Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Endpoint Management Software
Endpoint management software is an IT solution designed to help organizations manage their remote devices. It offers capabilities such as asset discovery, inventory tracking, centralized configuration, patching and updates, device quarantine and more. Through a single pane of glass view from the software, enterprises can gain visibility into their endpoints from any location across their organization. Endpoint management solutions use automation to streamline processes like system deployments and even security policies for maximum efficiency. Additionally, it helps reduce the risk of data loss or unauthorized access by allowing users to control who has access to sensitive data stored on endpoints.
  • 1
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can...
    Starting Price: $795.00/one-time
    View Software
    Visit Website
  • 2
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have...
    Starting Price: $0.99 per month
    Partner badge
    View Software
    Visit Website
  • 3
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps...
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
    View Software
    Visit Website
  • 4
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training,...
    Leader badge
    View Software
    Visit Website
  • 5
    Swif

    Swif

    Swif

    Swif is the ultimate AI-powered MDM platform, seamlessly managing your macOS, Windows, and Linux devices. Ensure compliance with SOC 2, HIPAA, and ISO 27001 standards while automating your onboarding and offboarding processes.
  • 6
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features...
  • 7
    osquery

    osquery

    osquery

    osquery is an operating system instrumentation framework for Windows, OS X (macOS), and Linux. The tools make low-level operating system analytics and monitoring both performant and intuitive. Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process. Our build infrastructure ensures that newly introduced code is benchmarked...
    Starting Price: Free
  • 8
    eLux

    eLux

    Unicon

    eLux® is an ultra light-weight, Linux-based, hardware agnostic, highly secure x86 end-point operating system purpose-built to help companies scale, and secure their end-user computing in complex VDI, DaaS environments. About eLux: Scale, Manage and Secure Your End-user Computing. Companies today need a lean, secure OS that powers end-point devices operating in increasingly complex environments, running an ever-growing stack of virtual applications and desktops. IT departments need...
  • 9
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules ...
    Leader badge
    Starting Price: $0/month
  • 10
    Bacon Unlimited

    Bacon Unlimited

    Bacon Unlimited

    Bacon is a cross-platform, remote endpoint management and monitoring tool. Through Bacon, system administrators can perform both basic and advanced administrative tasks that would otherwise be tedious, time consuming, or unnecessarily complex. Bacon is the only cross-platform tool that handles configuration management and monitoring, guaranteed to help you accomplish more work - fast. Made by IT people, for IT people.™
  • 11
    Scalefusion

    Scalefusion

    ProMobi Technologies

    Scalefusion is an all-in-one platform designed for comprehensive endpoint, user, and access management. With its Unified Endpoint Management (UEM), Zero Trust Access (ZTA), and endpoint security solutions, Scalefusion helps businesses manage their devices and users while ensuring robust security. The platform provides seamless device deployment, real-time compliance checks, and remote support across all major operating systems, including Windows, macOS, Android, iOS, Linux, and Chrome...
    Starting Price: $24.00 per device per year
  • 12
    Automox

    Automox

    Automox

    Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
    Starting Price: $3.00
  • 13
    SureMDM

    SureMDM

    42Gears Mobility Systems

    Secure, Monitor, and Manage company or employee-owned devices. Avoid security risks and solve maintenance challenges during all phases of device lifecycle. SureMDM by 42Gears is an intuitive and powerful MDM solution and MDM app for Android, iOS/iPadOS, Windows, Linux, macOS, Wear OS, VR, and IoT platforms. You can secure, monitor, and manage company-owned devices for dedicated-use as well as employee-owned devices used to access company data (BYOD). SureMDM incorporates all aspects...
    Starting Price: $3.49 per month
  • 14
    Google Endpoint Management
    Keep things simple—and moving. Endpoint management for Android, iOS, Windows, Chrome OS, MacOS, and Linux is easy to set up and use. Lost phone? Stolen tablet? These things happen. Keep your company's data secure with endpoint management. You can require screen locks and strong passwords and erase confidential data with device wipe or selective account wipe for Android and iOS, as well as block access to specific Windows, Chrome OS, Linux, and MacOS sessions. Simplify endpoint management...
    Starting Price: $6 per user per month
  • 15
    Kolide

