Absolute Secure EndpointAbsolute Software
|
Trusted Knight Protector EndpointTrusted Knight Corporation
|
|||||
Related Products
|
||||||
About
Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it.
|
About
Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Endpoint further protects internal and external endpoints by actively disabling the keylogging and data-stealing capabilities of the malware, preventing the theft of critical corporate or user credentials and other sensitive information that is used by cybercriminals to commit fraud or gain privileged access to the corporate network. Protector Endpoint was designed to provide a solution-focused on defeating crimeware attacks. Crimeware has become so sophisticated that traditional detect-and-remove strategies of anti-virus are no longer a viable approach and conventional endpoint protection products are often clunky and hard to manage. Instead of attempting to detect and remove crimeware, Protector Endpoint disables crimeware functions to eliminate its ability to collect information. Without browser-entered data, cybercriminals are unable to perpetrate crime.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Organizations that want to have complete control of their endpoints
|
Audience
Endpoint Protection solution for IT teams
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationAbsolute Software
Founded: 1993
Canada
www.absolute.com
|
Company InformationTrusted Knight Corporation
Founded: 2010
United States
www.trustedknight.com/protector-endpoint-protection/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
|
|||||
Categories |
Categories |
|||||
Integrations
Axonius
BuilderX
Eway
Lucidum
ThreatAware
|
||||||
|
|