment. In less than an hour, an attacker can compromise your environment. VMware Carbon Black EDR gives VMware the ability to respond and correct in real-time from anywhere in the world. -
28
More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
-
29
Google Cloud Platform
Google
Free ($300 in free credits) 25 RatingsGoogle Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging. -
30
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
31
Malwarebytes
Malwarebytes
$47.22 per user per year 12 RatingsCyberthreats are eradicated Restores confidence. Traditional antivirus is no longer sufficient. Malwarebytes eliminates all new threats before other antivirus systems even know they exist. Malwarebytes blocks viruses, malware, malicious sites, ransomware, hackers, and other threats that traditional antivirus can't stop. Organizations of all sizes use our cutting-edge protection and response strategies. Traditional antivirus is slow to respond to new threats. It's also "dumb". We use layers like anomaly detection (an artificial intelligence type), behavior matching, application hardening, and behavior matching to destroy malware that has never been seen before. It's not like traditional antivirus. -
32
Dropbox
Dropbox
$12.50 per month per user 225 RatingsDropbox Business is more than secure file storage. It's a smart workspace that brings together teams, tools, content, and other resources. You can create, store, and share cloud content using Google Docs, Sheets and Slides, Microsoft Office files and Dropbox Paper. Dropbox Spaces allows you to combine cloud content and files, so your PowerPoints can live alongside your Trello boards, Google Docs, and other tools. Access your team's work easily from any computer, mobile device or web browser. Connect tools such as Zoom and Slack to keep your team's files and conversations in one place. Intelligently suggested folders and files keep your team one step ahead. They will have the content they need when they need it. Dropbox offers a secure, distributed infrastructure with admin tools to control and visibility. Keep your company's data safe with Dropbox. -
33
Addigy
Addigy
$5 to $6 per device 10 RatingsAddigy makes it easy for IT admins to remotely manage and secure Apple devices using our SaaS solution. Addigy is the only multi-tenant Apple device management and MDM platform for managing macOS, iOS, iPadOS, and tvOS devices across multiple clients and locations. Configure, patch, and maintain devices in the way that you prefer. Gain operational efficiencies and time-savings. Ensure your managed networks are secure from cyberthreats. Maintain end-user privacy. Connect to your favorite IT tools with seamless integrations. Inventory and track every device in your network, regardless of its location. Instantly connect to devices remotely with a single click. Apply and enforce policies to maintain always-on compliance. Deploy new devices in less than 5 minutes. And so much more. Addigy offers simple month-to-month or annual pricing with no contracts + access to every Addigy feature with no additional or hidden costs. -
34
The cloud is your opportunity to harness the power of the internet. Unified data protection and management empower your business. SaaS data protection service to protect and manage enterprise backups across all data centers, cloud, and endpoint workloads. Druva Cloud Platform, which is delivered as-a-service on AWS, is infinitely scalable and can be customized to meet your business's needs. Druva's SaaS-based data protection platform can help you eliminate the complexity and cost of solutions that aren’t designed for the cloud. You can save time and money while still getting a data protection solution that is secure, scalable, and always available. As-a-service means that you can forget about on-premises infrastructure, hardware refresh cycles, and time-consuming software maintenance. Cloud-based subscriptions can be upgraded instantly without affecting your backup settings. There is no need to purchase or install new software or appliances.
-
35
Microsoft Office 2021
Microsoft
$249.99 2 RatingsOffice 2021 is an on-premises version for Word, Excel PowerPoint, Project Visio and Access. It's available to customers who aren’t ready to move to the cloud. With tools like PowerPoint Morph and new chart types in Excel and improved inking between apps, you can create presentations, data models and reports. Focus Mode in Word, Focused Inbox and travel summary cards in Outlook make it easier to manage your time, emails, and contacts. -
36
Freshservice is the right choice if you are looking for an IT service desk solution with simplicity. Freshservice is an easy-to-use ITIL service desk from Freshworks that helps businesses modernize IT and other business functions without the complexity and cost. Freshservice provides everything teams need to manage proactive IT services, including asset management, ticketing, configuration management, enhanced impact analysis, robust incident management functions, and more.
-
37
Microsoft Azure
Microsoft
21 RatingsMicrosoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust. -
38
Secure your data, devices, applications, and information with an unbreakable connection to all endpoints -- on and off your network. Absolute gives you an unrivalled line-of sight to your devices and data. Self-healing connections keep critical applications like SCCM, VPN and antivirus up-to-date and healthy. Even if sensitive data is accessed from outside your network, it remains secure. With a large library of custom workflows that can be automated and customized, you have complete control over every endpoint. No scripting is required. Pre-built commands reduce the workload on IT and security personnel by enabling them to manage device configurations, enforce Windows updates, and resolve issues. These commands can be used for everything from helpdesk tickets to security event resolution. Absolute is the only endpoint protection solution that can be installed by every major PC manufacturer. It is embedded in the BIOS on over half a million devices. You just need to activate it.
-
39
N-able N‑central
N-able
7 RatingsJoin thousands of IT professionals and MSPs who use N-able™ Ncentral® remotely to monitor and manage complex networks and devices. These are the key features: * Monitor almost all devices, including Windows, Linux, and macOS * Get complete visibility across your network and cloud services without the use of additional network monitoring software * Automated patch management policies can be created to ensure that devices are always up-to-date * Automate your workflow with drag and drop scripting in automation manager. No need to write code! * Remote support across platforms and devices with the integrated Take Control feature * Use N-able MSP manager to manage tickets and billing. * Secure your data with integrated backup, EDR and AV. * Available on-premises and hosted cloud solutions to suit your business needs -
40
ServiceNow
ServiceNow
$100 per month 1 RatingDigitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise. -
41
SonicWall Capture Client
SonicWall
1 RatingSonicWall Capture Client, a unified client platform, delivers multiple endpoint protection capabilities including next-generation malware defense and application vulnerability intelligence. It uses cloud sandbox file testing, comprehensive reports, and enforcement to provide endpoint protection. It provides client security assurance, as well as easy-to-use, actionable intelligence and reporting. Examine files that may be waiting to be activated in a cloud Sandbox. Use cloud intelligence and dynamic white/blacklisting. Advanced static analysis is used to identify threats during downloading. SonicWall's verdict database provides shared threat intelligence. To see where threats originated and went, view threat visualization maps. You can quickly assess your security posture. Take a look at all your applications to see which ones are most vulnerable. -
42
Transform the way IT protects laptops and desktops, smartphones, tablet, wearables, and the Internet of Things. IBM MaaS360® protects devices, apps, content and data so you can rapidly scale your remote workforce and bring-your-own-device (BYOD) initiatives while building a zero trust strategy with modern device management. You can also use artificial intelligence (AI), contextual analytics, to gain actionable insights. Rapid deployment across leading operating systems and devices allows you to manage and protect your remote workers in minutes. Upgrade to the paid version to start using the full product. All settings and device enrollments will be retained. Our product support team will be available to you 24x7. Integrate MaaS360 into your existing technologies, and use its endpoint security built-in to keep your total costs of ownership where you desire.
-
43
Automox
Automox
$3.00Automox is cloud-native and available globally. It enforces OS and third-party patch management, security configurations and custom scripting across Windows and Mac from a single console. IT and SecOps are able to quickly gain control of and share visibility over virtual, on-prem and remote endpoints without having to deploy expensive infrastructure. -
44
Autotask PSA
Datto, a Kaseya company
$50 per user per monthDatto's Autotask Professional Services Automation is a cloud-based PSA platform that provides a single view of the entire business. It allows MSPs to centralize their business operations and make data-driven business decisions to improve service, productivity, and profitability. Autotask PSA allows MSPs manage all aspects of their business with maximum efficiency. It integrates all the essential tools needed to run a managed service business. Autotask PSA centralizes operations, provides instant understanding via customizable dashboards and widgets that allow you to make data-driven business decisions. Autotask PSA doesn't require any maintenance or testing. It has a proven track record of consistently delivering unmatched security and 99.99% uptime. PSA is the central hub of any MSP, providing a single view of the business and increasing efficiency by automating workflows. -
45
ManageEngine Vulnerability Manager Plus
ManageEngine
$695 per user per yearSoftware for enterprise vulnerability management. Vulnerability manager Plus is an integrated threat management software that provides comprehensive vulnerability scanning, assessment and remediation across all endpoints within your network from a single console. You can scan and find vulnerable areas on all your remote and local office endpoints, as well as roaming devices. Use attacker-based analytics to identify areas most likely to be exploited. Reduce the risk of security loopholes being exploited in your network and prevent new ones from developing. Prioritize vulnerabilities based upon their vulnerability, severity, age, affected systems count, and the availability of a fix. You can download, test, and automatically deploy patches to Windows, Mac, Linux and more than 250 third-party apps with an integrated patching module, all without additional cost. -
46
Active Directory
Microsoft
$1 per user per monthActive Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration. -
47
Watchman Monitoring
Watchman Monitoring
$75 per monthWatchman Monitoring (SaaS) is a software-as-a-service (SaaS), offering that monitors the health and performance of Mac, Linux, or Windows computers. Our monitoring system gives hourly reports on health issues like disk I/O errors and backup functionality. The two main components of Watchman Monitoring are the monitoring agent and the monitoring server. One of several convenient and quick methods to install the monitoring agent is available. Once the agent is installed, it runs hourly and reports its findings back to the Watchman Monitoring Server. The Watchman Monitoring Server gathers reports from monitored computers and notifies subscribers when issues are discovered. The server dashboard provides subscribers with an overview of all monitored computers and access to powerful search, inventory, and demographic information. -
48
Jamf Protect
Jamf Protect
$5 per user, per monthEndpoint protection designed exclusively for Mac. Jamf Protect protects MacOS from malware. It can detect and remove Mac-specific threats and monitor endpoints to ensure compliance. Jamf Protect is designed for Mac. Jamf Protect shines a spotlight on Apple, assisting security and IT teams with Macs in organizations of all sizes. Tools that are familiar with the Mac platform will help you scale your teams. Jamf Protect helps you maintain Mac endpoint compliance. It also addresses anti-virus needs by preventing macOS-specific malware. It can also control Mac applications within the organization. Jamf Protect has minimal impact on the device and end-user experience. Jamf Protect provides comprehensive information about Mac-specific malware to help you prevent it from running on your device and quarantine them for further analysis. Jamf Protect can limit the execution of unwanted software to protect your computer. Detect. Protect your Mac from sophisticated attacks -
49
Rapid7 Managed Threat Complete
Rapid7
$17 per asset per monthManaged Threat Complete combines comprehensive risk and threat coverage in a single subscription. Managed Detection and Response Services & Solutions. Multiple advanced detection techniques, including proprietary threat information, behavioral analytics and Network Traffic Analysis as well as human threat hunting, find evil in your environment. Our team will immediately contain user and endpoint risks to cut off the attacker. The detailed findings reports will guide you in taking additional remediation and mitigating actions tailored to your program. Let our team be your force multiplier. Experts in detection and response, from your security advisor to your SOC, can help you strengthen your defenses. Take immediate action. It's not as easy as purchasing and implementing the newest security products to set up a detection and response program. -
50
TeamViewer Frontline
TeamViewer
TeamViewer Frontline is an enterprise productivity platform with fully integrated industrial AR solutions. Frontline uses the power of smart glasses and mobile devices to help your on-site staff work efficiently: With our solutions, your workforce can visualize data, receive step-by-step instructions, solve specific issues, or get help from an expert, all while keeping their hands free. Frontline is about connecting your workforce with the information and expertise they need to do their job right.