Browse Software
List Your Product
Loading...
Showing 1 - 20 of 30 Products
Parallels Mac Management for Microsoft SCCM logo

Parallels Mac Management for Microsoft SCCM

Parallels Mac Management for Microsoft SCCM 4.4 Based on 7 Ratings

Parallels Mac Management is a Microsoft certified plug-in for SCCM extending its management capabilities to Macs. It allows IT administrators to discover, enroll and inventory Macs into S CCM. Organizations can use the same tools, processes and people to manage Macs via SCCC.

Read More
Symantec VDI Security - Endpoint Protection For VDI logo

Symantec VDI Security - Endpoint Protection For VDI

End-user Endpoint Security 4.5 Based on 1 Ratings

Symantec Endpoint Protection for VDI shifts the core threat protection processes to a dedicated security virtual appliance.

Read More
Symantec Client Management Suite logo

Symantec Client Management Suite

Client Management Suite 4.2 Based on 6 Ratings

Symantec Client Management Suite 8.0 brings significant new functionality and enhancements to this already feature rich solution. It automates time-consuming and redundant tasks for deploying, managing, patching, and securing desktops and laptops. Key Deployment features include: Scalable, enterprise deployment for Windows, Mac, and Linux. Support for 50+ non-Microsoft applications.

Read More
ServerProtect for Windows/Netware logo

ServerProtect for Windows/Netware

Enterprise Server Malware Protection | Trend Micro 4.3 Based on 3 Ratings

The industry's most reliable virus, spyware, and rootkit protection with simplified and automated security operations on servers.

Read More
McAfee Application Control logo

McAfee Application Control

McAfee Application and Change Control | McAfee Products Write a Review

McAfee Application and Change Control provides comprehensive protection against uninvited changes to or unauthorized control of applications, endpoints, servers, and fixed function devices.

Read More
Endpoint Application Control logo

Endpoint Application Control

Apex One™ Endpoint Protection & Security | Trend Micro 4.3 Based on 3 Ratings

Get Apex One™ Endpoint Protection and Security with the broadest range of capabilities, including high fidelity machine learning and advanced ransomware protection.

Read More
Trend Micro Smart Protection logo

Trend Micro Smart Protection

Enterprise & Gateway Suites | Trend Micro 4.1 Based on 31 Ratings

Our endpoint and gateway suites eliminate security gaps across any user activity on any endpoint through connected, layered security techniques.

Read More
Avast Business CloudCare logo

Avast Business CloudCare

CloudCare - layered IT security platform | Avast Business 4 Based on 21 Ratings

CloudCare is easy to implement and manage - for MSPs that want the highest level of protection for their customers.

Read More
SolarWinds User Device Tracker logo

SolarWinds User Device Tracker

Network User Device Tracking Software | SolarWinds 4.3 Based on 4 Ratings

Who’s connected to your network? Track users and endpoint devices by MAC and IP address, and verify how switches and ports are being used with SolarWinds User Device Tracker.

Read More
LogMeIn Central logo

LogMeIn Central

Remote Computer Management Software | LogMeIn Central 4.2 Based on 173 Ratings

Access and manage remote devices with Central our web-based console. Deploy remote access, keep systems up-to-date and automate routine tasks with ease.

Read More
Micro Focus ZENworks Endpoint Security Management logo

Micro Focus ZENworks Endpoint Security Management

ZENworks Endpoint Management Tools | Micro Focus 4 Based on 1 Ratings

ZENworks Endpoint Management tools enable you to easily track, manage, and secure your endpoint devices.

Read More
Panda Adaptive Defense logo

Panda Adaptive Defense

Integrated EPP, EDR, 100% Attestation service 4.3 Based on 84 Ratings

Panda Security, a WatchGuard Brand, has been providing advanced cybersecurity for over 30 years. The AD360 platform touts a unique zero-trust security service that certifies the legitimacy and safety of all running applications.

Read More
Aruba ClearPass logo

Aruba ClearPass

Secure Network Access Control (NAC) | Aruba 4.4 Based on 23 Ratings

Get industry-leading device network access visibility and control for enterprise. Secure both your wired and wireless network.

Read More
Lookout logo

Lookout

Lookout | The Leader in securing the Cloud-First World 4.1 Based on 47 Ratings

Lookout EDR is delivered on the only platform built for mobile from the ground up

Read More
BMC Helix Client Management logo

BMC Helix Client Management

BMC Helix Client Management - BMC Software 4 Based on 12 Ratings

BMC Helix Client Management automates endpoint management, lowers cost and security risk and maintains compliance for optimal service management.

Read More
Veritas Desktop and Laptop Option logo

Veritas Desktop and Laptop Option

Desktop and Laptop Option Write a Review

Desktop and Laptop Option offers automated file backup and recovery for Windows and Mac for any organizational size and requirements.

Read More
BullGuard Small Office Security logo

BullGuard Small Office Security

BullGuard Small Office Security Write a Review

Powerful, simple and reliable cybersecurity for small offices. Free One Month Trial

Read More
Jamf Protect logo

Jamf Protect

Jamf Protect | Products 4.5 Based on 1 Ratings

Jamf Protect is an endpoint security solution purpose - built for macOS . Jamf Protect leverages on - device analysis to proactively block, isolate or remediate Mac security threats.

Read More
VMware Carbon Black App Control logo

VMware Carbon Black App Control

App Control | VMware Carbon Black 4.6 Based on 42 Ratings

Cb Protection is the strongest security possible for data centers and critical systems. It reduces attack surface with a single security agent and reduces downtime. Cb Protection helps organizations achieve continuous compliance across every regulatory framework.

Read More
Ivanti Security Suite logo

Ivanti Security Suite

Ivanti Security Controls | Ivanti 4.3 Based on 16 Ratings

Ivanti Endpoint Security for Endpoint Manager prevents, detects, and remediates even the most sophisticated ransomware and other threats. Multi-layered defenses automate discovery, inventory, patch management, and application and device control.

Read More

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed