Alternatives to Heimdal Application Control
Compare Heimdal Application Control alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Heimdal Application Control in 2026. Compare features, ratings, user reviews, pricing, and more from Heimdal Application Control competitors and alternatives in order to make an informed decision for your business.
-
1
ManageEngine Endpoint Central
ManageEngine
ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security. -
2
ThreatLocker
ThreatLocker
The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com. -
3
Airlock Digital
Airlock Digital
Airlock Digital is an application control solution that enforces a Deny by Default security posture. It enables organizations to define trusted applications, scripts, libraries, and processes at a granular level using file hash, path, publisher, or parent process. Only those explicitly defined as trusted are allowed to execute. The platform supports Windows, macOS, and Linux systems, including legacy operating systems and operational technology (OT) environments. Airlock Digital includes allowlisting and blocklisting capabilities, integrated file reputation checks via VirusTotal, and detailed logging for audit and compliance. Exception management is supported through features such as rule-based overrides and time-bound One-Time Passwords (OTPs). Centralized policy management allows consistent enforcement across large and distributed environments. The platform is available as an on-premises deployment, in the cloud, or as a managed hosted service. -
4
DriveLock
DriveLock
Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized policies, DriveLock ensures employees and endpoints access only what they need—following the golden rule of cybersecurity: ''never trust, always verify''. -
5
Securden Endpoint Privilege Manager
Securden
Securden Endpoint Privilege Manager (EPM) helps enterprises remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time basis, eliminating standing privileges while maintaining seamless operations. Enforce application control using allowlisting and blocklisting, enable on-demand and policy-based granular application elevation, and manage privileges even on offline endpoints. Capabilities include JIT local admin rights, application usage tracking, and local administrator group monitoring. Secure remote access supports IT helpdesk operations, while built-in controls help meet compliance requirements such as HIPAA, PCI-DSS, GDPR, and NERC-CIP. A highly scalable architecture and wide array of integrations make Securden EPM ideal for securing enterprise endpoints at scale. -
6
Securden Unified PAM
Securden
Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. The major modules of Securden Unified PAM are password management, privileged account management, secure remote access, application control, endpoint privilege management, privileged session management, and SSH key management. The platform supports compliance with NIS2, DORA, NIST, PCI-DSS, HIPAA, and ISO-IEC 27001. Installation typically takes only a few minutes, and a complete production-ready PAM can be achieved in less than a month with Securden Unified PAM. -
7
Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.Starting Price: $0/month
-
8
Esper
Esper
Esper powers exceptional Android and iOS device experiences by revolutionizing the way companies manage their device fleets. Through advanced capabilities, such as remote control & debugging, Pipelines for software deployment, Esper device SDK and APIs, Blueprints for dynamic configuration, and no-touch Seamless Provisioning, Esper provides a solution beyond standard MDM, into the modern era of DevOps for devices and beyond. Recognized as one of Deloitte’s Fast500 in 2023, Esper supports some of the world’s most innovative brands in retail, hospitality, logistics, healthcare, education, and more. Traditional mobile device management and mobility solutions (like MDMs, MAMs, EMMs, and UEMs) weren’t built for today’s growing, modern hardware fleets. That’s why Esper goes beyond device management with intelligent tooling and infrastructure for company-owned and managed devices, providing a single pane of glass for both Android and iOS devices.Starting Price: Free Trial -
9
Jamf Pro
Jamf
Formerly known as Casper Suite, Jamf Pro is an enterprise mobility management (EMM) tool for Apple macOS and iOS devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily: - Choose a zero-touch, hands-free experience or go hands-on through imaging. Either way, enroll devices and deploy them with ease. - Go beyond configuration profiles and use policies and scripts to customize devices for the optimal user experience. - Purchase apps in bulk and make them available automatically or through a Self Service catalog. - Manage device settings and configurations, restrict malicious software, and patch all of your Apple devices without user interaction. Jamf Pro works seamlessly with your existing IT services and technologies, including: Apple Business Manager, Active Directory, SSO/SAML, SCCM, APIs, Cisco ISE, Security Connector and Fast Lane, Conditional Access for Mac. -
10
Hexnode UEM
Mitsogo Inc
Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features such as automated device enrollment, geofencing, Remote Monitoring and Management, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more. -
11
Zscaler
Zscaler
Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential. -
12
Check Point Application Control
Check Point
Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups, to identify, block or limit the usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications, and more. Granular control of social networks, applications, and application features, identify, allow, block, or limit the usage. Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware. Integrated into Next Generation Firewalls enables consolidation of security controls decreasing costs. Only the right users and devices can access your protected assets. -
13
PolicyPak
Netwrix
The PolicyPak Platform gives organizations with different management and security requirements the flexibility to choose an edition right for them. In today's hybrid work environment, users access their desktops at the office, at home, traveling, through a kiosk, and virtually. Managing and securing these environments creates a challenge because not all management systems were designed for modern management scenarios. PolicyPak provides solutions that modernize and extend the power of your existing infrastructure. Using PolicyPak with your Active Directory simplifies how you manage and secure Active Directory joined computers with Microsoft Group Policy. Microsoft Group Policy is a powerful technology you rely upon day after day. But it needs a boost to meet your modern enterprise's management, security, reporting, and automation needs. -
14
Application Control Plus is an enterprise solution that leverages application control and privilege management features to fortify endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses. Ensure complete endpoint security by creating whitelists of applications that you trust, and keep all untrusted applications out of your network. Protect your risky legacy OS machines by deploying application control policies that prevent vulnerable applications without a patch from running. Augment the security of customer-facing systems such as point-of-sale or fixed-function machines by simulating an environment under lockdown using policies run in Strict Mode.
-
15
Ivanti Application Control
Ivanti
Application Control combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via helpdesk systems lighten the load for IT staff while providing users a streamlined experience. With Application Control you can manage user privileges and policy automatically, at a granular level, and allow for optional self-elevation when exceptions occur. Give your users access to what they need quickly, with seamless app access that relies on granular, context-aware policies. Create flexible, preventive policies to help ensure only known and trusted applications can execute on a system. Enable automated requests for emergency privilege elevation or application access via integrated IT helpdesk system. -
16
Delinea Privilege Manager
Delinea
Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. You can prevent malware from exploiting applications by removing local administrative rights from endpoints and implementing policy-based application controls. Privilege Manager prevents malware attacks without causing any end user friction that slows productivity. Available both on-premises and in the cloud, enterprises and fast-growing teams can manage hundreds of thousands of machines through Privilege Manager. With built-in application control, real-time threat intelligence, and actionable reporting, it is easier than ever to manage endpoints and demonstrate compliance with least privilege policies to executives and auditors. -
17
BeyondTrust Endpoint Privilege Management
BeyondTrust
Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance. -
18
Carbon Black App Control
Broadcom
Carbon Black App Control is a robust application control solution designed to prevent malware, ransomware, and other unauthorized applications from running on endpoints. It enables organizations to enforce security policies by only allowing trusted applications to execute, reducing the risk of cyber threats and improving endpoint security. With its centralized management console, Carbon Black App Control provides visibility and control over the applications running in an organization, ensuring that all software complies with security policies. This solution offers real-time protection and detailed reporting capabilities, allowing IT teams to easily detect and respond to security incidents. -
19
Delinea Cloud Access Controller
Delinea
Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications. -
20
baramundi Management Suite
baramundi Software USA
Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.Starting Price: $5000.00/one-time -
21
Trellix Application Control
Trellix
Advanced persistent threats (APTs) to control points, servers, and fixed devices via remote attack or social engineering make it increasingly difficult to protect your business. Trellix Application Control helps you outsmart cybercriminals and keeps your business secure and productive. Ensure that only trusted applications run on devices, servers, and desktops. As users demand more flexibility to use applications in their social and cloud-enabled business world, Trellix Application Control gives organizations options to maximize their whitelisting strategy for threat prevention. For unknown applications, Trellix Application Control provides IT with multiple ways to enable users to install new applications: User Notifications and user self-approvals. Prevents zero-day and APT attacks by blocking the execution of unauthorized applications. Use inventory search and pre-defined reports to quickly find and fix vulnerabilities, compliance, and security issues in your environment. -
22
Cubed Mobile
Cubed Mobile
End-to-end mobile security is made simple. Get the protection you need for your growing business in two simple steps. Cubed Mobile frees your employees from the need for a second device and/or second SIM while creating a secured separation between personal and business workspaces. Keep sensitive data safe and isolated in a secure environment. Ensure employees only connect to secure Wi-Fi networks. Empower your team to access the Internet securely. Protect against network, apps, privilege abuse, and advanced attacks. Strengthen security, smooth communication coordination, and ease management of BYOD with a new approach that anyone can set it up in two minutes! Create workspaces with different settings, apps, and access-rights based on user parameters. Let your admins invite and remove users, edit personal details, settings, and virtual lines, and filter lists of associated devices. Anytime you can remotely backup, restore, and wipe entire workspaces immediately.Starting Price: Free -
23
WatchGuard Application Control
WatchGuard Technologies
Allow, block, or restrict access to applications based on a user’s department, job function, and time of day. It’s never been easier to decide who, what, when, where, why and how applications are used on your network. WatchGuard Application Control is part of the WatchGuard Basic Security Suite. The Basic Security Suite includes all the traditional network security services typical to a UTM appliance: Intrusion Prevention Service, Gateway AntiVirus, URL filtering, application control, spam blocking and reputation lookup. It also includes our centralized management and network visibility capabilities, as well as our standard 24x7 support. -
24
ZeroTek
ZeroTek
ZeroTek is a multi-tenant IAM SaaS platform purpose-built for managed service providers to deploy, manage, and scale Okta identity services across multiple customers from a single environment. It extends Okta’s enterprise-grade identity and access management capabilities with MSP-specific tooling that simplifies multi-client operations, enabling providers to deliver secure authentication, single sign-on, and lifecycle management as a monthly service. It provides a centralized dashboard that lets teams view and manage multiple customer directories, users, and applications in one place, reducing operational complexity and improving visibility. ZeroTek also enables self-service Okta tenant creation in seconds, allowing faster customer onboarding without lengthy procurement or licensing processes. MSP-focused role-based access control enforces least-privilege permissions for technicians, while comprehensive auditing ensures full accountability across environments. -
25
AhnLab TrusGuard
AhnLab
The NGFW TrusGuard has been acknowledged by a through market assessment for its technology, performance and stability. The firewall, IPS, application control, VPN, C&C, Anti-Virus/Anti-Spam and DLP protect the business environment. TrusGuard has full lineup from the low-end to data center level models. Scales up to protect high-performance networks. Capable of handling growing network traffic, thanks to optimization for high-performance multicore environments. Ensures network stability. Protects network resources (such as, websites, database servers, applications servers, and client machines) from unknown network attacks with the 3-step defense. Covers IPv6 network environments. Complete support for IPv6 networks. Reduces total cost of operation (TCO). Offers cost cuts compared to integrating multiple security products Relieves operational and labor costs associated with managing multiple security solutions. Increases productivity and network efficiency. -
26
Arnica UnifiedLogon
Arnica Software
Arnica UnifiedLogon is an identity management system, which provides access control, personalization and configuration services, and allows you to implement single-point user log-on for access to multiple applications. It is a powerful tool for efficient control of granular user access to applications, application resources and functionalities, all managed through a web browser. Arnica UnifiedLogon was designed as an extremely scalable system, and is perfectly suited for management of any number of users - from a dozen of local users at a small organization to thousands of users in a large enterprise, to millions of users at a public web site. Arnica UnifiedLogon provides several ways of maintaining and extending user profile data to a virtually unlimited level of complexity. -
27
Aquera
Aquera
The Aquera Identity Integration Platform as a Service is a cloud-based service that provides SCIM gateway services for account provisioning and aggregation, orchestration services for user and password synchronization, workflow services for the governance of disconnected applications, password rotation gateway services for privileged account management, and an extensive supporting catalog of out-of-box connectors for cloud or on-premises applications. Out-of-the-box and built on-demand connectors are plug-n-play from identity management platforms, privileged account management platforms, or HR applications to any cloud or on-premises application, database, directory, device, or B2B portal. The identity integrations require zero coding and rapidly deploy in minutes. The platform features multi-purpose gateway services and out-of-the-box connectors for user provisioning/deprovisioning, HR application user onboarding/mastering, delta account aggregation, file operations, etc. -
28
Kelltron IAM Suite
Kelltron
Kelltron’s IAM Suite is an AI-powered identity security platform that unifies Identity & Access Management (IAM), Privileged Access Management (PAM), and Data Governance (DGM) into one seamless solution. It enables secure user provisioning, Single Sign-On (SSO) to 4,000+ apps, adaptive Multi-Factor Authentication (MFA), and role-based access control. PAM features include just-in-time access, session monitoring, and credential vaulting to safeguard privileged accounts. The DGM module helps discover, classify, and enforce data access policies for compliance with GDPR, ISO 27001, and more. Designed for hybrid IT environments, Kelltron offers cloud, on-prem, and multi-tenant deployment. AI-driven automation reduces manual workload by flagging anomalies, suggesting least-privilege access, and generating real-time risk insights. With 24/7 support and a 6-month free trial, Kelltron empowers businesses and MSPs to scale securely with full visibility and control. -
29
Relution
Relution
Manage iOS, Android, and Windows 10/11 devices. Secure via restrictions and configurations. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Inventory and manage native and public Apple, Android, and Windows mobile apps. Review, approve, and publish apps for usage on mobile devices. Enable employees, partners, and external stakeholders to access your enterprise apps through your own app store in your corporate identity. Manage your Apple iOS and Android tablets easily and securely and deploy the right apps in your school. Companies, Authorities and Teams of every size benefit from Relution's Mobile Device and App Management. Resellers, Educational Institutions and IT Retailers use Relution to provide the service to their customers. Relution is one of the most relevant IT applications in the digital education space. For over 10 years, Relution has been the mobile device management solution for privacy-compliant and cross-platform device management.Starting Price: $2 per month -
30
AirDroid Business
Sand Studio
AirDroid Business is a full-fledged Enterprise Mobile Device Management (EMM/MDM) Solution for managing and securing all Android endpoints with powerful remote monitoring and remote control features. Some popular device types are smartphones and tablets, digital signages, POS, restaurant kiosks, IoT, and other OEM Android endpoints. It is a solution that can ensure SMBs and Enterprises enhance their business mobility and device security, along with an excellent support team for the best customer service. AirDroid Business MDM Solution Highlights: *Multiple enrollment options: Zero-Touch Enrollment, AE Enrollment, Enroll with Device Owner, Regular Enrollment *Google Play apps management *Unattended remote access *Batch operations *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS) *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notificationsStarting Price: $12 /device/year -
31
Ivanti
Ivanti
Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility. -
32
OpenText ZENworks Suite
OpenText
OpenText ZENworks Suite is a unified endpoint management platform designed to simplify the way organizations manage devices, applications, security policies, and software updates. It centralizes control of thousands of endpoints, ensuring consistent deployment, compliance, and visibility across the organization. With automated patching, encryption, and policy-driven security, ZENworks strengthens protection while reducing IT workload. The suite helps IT teams eliminate tool sprawl by consolidating asset management, endpoint security, software delivery, and device configuration into one solution. Hybrid work support makes it easy to manage devices remotely and securely without complicated infrastructure. Ultimately, ZENworks improves operational efficiency, lowers IT costs, and enhances organizational productivity. -
33
Workspace ONE
Omnissa
Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach. -
34
PC Matic
PC Matic
PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.Starting Price: $50 per year -
35
OneAPM MI
OneAPM
Fully master application performance, real-time perception of user real physical experience. It is a mobile application performance monitoring tool for mobile devices. Mi shows the interactive performance of mobile applications, collapse rate, HTTP error rate, core performance indicators such as network error rate, user access trajectory, user action and other behavioral data, and active user and other operational data can enable users to have a more comprehensive and profound understanding of the overall performance experience status of the current application and promote product optimization and upgrade. The user experience is evaluated from the three core indicators of user action, network request, and collapse, and the user distribution is summarized in multiple dimensions such as application versions, operating systems, equipment, and regions. Completely record the access trajectory of each user. -
36
Mosyle
Mosyle
An Enhanced MDM, an Endpoint Security, an Internet Privacy & Security, an Identity Management, an Application Management... NO LONGER five separate solutions. Mosyle is the only solution that fully integrates five different applications on a single Apple-only platform, allowing businesses and schools to easily and automatically deploy, manage and protect all Apple devices -
37
Perscale
Perscale
All of your apps, files and data are accessible via Perscale. Touch up that picture on Photoshop on your iphone, Chromebook, or desktop–all you need is wifi. Your hardware will never again be obsolete. Your files, documents, pictures and videos stay in the cloud. Perscale offers online storage so your files are always up to date. Perscale offers free storage, file sync and sharing that is fully integrated with all of your applications. We’re integrated with Dropbox so you can save your files straight from your app to your preferred online storage provider. Say goodbye to viruses. Because your apps are in the cloud, viruses, Trojans, and other malware cannot get to them. Perscale secures your files with 256-bit AES encryption and two-step verification. Even if your device is damaged, lost, or stolen, all of your apps and files are always ready to go, wherever you are. Access your applications where ever you go with Perscale.Starting Price: $6 per month -
38
ManageEngine Mobile Device Manager Plus
ManageEngine
ManageEngine Mobile Device Manager (MDM) Plus is designed to help enterprises empower their workforce with mobility. A leading enterprise mobile device management solution, ManageEngine MDM is suitable for managing multiple mobile platforms from a single interface, including iOS, Android, and Windows devices. The solution is available as an on-premise and cloud offering and includes features like mobile device management, application management, email management and device containerization.Starting Price: $2.00/month -
