Browse Software
List Your Product
Loading...
Showing 1 - 20 of 34 Products
Parallels Mac Management for Microsoft SCCM logo

Parallels Mac Management for Microsoft SCCM

Parallels Mac Management for Microsoft SCCM Write a Review
Visit Website

Parallels Mac Management is a Microsoft certified plug-in for SCCM extending its management capabilities to Macs. It allows IT administrators to discover, enroll and inventory Macs into S CCM. Organizations can use the same tools, processes and people to manage Macs via SCCC.

Visit Website
Symantec VDI Security - Endpoint Protection For VDI logo

Symantec VDI Security - Endpoint Protection For VDI

End-user Endpoint Security Write a Review
Visit Website

Symantec Endpoint Protection for VDI shifts the core threat protection processes to a dedicated security virtual appliance.

Visit Website
Symantec Client Management Suite logo

Symantec Client Management Suite

Client Management Suite Write a Review
Visit Website

Symantec Client Management Suite 8.0 brings significant new functionality and enhancements to this already feature rich solution. It automates time-consuming and redundant tasks for deploying, managing, patching, and securing desktops and laptops. Key Deployment features include: Scalable, enterprise deployment for Windows, Mac, and Linux. Support for 50+ non-Microsoft applications.

Read more
Visit Website
ServerProtect for Windows/Netware logo

ServerProtect for Windows/Netware

Enterprise Server Malware Protection | Trend Micro Write a Review
Visit Website

The industry's most reliable virus, spyware, and rootkit protection with simplified and automated security operations on servers.

Visit Website
McAfee Application Control logo

McAfee Application Control

McAfee Application and Change Control | McAfee Products Write a Review
Visit Website

McAfee Application and Change Control provides comprehensive protection against uninvited changes to or unauthorized control of applications, endpoints, servers, and fixed function devices.

Visit Website
Endpoint Application Control logo

Endpoint Application Control

Apex Oneâ„¢ Endpoint Protection & Security | Trend Micro Write a Review
Visit Website

Get Apex Oneâ„¢ Endpoint Protection and Security with the broadest range of capabilities, including high fidelity machine learning and advanced ransomware protection.

Visit Website
Trend Micro Smart Protection logo

Trend Micro Smart Protection

Enterprise & Gateway Suites | Trend Micro Write a Review
Visit Website

Our endpoint and gateway suites eliminate security gaps across any user activity on any endpoint through connected, layered security techniques.

Visit Website
Avast Business CloudCare logo

Avast Business CloudCare

CloudCare - layered IT security platform | Avast Business Write a Review
Visit Website

CloudCare is easy to implement and manage - for MSPs that want the highest level of protection for their customers.

Visit Website
SolarWinds User Device Tracker logo

SolarWinds User Device Tracker

Network User Device Tracking Software | SolarWinds Write a Review
Visit Website

Who’s connected to your network? Track users and endpoint devices by MAC and IP address, and verify how switches and ports are being used with SolarWinds User Device Tracker.

Visit Website
Acronis Cyber Protect logo

Acronis Cyber Protect

Unite Backup and Cybersecurity for Unmatched Resilience Write a Review
Visit Website

Acronis Cyber Protect seamlessly integrates secure backup with advanced cybersecurity to deliver unparalleled cyber resilience. By incorporating endpoint detection and response (EDR) and automated URL filtering, Acronis ensures peace of mind and mitigates costly downtime. Keep team operational with remote endpoint monitoring, vulnerability assessments, patch management, and more. Swiftly identify and resolve protection issues while automating routine tasks to boost productivity. Effortlessly scale the protection and streamline administration with centralized management of all cybersecurity and backup processes. Reduce costs by consolidating the backup, disaster recovery, and security vendors under one robust platform. Detect and neutralize threats before they disrupt operations, utilizing informed response and comprehensive security measures. With Acronis, defeat ransomware through immutability and backup scanning technologies, ensuring data remains uncompromised. Whether managing backups or securing endpoints, Acronis Cyber Protect is an supportive partner in maintaining seamless operations and ensuring robust cyber resilience.

Read more
Visit Website
LogMeIn Central logo

LogMeIn Central

Remote Computer Management Software | LogMeIn Central Write a Review
Visit Website

Access and manage remote devices with Central our web-based console. Deploy remote access, keep systems up-to-date and automate routine tasks with ease.

Visit Website
Micro Focus ZENworks Endpoint Security Management logo

Micro Focus ZENworks Endpoint Security Management

ZENworks Endpoint Management Tools | Micro Focus Write a Review
Visit Website

ZENworks Endpoint Management tools enable you to easily track, manage, and secure your endpoint devices.

Visit Website
Panda Adaptive Defense logo

Panda Adaptive Defense

Integrated EPP, EDR, 100% Attestation service Write a Review
Visit Website

Panda Security, a WatchGuard Brand, has been providing advanced cybersecurity for over 30 years. The AD360 platform touts a unique zero-trust security service that certifies the legitimacy and safety of all running applications.

Visit Website
Aruba ClearPass logo

Aruba ClearPass

Secure Network Access Control (NAC) | Aruba Write a Review
Visit Website

Get industry-leading device network access visibility and control for enterprise. Secure both your wired and wireless network.

Visit Website
Lookout logo

Lookout

Lookout | The Leader in securing the Cloud-First World Write a Review
Visit Website

Lookout EDR is delivered on the only platform built for mobile from the ground up

Visit Website
BMC Helix Client Management logo

BMC Helix Client Management

BMC Helix Client Management - BMC Software Write a Review
Visit Website

BMC Helix Client Management automates endpoint management, lowers cost and security risk and maintains compliance for optimal service management.

Visit Website
Veritas Desktop and Laptop Option logo

Veritas Desktop and Laptop Option

Desktop and Laptop Option Write a Review
Visit Website

Desktop and Laptop Option offers automated file backup and recovery for Windows and Mac for any organizational size and requirements.

Visit Website
BullGuard Small Office Security logo

BullGuard Small Office Security

BullGuard Small Office Security Write a Review
Visit Website

Powerful, simple and reliable cybersecurity for small offices. Free One Month Trial

Visit Website
Jamf Protect logo

Jamf Protect

Jamf Protect | Products Write a Review
Visit Website

Jamf Protect is an endpoint security solution purpose - built for macOS . Jamf Protect leverages on - device analysis to proactively block, isolate or remediate Mac security threats.

Visit Website
VMware Carbon Black App Control logo

VMware Carbon Black App Control

App Control | VMware Carbon Black Write a Review
Visit Website

Cb Protection is the strongest security possible for data centers and critical systems. It reduces attack surface with a single security agent and reduces downtime. Cb Protection helps organizations achieve continuous compliance across every regulatory framework.

Visit Website

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed