Alternatives to OpenText Core Endpoint Backup
Compare OpenText Core Endpoint Backup alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to OpenText Core Endpoint Backup in 2025. Compare features, ratings, user reviews, pricing, and more from OpenText Core Endpoint Backup competitors and alternatives in order to make an informed decision for your business.
-
1
NinjaOne
NinjaOne
NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support. -
2
Comet Backup
Comet Backup
Start running backups and restores in less than 15 minutes! Fast, secure backup software for businesses and IT providers. Comet is a flexible, all-in-one backup platform available in 13 languages. You choose your backup destination, server location, configuration and setup. Backup to your own storage/location, SFTP, FTP or cloud storage provider (Wasabi, Amazon AWS, Google Cloud Storage, Microsoft Azure, Backblaze B2, or other S3-compatible cloud providers). Comet’s modern ‘chunking’ technology powers client-side deduplication with no full re-uploads after the first backup. Backups are incremental forever—your oldest backup can restore just as fast as your most recent. No need for differentials or delta-merging. Data is compressed and encrypted during backup, transit and rest. Test drive Comet Backup with a 30-day FREE trial! -
3
IBM MaaS360
IBM
Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.Starting Price: $5/device and $10/user/month -
4
Acronis Cyber Protect
Acronis
Managing cyber protection in a constantly evolving threat landscape is a challenge. Safeguard your data from any threat with Acronis Cyber Protect (includes all features of Acronis Cyber Backup) – the only cyber protection solution that natively integrates data protection and cybersecurity. - Eliminate gaps in your defenses with integrated backup and anti-ransomware technologies. - Safeguard every bit of data against new and evolving cyberthreats with advanced MI-based protection against malware. - Streamline endpoint protection with integrated and automated URL filtering, vulnerability assessments, patch management and moreStarting Price: $85 -
5
Hexnode UEM
Mitsogo Inc
Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features such as automated device enrollment, geofencing, Remote Monitoring and Management, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more. -
6
Cove Data Protection
N-able
Protect servers, applications, databases, workstations, and Microsoft 365 data with Cove Data Protection (formerly N-able Backup). Cloud storage in one of 30 worldwide data centers is included, with the option to keep a local copy of your backups using the hardware of your choice. Flexible recovery options include bare-metal restore, virtual restore, and file/folder-level recovery. Reduce administrative time by managing backups for all your customers, and all their device and data types, from a single dashboard. Automated recovery testing provides screenshot backup verification. TrueDelta deduplication, compression, and WAN optimization make daily backups lightweight and fast. Find out how easy fast, reliable data protection can be, with Cove Data Protection. -
7
RG System
RG System
Designed for MSPs and IT Professionals, RG System provides a SaaS IT Management platform that combines RMM, Data Backup & Restore and Endpoint Security on a centric portal. With RG System, you protect your whole IT infrastructure - servers, workstations and devices - and you benefit from unique Bitdefender GravityZone Business Security and Dell EMC Avamar integration. Remote access, patch management, ticketing, reporting, VMs backup, replication, firewall... you manage and secure your IT environments from the same web based interface. The portal is affordable, easy-to-use and on a pay as you go model. Make IT Easy, that's what we do!Starting Price: $1.50 -
8
AhsayCBS
Ahsay Systems Corporation Limited
Ahsay Backup Software is specifically designed for Managed Service Providers, System Integrators, or IT Consulting Companies. It enables them to offer secure managed, cloud-hosted, and on-premises backup services to clients and earn a stable recurring income. The whole solution is built on a client-server architecture: The server-side centralized management console (AhsayCBS) can be installed on your backup server hosted in your data center or on a cloud platform like Microsoft Azure. We offer a hosted AhsayCBS instance if you don't want to host it. On the client side, there are three backup agents: AhsayOBM, AhsayACB, and Ahsay Mobile, which you can install on your customers' endpoints and devices. AhsayOBM backs up servers, databases, virtual machines, NAS devices, and Microsoft 365 user accounts as an administrator; AhsayACB backs up files on desktops, laptops, and Microsoft 365 as individual users.Starting Price: $1.50 / month -
9
Asigra Tigris Backup
Asigra
Asigra Tigris protects your backups from today’s new breed of attacks, improving your odds of data recovery while being easier to manage than traditional backup software. With a unique network-based data security architecture, Asigra provides inline advanced antimalware, encryption, authentication, and obfuscation features to do what traditional backup software can’t do. Protect your backup data from determined attackers so you avoid paying ransoms. Asigra deploys to the network quickly, without requiring endpoint agents, enabling smoother updates, reduced administration, and a minimized security footprint. Whether you are recovering last night's file for a user or your entire data center, you can be confident that your restores will succeed with advanced recovery capabilities. Incremental forever lets you restore backups from any point in time. Autonomic healing repairs corrupted backups automatically. -
10
Aranda Data Safe
Aranda SOFTWARE
Aranda Data Safe is a comprehensive platform for centrally managing, backing up, protecting, and seamlessly migrating your data and endpoint devices. It offers automated hardware and software inventory, providing detailed information on devices, installed applications, and storage requirements. The Discovery Agent allows for unlimited deployment across devices, facilitating global-scale data analysis and reporting. Automated backups ensure secure, centralized data protection, with granular policy control enabling customization by branch, user, or department. It employs global source-based deduplication for efficient storage and minimal network impact, and utilizes zero-knowledge encryption key management for enhanced security. Fast and reliable data recovery is supported through independent snapshots and self-service restoration. Aranda Data Safe also addresses risks in collaborative SaaS environments, offering optimized Outlook PST file backups. -
11
Endpoint Security for Endpoint Manager delivers powerful, integrated endpoint protection and unified management from within the familiar Ivanti console. It combines passive visibility, discovering and inventorying every IP-enabled device and installed software in real time, including rogue devices, with active control features such as application whitelisting, device control (USB/media lockdown and detailed copy logs) and antivirus orchestration (Ivanti AV or third-party engines) to detect and prevent threats before they spread. Automated patch management covers Windows, macOS, Linux, and third-party applications across on-site, remote, and offline devices, ensuring systems stay up to date without impacting users. When malware or ransomware does get through, the solution’s auto-isolation and remote-control capabilities contain infections instantly, kill malicious processes, notify connected machines, and remediate or reimage compromised endpoints.
-
12
Kopia
Kopia
With a secure, scalable architecture, Kopia can back up everything from small laptops to large servers today. Kopia is a fast and secure open-source backup/restore tool that manages filesystem snapshots in a remote storage. Kopia uploads directories and files to remote storage called Repository and maintains a set of historical point-in-time snapshot records based on defined policies. Each snapshot is always incremental, no data included in previous snapshots is ever re-uploaded to the repository based on file content. After moving or renaming even large files, Kopia can recognize that they have the same content and won’t need to upload them again. Multiple users or computers can share same repository: if users share the same files, they are also uploaded only once. To restore data, Kopia can mount the contents of a Repository as a local disk, and you can use normal file copy tools to perform full or selective restore. -
13
Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data. Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.Starting Price: $38 per user per year
-
14
Datto File Protection
Datto, a Kaseya company
Efficiently protect and recover data across client devices such as workstations and laptops. Datto File Protection safeguards business-critical files, with fully automated service delivery and end-client functionality. Continuous file and folder backup protects business documents against ever-present threats such as human error, hardware failure, ransomware and lost or stolen devices. Configure settings based on individual needs and streamline implementation. Deploy in minutes with Datto RMM and deploy via AD Group Policy or by emailing the download link to users for self-install. Clients can easily and quickly access and restore their own files without raising a support request. Simple, SMB-friendly, endpoint file backup, with powerful MSP-centric capabilities that automate service delivery and minimize operational overhead. -
15
Trellix Endpoint Security (HX)
Trellix
