About
Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it.
|
About
Kitecyber provides a hyper-converged endpoint security solution that provides comprehensive security and meets compliance requirements of organizations for SOC2, ISO27001, HIPAA, PCI-DSS, GDPR etc.
Our unique endpoint-based approach eliminates the need for cloud gateways or local appliances. The hyper-converged offering includes the following protections:
1) Secure Web Gateway to safeguard internet access
2) Eliminate Shadow SaaS and Shadow AI)
3) Anti-Phishing measures to protect user credentials
4) Zero Trust Private Access (Next gen VPN)
5) Data Loss Prevention across all devices—Mac, Windows, and mobile
6) Device Management for Mac, Windows, and mobile for all employees, BYOD devices and 3rd party contractors
7) Continuous Compliance Monitoring
8) User Behavior Analysis to identify potential risks
|
About
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices.
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
|
About
Understand and govern your web access to protect users from zero-day threats and enforce data protection everywhere with a mature, web security solution and an integrated component of Skyhigh Security SSE. Skyhigh Security Secure Web Gateway (SWG) is the intelligent, cloud-native web security solution that connects and secures your workforce from malicious websites and cloud apps—from anywhere, any application, and any device. Connects users seamlessly and without disruption through Hyperscale Service Edge with cloud-native web security that operates with blazing fast ultra-low latency and 99.999% uptime. Protects users, data, and applications to minimize cloud and web attack surface through integrated remote browser isolation and real-time insights to Cloud Security Advisor that generates automatic risk-scoring. Controls access to all cloud services and protects against the risk of data loss from a single console using our robust DLP engine with integrated CASB functionality.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Organizations that want to have complete control of their endpoints
|
Audience
Small to Medium Business Organizations, Enterprises
|
Audience
Designed for those seeking simplified total endpoint management: Inventory, service desk, asset management, license compliance, security, mobility, and more. 50 devices? 50,000? KACE does that.
|
Audience
Enterprise organizations looking for a secure web gateway solution
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and VideosNo images available
|
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
As low as $3/mo/device
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationAbsolute Software
Founded: 1993
Canada
www.absolute.com
|
Company InformationKitecyber
Founded: 2022
United States
www.kitecyber.com
|
Company InformationQuest Software
Founded: 2001
United States
www.quest.com/kace/
|
Company InformationSkyhigh Security
Founded: 2022
United States
www.skyhighsecurity.com/en-us/products/secure-web-gateway.html
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|
||||
|
|
|
|||||
|
|
|
|
||||
|
|
|
|
|
|||
Categories |
Categories |
Categories |
Categories |
|||
Change Management Features
Approval Workflow
Audit Trail
Automated Notifications
Change Calendar
Change Planning
Compliance Management
Prioritization
Release Management
Task Management
Tracking & Reporting
Training Management
Disk Imaging Features
Backup Scheduling
Bare-Metal Restore
Compression
Differential Backup
Disk Cloning
Encryption
Image Deployment
Incremental Backup
Web Access / Restoration
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Help Desk Features
Alerts / Escalation
Automated Routing
Community Forums
Customizable Branding
Document Storage
Email Integration
Incident Management
Interaction Tracking
IT Asset Management
Knowledge Base
Known Issue Management
Live Chat
Multi-Channel Communication
Multiple Brands / Products
Network Monitoring
Real-time Chat
Self Service Portal
Service Level Agreement (SLA) Management
Ticket Management
IT Asset Management Features
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
IT Service Features
Contract Management
Incident Management
IT Asset Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
ITSM Features
Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal
IoT Features
Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization
License Management Features
Automatic SKU Recognition
Central LM Server
Copy Protection
History Tracking
Node Management
Online Activation
Portable License
Sarbanes-Oxley Compliance
Timing Rights
Trial License
Mobile Device Management (MDM) Features
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Patch Management Features
Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning
Reporting Features
Customizable Dashboard
Data Source Connectors
Drag & Drop
Drill Down
Email Reports
Financial Reports
Forecasting
Marketing Reports
OLAP
Report Export
Sales Reports
Scheduled / Automated Reports
System Monitoring Features
Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management
|
||||||
Integrations
Apple Business Essentials
Axonius
Azure Marketplace
BuilderX
Eway
Google
Lucidum
Microsoft 365
Microsoft Authenticator
Microsoft Azure
|
Integrations
Apple Business Essentials
Axonius
Azure Marketplace
BuilderX
Eway
Google
Lucidum
Microsoft 365
Microsoft Authenticator
Microsoft Azure
|
Integrations
Apple Business Essentials
Axonius
Azure Marketplace
BuilderX
Eway
Google
Lucidum
Microsoft 365
Microsoft Authenticator
Microsoft Azure
|
Integrations
Apple Business Essentials
Axonius
Azure Marketplace
BuilderX
Eway
Google
Lucidum
Microsoft 365
Microsoft Authenticator
Microsoft Azure
|
|||
|
|
|
|
|