39
Corma
Corma
Corma is a unified license and access governance platform built for modern IT teams. It helps organizations manage software spend, identity access, and security from a single, centralized system. Corma provides full visibility into all SaaS applications, users, and permissions across the IT stack. The platform uses AI-powered agents to automate onboarding, offboarding, and access reviews with zero manual effort. Corma enables least-privilege access enforcement and simplifies compliance with standards like ISO 27001 and SOC 2. It also helps reduce software costs by identifying unused licenses and preventing surprise renewals. With fast setup and automation-first workflows, Corma allows teams to go live in minutes. -
40
NovaEMM
Tabnova
NovaEMM offers a powerful mobile device management solution that provides comprehensive control over devices used for work, including BYOD and COPE devices. Our EMM solution allows businesses to manage their devices from a centralized console, eliminating potential threats and vulnerabilities, and optimizing device performance. NovaEMM provides comprehensive, turnkey analytics rooted in data, network, and location utilization. These insights enable organizations to collect and leverage actionable data on the elements influencing their mobile device productivity. A single view offers a consolidated overview of your entire installation, showcasing each device, and making it the paramount solution. NovaEMM provides a streamlined solution for creating and managing a variety of kiosk/lockdown profiles on a single platform. With our platform, passwords and other essential configurations can be easily set.Starting Price: $1 per device -
41
Applivery
Applivery
Applivery is a modern, cloud-based Unified Endpoint Management UEM / MDM platform that provides comprehensive control over Android, Apple, and Windows devices. It offers seamless integration with identity providers, enabling single sign-on (SSO) for enhanced security. The platform supports zero-touch deployment, allowing for efficient device provisioning without manual intervention. Applivery’s advanced analytics deliver insights into device performance and user experience, facilitating proactive management. Its user-friendly interface ensures quick setup and smooth integration across organizations of all sizes, aligning with the latest industry standards. Additionally, Applivery provides features designed to help organizations achieve and maintain compliance with security certifications and standards, such as ISO 27001, SOC2, CIS and more.Starting Price: €2/device -
42
Vault One
VaultOne Software
Have total control and visibility over who accesses your data, systems, applications, infrastructure and any other assets, preventing cyber attacks and data breaches. With VaultOne, protect your company’s resources and achieve compliance. VaultOne is redesigning the concept of privileged access management (PAM). Manage user access, credentials and sessions in a fast, secure and automated way. In a single and powerful solution, we offer multiple features, such as digital vault, password generator, sessions recording, auditing and reporting, customizable policies, disaster recovery and multi-factor authentication. If you’re looking for a solution to protect shared accounts, certificates and user access to applications, websites, servers, databases, cloud services and infrastructure, you’ve just found it. By creating customized access policies and managing users and privileges, you fight cyber attacks and avoid data breaches.4Starting Price: $99 per month -
43
Applicaster
Applicaster
The only no/low-code platform for creating, launching & managing streaming apps across multiple devices & technology stacks. App independence; developers optional. Use simple, built-in tools to craft and change custom experiences, connect your preferred integrations & launch directly to the app stores. Scale & expand your streaming business with budget predictability & full control over timelines & resources. Support the growing needs of your business in the most operationally efficient way. Continuously experiment, personalize & optimize your app experience to drive that perfect user experience & desired business outcomes. Non-developers build & compile apps, and manage releases. Hundreds of available integrations power client apps. Use our APIs to extend your capabilities. Features available OOTB, you configure your backend. For measurement, data source & UI across platforms. Continuously collect user data, rollout changes quickly. -
44
Blue Cedar
Blue Cedar
Easily modify mobile apps to meet security needs without developer assistance. Execute streamlined mobile app deployments. Manage zero-trust network access (ZTNA) controls for mobile apps and devices. Reduce lead time with workflows that orchestrate fragmented deployments efforts, coordinate technologies, and enhance cross-team collaboration. Easily address your unique deployment needs with our workflow builder, deployment and enhancement services, and integrations with popular technologies. Use visualizations of analyzed workflow data to optimize future deployments. The Blue Cedar platform is used by leaders in finance, insurance, healthcare, government, energy, and other industries. Request a demo today to find out how Blue Cedar can help you streamline mobile app deployments. Add new functionality to mobile apps without coding. Orchestrate any sequence of deployment tasks. Enable zero-trust access from any mobile app on any device. -
45
Sophos Mobile
Sophos
Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices. Sophos Mobile lets you secure any combination of personal and corporate-owned devices with minimal effort. When users bring their personal macOS, Windows 10, or mobile devices to work, the flexible self-service portal lets them enroll their device, reset passwords, and get help, with no involvement from IT, making your life easier. Container-only Management gives admins control over corporate content in the Sophos Secure Email and Sophos Secure Workspace apps without requiring management of the mobile device itself. Ensure business data doesn’t go adrift and isn’t threatened by malware. -
46
ProMDM
ProMDM
ProMDM is a mobile device management solution that provides end-to-end control of all mobile devices across the IT infrastructure, using standard MDM specifications for iOS, Android and Windows devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Dynamic Group management based on AD/LDAP groups, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automation for administrative tasks with Health check service Role base administration SSO with Client Certificate Authentication for Exchange, Sharepoint, Web sites iOS SSO with Kerberos for Safari and native apps (integration with ADFS or websites directly) MAM - Mobile App Management Samsung KNOX support Document management – Managed media support Photo sync for Android GPS location and tracking Android for Work support (ProMDM is certified Google Partner) -
47
OpenText NetIQ Identity Manager
OpenText
Manage the complete identity lifecycle of entities across your diverse, hybrid infrastructure. Deliver efficient, consistent, and secure access to corporate assets within and beyond the firewall. Collect and curate identity information and relationships across complex, hybrid environments. Leverage a centralized framework to provision identities and access to applications and data. Save time and decrease risk by automating tasks required to make access decisions. Continuously adapt security controls based on real-time information and insights. Develop a consistent, overarching view of identities inside and outside your organization. Identity Manager collects and curates identity governance data so you know who has access, why it was granted, and whether it is still needed. With features such as attribute-level authority and continuous reconciliation, you have a single source of truth for identity and access. -
48
SureMDM
42Gears Mobility Systems
Secure, Monitor, and Manage company or employee-owned devices. Avoid security risks and solve maintenance challenges during all phases of device lifecycle. SureMDM by 42Gears is an intuitive and powerful MDM solution and MDM app for Android, iOS/iPadOS, Windows, Linux, macOS, Wear OS, VR, and IoT platforms. You can secure, monitor, and manage company-owned devices for dedicated-use as well as employee-owned devices used to access company data (BYOD). SureMDM incorporates all aspects of enterprise mobility through unified endpoint management, including Mobile Application Management, Mobile Device Management, and Mobile Content Management. SureMDM licenses also include access to SureLock for kiosk lockdown, SureFox for a secure lockdown browser, and SureVideo for a secure digital signage solution.Starting Price: $3.49 per month -
49
Appmobi
Appmobi
Appmobi has a serious solution, automated real-time threat detection and remediation. With over 2 million apps in the App Store, 5 billion mobile phones in use, and over 8 billion connected devices in the market today, keeping up with every cyber threat to such a massive number of apps and devices has become a nearly impossible task for IT teams. Appmobi puts the power back into the hands of IT to monitor and resolve app and IoT threats in real-time. Our easy-to-use solution tracks usage patterns, notifies IT when there is a threat, and even takes remedial actions to stop breaches before they occur. Appmobi draws from behavioral and environmental data to monitor usage patterns in real-time and uses artificial intelligence and a customizable rules engine to identify suspicious behavior that may lead to an application breach or data hack. When a rule or string of rules is triggered, Appmobi can recommend a course of action or automatically launch immediate protections. -
50
Sysgem Enterprise Manager
Sysgem
Flexible and modular tools for monitoring and managing systems, administering user accounts and auditing security in one single screen - across Windows, UNIX/Linux, OpenVMS and IBM. SEM offers the three core application modules Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM) and Sysgem File Synchronizer (SFiS) which all run via the SEM framework. Unite, simplify and integrate core system administration solutions across a multi-platform environment. Unify user account management across a multi-platform, multi-application environment. Manage the controlled distribution and deployment of configuration files across infrastructure.Starting Price: $200 per user per month