Trellix Endpoint Security (HX) performs fast, targeted forensic investigations across thousands of endpoints. Protect and empower your workforce with an integrated security framework that protects every endpoint. Trellix Endpoint Security solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep your organization safer and more resilient. Keep your endpoints secure in today’s dynamic threat landscape. Explore how our integrated suite of endpoint protection technologies gives you the power of actionable intelligence, machine learning, and more to help you continuously monitor threats and avert attacks. Endpoint security is the practice of safeguarding the data and workflows associated with the individual devices that connect to your network. Endpoint protection platforms (EPP) work by examining files as they enter the network. -
16
BackupBuddy
ithemes
WordPress doesn’t include built-in backups, so we built BackupBuddy in 2010 to meet the need for a solid WordPress backup solution. Even your host backup may not be enough if you experience a server crash. Other WordPress security issues include hacks, malware, user error, deleted files, and running bad commands. All of these things can completely wipe out your WordPress site forever. Having a current backup of your WordPress website is critical for protecting your website. BackupBuddy is here to help. Your backup solution needs four components to be successful. Some backup solutions cover some but not all, leaving your website vulnerable. BackupBuddy covers all four backup elements in one single plugin. Restore your WordPress website quickly & easily from a backup. Send and store your backup files off-site in a safe, secure location. Set up backup schedules to run automatically. Back up your entire WordPress website (database + all WP files).Starting Price: $52 per year -
17
Timeshift
TeejeeTech
Timeshift for Linux is an application that provides functionality similar to the System Restore feature in Windows and the Time Machine tool in Mac OS. Timeshift protects your system by taking incremental snapshots of the file system at regular intervals. These snapshots can be restored at a later date to undo all changes to the system. In RSYNC mode, snapshots are taken using rsync and hard links. Common files are shared between snapshots which save disk space. Each snapshot is a full system backup that can be browsed with a file manager. Timeshift is similar to applications like rsnapshot, BackInTime and TimeVault but with different goals. It is designed to protect only system files and settings. User files such as documents, pictures and music are excluded. This ensures that your files remain unchanged when you restore your system to an earlier date. -
18
RAV Endpoint Protection
Reason Cybersecurity
RAV Endpoint Protection is a next-generation antivirus solution that leverages AI-powered Endpoint Detection and Response (EDR) technology to provide real-time protection against advanced cyber threats. Its lightweight engine requires fewer device resources compared to other antivirus programs, ensuring seamless operation without technical expertise. The platform offers comprehensive online protection and identity monitoring, safeguarding users from phishing, ransomware, adware, and more during web activities. It includes digital identity management features, such as personal data monitoring and dark web scanning, to alert users when their identity has been compromised. The dynamic ransomware defense and malware protection feature utilizes advanced heuristics to block and alert users to potentially unknown ransomware threats. Additionally, RAV Endpoint Protection emphasizes privacy with tools like webcam and microphone protection, minimizing potential entry points for attackers.Starting Price: $32.83 per month -
19
Duplicati
Duplicati
Free backup software to store encrypted backups online For Windows, macOS and Linux. Duplicati works with standard protocols like FTP, SSH, and WebDAV as well as popular services like Backblaze B2, Tardigrade, Microsoft OneDrive, Amazon S3, Google Drive, box.com, Mega, hubiC, and many others. Backup files and folders with strong AES-256 encryption. Save space with incremental backups and data deduplication. Run backups on any machine through the web-based interface or via a command-line interface. Duplicati has a built-in scheduler and auto-updater. Duplicati is free software and open source. You can use Duplicati for free even for commercial purposes. Source code is licensed under LGPL. Duplicati runs under Windows, Linux, and MacOS. It requires .NET 4.5 or Mono. Duplicati uses strong AES-256 encryption to protect your privacy. You can also use GPG to encrypt your backup. Duplicati was designed for online backups from scratch.Starting Price: Free -
20
GlobalProtect
Palo Alto Networks
The modern workforce is more mobile than ever, accessing the network from any place on any device, at any time. Endpoint antivirus and VPN technologies aren’t enough to stop advanced threats. By extending next-generation firewall capabilities through the GlobalProtect subscription, you can gain greater visibility into all traffic, users, devices, and applications. With GlobalProtect, organizations can extend consistent security policies to all users, while eliminating remote access blindspots and strengthening security. GlobalProtect safeguards your mobile workforce by using the capabilities of your Next-Generation Firewall to inspect all traffic—incoming and outgoing. Enable always-on IPsec/SSL VPN connection between a variety of endpoints and operating systems to deliver transparent access to sensitive data without risk. Quarantine compromised devices with immutable characteristics on internal and external networks. -
21
Rapid Recovery
Quest Software
Fast backup and instant recovery for demanding RTOs and RPOs. With Rapid Recovery, you can back up and quickly recover anything, systems, apps and data, anywhere, whether it’s physical, virtual or in the cloud. This data recovery software allows you to run without restore, with zero impact on your users, as if the outage or data loss never happened. Connect to cloud simply and easily, and protect growing virtual environments automatically. Monitor and manage your entire backup and recovery environment, across multiple sites, from one cloud-based management console. This leading backup solution allows you to restore lost or damaged systems and data with near-zero recovery time, and with no impact to your users. Rapid Recovery backup software delivers one advanced, admin-friendly solution, with all capabilities included. This leading data backup solution leverages image-based snapshots, up to every five minutes, to address demanding recovery point objectives. -
22
Zmanda
Zmanda
Zmanda is a proven, reliable, high-performance enterprise backup and recovery solution. Zmanda provides a comprehensive solution at 50% less than the competition. You also get 24*7 support with a 2x higher NPS than the industry average. Since 2005, Zmanda has been trusted by enterprises, governments, and educational institutions worldwide. Zmanda enables you to back up to cloud, NAS, and disk. Zmanda supports advanced features, such as ransomware protection with air gap, client-side deduplication, forever incremental backups, and zero trust. It can be deployed as a container, VM, or Zmanda-hosted instance. Zmanda is open-source based with OpenAPI V3 standard APIs. It is packaged in all major Enterprise Linux distros, including Red Hat, Ubuntu, Debian, Rocky Linux, and Fedora.Starting Price: $499 -
23
Hyper Backup
Synology
Back up folders, system settings, and software packages from your Synology NAS to a wide range of destinations, while saving space with compression and deduplication. Back up your NAS data to a local shared folder, external devices, another Synology NAS, rsync servers, and public cloud services like Google Drive, S3-compatible storage, and Synology's C2 Storage for Individuals and C2 Storage for Businesses. Keep your backup plans as simple as possible with powerful customization features in Hyper Backup. Automatically run backups at convenient times to make sure data is optimally protected. Retain as many backup versions as you need, while drastically reducing storage use with block-level incremental backup. Configure custom backup rotation policies to delete older backups automatically. Minimize storage consumption and backup times by removing duplicate copies of data. Track monthly or annual storage usage, and get alerted when the system detects excessive usage. -
24
ESET PROTECT Complete is a comprehensive cybersecurity solution designed to safeguard business endpoints, cloud applications, and email systems. It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email servers, incorporating anti-malware, anti-phishing, and anti-spam measures. Its centralized, cloud-based management console allows for streamlined deployment, monitoring, and response to security incidents across the organization. Additional features include vulnerability and patch management, ensuring that software vulnerabilities are promptly identified and addressed.Starting Price: $287.72 one-time payment
-
25
Intermedia SecuriSync
Intermedia Cloud Communications
Three functions in one product: file sync & share, real-time backup, and antivirus (including ransomware). Easily save, synchronize, and access the most current versions of files from any device, with unlimited versioning. Restore in real time files stored in the cloud, on desktops, mobile devices, and more. Reduce downtime from ransomware with built-in anti-malware and antivirus protection from Bitdefender. Guard against compromised passwords with two-factor authentication, administered from the HostPilot control panel. Your files will be protected with Bitdefender’s anti-malware and antivirus software—available for new and existing SecuriSync customers at no extra cost. Two-factor authentication lets administrators add a second layer of protection. Real-time backup of all PC files and mobile photos and videos. Restore files to any point in time with one click. Protects files & enables quick recovery from ransomware attacks.Starting Price: $14.99 per user per month -
26
Clumio
Clumio
Clumio helps organizations simplify data protection in AWS. Its secure air-gapped SaaS solution protects from ransomware and enables organizations to achieve stringent compliance requirements, backup and restore data in minutes, and gain better visibility to optimize cloud storage costs. Clumio eliminates the need for complex capacity planning by automatically scheduling the expansion and contraction of resources as needed. You can define backup policies and monitor compliance to them in real-time across services such as Amazon EC2, EBS, and RDS. Clumio’s end-to-end encryption is always on. The user and key management design ensure full customer control over data access. The architecture handles all of the deduplication and data compression tasks as well as the fingerprint database and cataloging of all protected data. Start protecting your AWS data with Clumio in less than 15 minutes. Join a community of passionate users and try Clumio for free today.Starting Price: Free -
27
C2 Backup
Synology C2
Back up and manage data stored on Windows devices and Microsoft 365 cloud services from an intuitive console. Secure mission-critical data effectively with highly configurable features tailored to businesses. Restore entire devices with bare-metal recovery, or individual Microsoft 365 objects with file-level recovery. Automate data protection and avoid service disruptions with time or event-based backups. Retain as many backup copies as required or according to regulation. Minimize bandwidth usage and storage consumption by backing up only changed data. Make mass deployment easy on both on-premises and cloud deployments with an intuitive setup. Receive email alerts in case of abnormal events so you can keep backup tasks running smoothly. Keep backups locked from others through private keys. Minimize risks of theft and leakage by protecting your data with AES-256 encryption. Your data is protected on servers with 99.999999999% data durability.Starting Price: $34.99 per year -
28
OpenText Data Protector
OpenText
OpenText™ Data Protector standardizes and consolidates backups across multiple platforms. It provides secure, comprehensive backup protection for business-critical data and applications whether virtual, physical, or online in the cloud. Data Protector and OpenText™ Data Protector for Cloud Workloads deliver backup and disaster recovery for physical, virtual, cloud and container environments. Native application integrations make application-aware backup and recovery quick and easy. An enhanced interface provides a self-service option to recover single items. Built-in capabilities enable businesses to recover quickly, from granular file restores to automated bare metal recovery. -
29
FluentPro Backup
FluentPro
FluentPro Backup is a cloud-based platform that protects project management systems like Microsoft Project for the Web, Office 365 Planner, Monday.com, Asana, Trello, Smartsheet, Dynamics Project Operations. It automatically creates continuous backups of projects with related tasks, resources, and groups. In case of data loss or corruption, you can easily restore information from a point-in-time backup copy. Using FluentPro Backup, organizations can get many benefits: - Protect all sensitive information from data loss or human errors. - Reduce expenses and emergencies related to human errors. - Get automated continuous backup. - Automated point-in-time version recovery. - Reduces all manual work. -
30
Panda Endpoint Protection
WatchGuard
Our endpoint protection stops malware, ransomware, and threats that leverage unknown (zero-day) vulnerabilities using an easy-to-manage cloud-based console and a lightweight agent that doesn’t interfere with the performance of the endpoints. Endpoint protection against malware, ransomware, and the latest threats. Detailed, real-time security monitoring and reporting. Lightweight agent and easy-to-use cloud-based console. Extend security by adding patch management and encryption without a new deployment. This effective, Cloud-native security solution for desktops, laptops, and servers centrally manages the security of endpoints, both inside and outside the corporate network. Our Endpoint Protection (EPP) technologies prevent infections by utilizing our Collective Intelligence, the consolidated and incremental knowledge repository of all applications, binaries, and other files, both trusted and malicious. -
31
MSP360 Managed Backup
MSP360
MSP360 Managed Backup. Simple. Reliable. MSP360 Managed Backup is an easy-to-use backup solution with centralized management, monitoring, and reporting. The platform is natively integrated with AWS, Wasabi, Backblaze B2, and Microsoft Azure to enable best-in-class data protection for Windows, Linux, macOS, VMware, Hyper-V, Microsoft 365, and Google Workspace. Main features: ▸ File backup ▸ Image-based backup ▸ Desktop backup ▸ Server backup ▸ Windows backup ▸ macOS backup ▸ Linux backup ▸ VM backup ▸ SQL server backup ▸ Office365 backup ▸ Google Workspace backup ▸ MS Exchange backup ▸ Immutable backups ▸ System restore ▸ Item-level restore ▸ Backup to AWS, Wasabi, B2; local backup ▸ Centralized management ▸ Rebranding -
32
K7 Endpoint Security
K7 Security
K7 Endpoint Security is easy to install, deploy, configure, and manage, reducing IT workload. The console for the On-premises version can be installed on any client in the network, avoiding additional investment in server hardware and software. The Cloud deployed version supports 100% remote deployment and cybersecurity management of all endpoints in the organization anytime, anywhere. K7’s international award-winning scan engine has been tested and proven to protect endpoints without affecting device performance. -
33
Microsoft Defender for Endpoint
Microsoft
Gain the upper hand against sophisticated threats like ransomware and nation-state attacks. Put time back in the hands of defenders to prioritize risks and elevate your security posture. Advance beyond endpoint silos and mature your security based on a foundation for XDR and Zero Trust. Microsoft Defender for Endpoint delivers industry-leading endpoint security for Windows, macOS, Linux, Android, iOS, and network devices and helps to rapidly stop attacks, scale your security resources, and evolve your defenses. It’s delivered at cloud scale, with built-in AI that reasons over the industry’s broadest threat intelligence. Our comprehensive solution enables discovery of all endpoints and even network devices, such as routers, in your environment. It offers vulnerability management, endpoint protection, endpoint detection and response (EDR), mobile threat defense, and managed hunting all in a single, unified platform. -
34
BACKUP EAGLE
Schmitz RZ Consult GmbH
BACKUP EAGLE Backup Monitoring, Reporting, Audit & Compliance for IBM Spectrum Protect, IBM Spectrum Protect Plus, DellEMC NetWorker, Veeam, Rubrik, SEP sesam, IBM BRMS, RMAN, CommVault and more. Everything that can be automatically created for your backup environment is provided directly by BACKUP EAGLE®. Reliable detection of missing backups and application servers without any backup. Various analyses about backups and restores, backup clients, backup servers and backup devices. Different authorizations can be mapped in BACKUP EAGLE® for users defined in AD / LDAP. BACKUP EAGLE® enables the comparison between the application servers in the CMDB and the actually backed up servers. -
35
Active Backup for Business
Synology
Active Backup Suite Active Backup centralizes backup tasks for VMware, Hyper-V, Windows endpoints, Microsoft 365 and G Suite to Synology NAS – and lets you manage from one simple console. Fast and reliable recovery delivered to keep running services, VMs, and files instantly available. Integrated backup solution. With Synology NAS and the Active Backup suite, we seamlessly complement hardware with software by providing an integrated backup and recovery appliance. This turnkey solution centralizes your data administration, and streamlines acquisition, deployment and technical support. A modern approach to backup and recovery. Challenges to IT environments evolve, so should your data protection. Active Backup is for saving businesses excessive time, effort, and costs by guarding what belongs to the business. Centralized management. Easily manage, deploy, and monitor all backup tasks from one single console. Take immediate action with notifications and scheduled reports. -
36
AhnLab EPP
AhnLab
AhnLab EPP is the endpoint protection platform for optimized interoperation and integrated management of diverse security functions. AhnLab EPP provides a stronger response against threats than point solutions-based responses by providing truly centralized endpoint security management and operation. Sensitive data of organizations reside in endpoints and as a result, endpoints are continually exposed to security threats. Also, the increasing diversification of operating systems and devices require organizations to widen the object and scope of protection. In response to today's highly complex security threats, organizations are introducing multiple security solutions; however, limitations in operating and managing such multiple solutions often become a vulnerability in security. -
37
Symantec Endpoint Protection
Broadcom
Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft. -
38
Perfect Backup
Perfect Backup Software
Perfect Backup allows you to backup your data to local and external drives, network locations, FTP servers and cloud storages. Key features: * Friendly interface. The wizards help you to create a backup job, and to restore your data when you need it. * All backup types: incremental, differential, full and even synchronization. * Different storages supported: local disk, external drives, network locations, FTP servers, cloud storages etc. * ZIP compression. The program is able to compress your files during backup. * Data encryption and protection. Keep your data secure with the help of efficient encryption engine. * Source filters. Backup only the files you really need. * Backup scheduler. Backup job can be started automatically on specified days and according to the timetable. * Easy restore. Just select a restore point, and the program will do the rest itself. * Detailed reporting. Find out information about all file operations .Starting Price: $0 -
39
Alcion
Alcion
The next-generation backup platform for Microsoft 365 that takes on all the heavy lifting needed to secure your data. Use of AI and predictive analytics to intelligently create safe backups. Automatic discovery and protection of new resources with automated backup scheduling. Backups only capture incremental changes but are always stored as full backups for fast restores. Blazingly fast search within backups to quickly discover required data. Flexibility to restore all or only required data from a backup and control restore destination behavior. Client-side data encryption using per-tenant keys that are independent from object storage. Encrypt backup data with encryption keys provided and controlled by the customer. Data is always encrypted, with TLS in flight and with AES-256 at rest.Starting Price: $2.50 per user per month -
40
Yandex Cloud Backup
Yandex
Yandex Cloud Backup allows you to save application data and ensure its integrity by using the Cloud Backup agent in the guest OS. Restore individual files from backups to the appropriate directory of the current version of the VM. Configure virtual machine backup policies for the entire cloud using the console. Apply these policies when configuring VMs. All backup operations are performed in the cloud; you only need to establish and apply policies to the required virtual machines. Unlike a disk snapshot, the service creates a copy of all virtual machine disks, including network SSDs and HDDs, non-replicated disks, and dedicated host local disks. When restoring the previous state of the current virtual machine is impossible, you can restore its backup to a new virtual machine. -
41
Ivanti Endpoint Manager
Ivanti
From Windows to macOS, from iOS to Android and beyond to IoT—one place to manage all devices—plus user profiles. Do more than keep your business up and running. Consolidate your endpoint and workspace management, satisfy growing user expectations, and simplify your management processes through a single, unified endpoint management suite. Ivanti Endpoint Manager is proven, reliable endpoint and user-profile management software that is core to: 1) discovering everything that touches your network; 2) automating software delivery; 3) reducing headaches with login performance; and 4) integrating actions with multiple IT solutions. Experience UEM today. Discover, inventory, and configure all devices—PCs, laptops, servers, tablets, and smartphones. Also remote control Windows and Mac devices. -
42
Backup4all
Softland
Backup4all is a powerful backup software that protects your data from loss. Its intuitive interface is easy to use for beginners and includes advanced features for experienced users. It is a highly configurable backup program that performs full, incremental, differential, mirror and smart backups. Has wizards for backup and restore, powerful file filters and scheduler. Creates standard zips or exact copies of files, spans to multiple disks, keeps track of file versions, has built-in CD/DVD burner, backs up to SFTP/FTP or cloud destinations, sends email notifications, has AES encryption support and much more. Using Backup4all you can backup to any local or network drive, save cloud backups to Google Drive/Amazon S3/Dropbox/Microsoft OneDrive/Azure/BOX/Hubic/Hidrive, backup to SFTP/FTP, backup to CD/DVD/Blu-ray, or other removable media.Starting Price: $19.99 (one time payment) -
43
Kaseya 365
Kaseya
Kaseya 365 provides seamless access to functions in endpoint management, security, and backup. These solutions are joined under one subscription, effortlessly integrated, and live within the unified interface experience of IT Complete. Gain access and control over devices and the network. Ensure devices and data are protected from intrusion or corruption. Preserve critical data from loss, theft, or exploitation. Do it all consistently, accurately, and within the constraints of small teams. Reduce vendor fatigue by putting all critical components in one easy-to-understand, acquire, and manage subscription. Experience massive improvements in technician efficiency by leveraging the power of workflow integrations and automation. Experience significant budget benefits by saving up to 75% when compared to using a mix of separate competing solutions. Your Kaseya 365 subscription offers everything needed to manage, secure, backup, and automate endpoints in your environment. -
44
Webroot Business Endpoint Protection
OpenText
Webroot Business Endpoint Protection offers advanced, cloud-based security that defends laptops, desktops, servers, and virtual environments against malware, ransomware, phishing, and zero-day threats. It uses real-time machine learning and predictive analytics to monitor and adapt to new threats continuously. The solution provides multi-vector protection, including antivirus, antimalware, and web filtering, through a lightweight agent that installs quickly and runs efficiently without slowing devices. Remote policy management allows IT teams to easily define and enforce security settings across endpoints. Auto-rollback capabilities help restore infected files quickly, minimizing downtime. Designed for MSPs and SMBs, Webroot Endpoint Protection delivers fast deployment and strong protection within seconds.Starting Price: $30 per year -
45
CPU-enforced malware prevention stops phishing and ransomware attacks, while reducing overall alert volume. Remotely locate, lock, and wipe a lost or stolen PC. HP Protect and Trace2 protects data, reduces operational burden, and can eliminate breach notifications. Continually monitors device for anomalous behavior and self-heals. HP Wolf Security brings a host of advanced technologies to your endpoint cyber-defenses, supporting HP and non-HP (OEM) PCs, and HP printers. Unlike alternatives that only protect above the operating system, HP takes a full-stack approach. HP Wolf Security1 builds security layer by layer, from motherboard hardware and firmware, through the OS, to application execution.
-
46
Jamf Protect
Jamf Protect
Endpoint protection built exclusively for Mac. Prevent macOS malware, detect and remediate Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Built for Mac to protect Mac. Jamf Protect puts the spotlight on Apple, helping security and IT teams with Mac in organizations of all sizes. Scale your teams through tools that understand the Mac platform. Jamf Protect helps maintain Mac endpoint compliance, address anti-virus needs by preventing macOS malware, control Mac application within the organization, detect and remediate Mac-specific threats, all while maintaining minimal impact to the device and the end-user experience. Prevent With comprehensive insight into Mac-specific malware, Jamf Protect meets your anti-virus needs by preventing known malware from running on your devices and quarantining them for later analysis. Lock down unwanted software by letting Jamf Protect limit its execution. Detect. Defend against sophisticated attacks on your MacStarting Price: $5 per user, per month -
47
SafeConsole
DataLocker
Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.Starting Price: $28 per device per year -
48
Cloud Protection Manager
N2W Software
Cloud Protection Manager is an Enterprise-class backup & disaster recovery solution for EC2, allowing full automation of backup operations of EC2 instances, EBS volumes & RDS databases, with many features such as flexible backup policies, application-consistent backup, rapid recovery and much more. Instantly write down storage costs by importing legacy snaps to N2WS and archiving them to S3 or Glacier. Lower storage costs by archiving RDS snapshots to S3 or Glacier for long-term retention. Schedule automated DR drills the same way you’d schedule a policy. Restore a single file without having to restore the entire system.Starting Price: $199 per month -
49
Netwrix Endpoint Protector
Netwrix
Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information. -
50
WatchGuard Endpoint Protection Platform (EPP)
WatchGuard Technologies
The WatchGuard EPP product goes beyond signature-based antivirus to stop malware, ransomware and threats that leverage unknown, zero day vulnerabilities. Even better, it's managed with an intuitive Cloud-based console and lightweight agent that doesn't interfere with endpoint performance. Endpoints are protected from viruses, malware, spyware and phishing with WatchGuard EPP. We use a comprehensive set of security techniques including signatures, local cache, and even our own proprietary intelligence feeds derived from the malware previously detected with our EDR products. This enables us to find zero day exploits using behavioral heuristics and known indicators of attacks as “contextual rules." WatchGuard EPP centralizes next-generation antivirus for all your Windows, macOS and Linux desktops, laptops, and servers, in addition to the leading virtualization systems.