    Kolide

    Kolide

    Endpoint solutions for teams that value productivity, transparency, and employee happiness. Engage with employees on Slack providing customized security and compliance recommendations for their Mac, Windows, and Linux devices. Traditional security solutions don't interact with end-users and must rely on strict enforcement and surveillance. We believe that device security starts with the user. With Kolide you can clearly communicate your organization's security guidelines and help users achieve...
    Starting Price: $6 per month
  • 16
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 17
    SanerNow

    SanerNow

    SecPod Technologies

    ... major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
    Starting Price: $50/year/device
  • 18
    TeamViewer

    TeamViewer

    TeamViewer

    TeamViewer is a popular remote access and support software that enables users to connect to and control computers and devices from anywhere in the world. It is widely used for troubleshooting technical issues, managing IT services, and providing customer support. The software allows for secure file sharing, real-time collaboration, and remote desktop access across different platforms, including Windows, macOS, Linux, iOS, and Android. TeamViewer's security features include end-to-end encryption...
    Leader badge
    Starting Price: $24.90 per month
  • 19
    KACE by Quest

    KACE by Quest

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management...
    Starting Price: As low as $3/mo/device
  • 20
    Snow Software

    Snow Software

    Snow Software

    We have brought together software asset management, cloud management and SaaS management so you can fully optimize all of your technology in one platform that seamlessly integrates with your enterprise ecosystem. Clearly see, understand and manage your entire technology landscape, both on-prem and in the cloud. Maximize the value of your technology investments with deep insights into usage, spend and vulnerabilities. Get the perspective and automation you need to anticipate and align with...
  • 21
    Prey

    Prey

    Prey

    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd. Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13...
    Starting Price: $1.2 per month
  • 22
    Fusion UEM

    Fusion UEM

    VXL Technology

    VXL Software’s unified endpoint management solution, Fusion UEM, provides powerful device management for smartphones, tablets, desktops, laptops and thin clients – enabling better control over your devices and more secure homeworking. Fusion UEM brings the industry-leading device management portfolio of applications – to Android (4.x upwards) and iOS (7.0 upwards) mobile devices, Windows desktop / laptop PCs (XP/7/8/10 IoT & Windows 7/10 Professional) and VXL Windows Embedded and Linux thin...
  • 23
    Stratodesk NoTouch
    Stratodesk NoTouch is the #1 Thin Client endpoint OS and management solution in the world. Comprised of both NoTouch OS and NoTouch Center, Stratodesk NoTouch lets you transform any PC, Thin Client, Laptop or Raspberry Pi device into a secure and centrally managed Thin Endpoint. You can also instantly deploy NoTouch OS onto thousands of devices and manage them from oStratodesk NoTouch is the #1 Thin Client endpoint OS and management solution in the world. Comprised of both NoTouch OS and...
  • 24
    7SIGNAL

    7SIGNAL

    7SIGNAL

    For organizations that rely on mission critical Wi-Fi to conduct business, 7SIGNAL is a cloud-based Wireless Network Monitoring (WNM) platform that continuously tests the wireless network for performance issues – maximizing network uptime, device connectivity and network ROI. Unlike other providers, who monitor the network from the inside-out at the infrastructure level, 7SIGNAL operates on the networks edge, monitoring the “air” and capturing the user experience on the client...
  • 25
    VISO MDM/EMM

    VISO MDM/EMM

    Radix Technologies Ltd.

    VISO MDM/EMM enables help desks, IT administrators and project leaders to centrally monitor, manage and support devices wherever they are. Reaching well beyond the local network boundaries, the cloud-based platform delivers a bird’s-eye view of an entire device fleet, enabling administrators to give the best support possible, optimize device performance and make informed decisions. Extend your support umbrella, control capabilities and manage nomadic users’ mobile devices from wherever...
    Starting Price: $22 per device/year
  • 26
    HCL BigFix

    HCL BigFix

    HCL Software

    "HCL BigFix: Secure Resilient Operations, Powered by AI HCL BigFix is the platform for unified endpoint and infrastructure management, purpose-built to deliver on the Digital+ promise of reducing cost, risk, and complexity. Proven at enterprise scale, BigFix secures and manages 155M+ endpoints across nearly 100 operating systems. It leverages AI-driven automation to deliver continuous compliance and real-time vulnerability remediation with one of the industry’s best first-pass patch...
  • 27
    Cruz RMM

    Cruz RMM

    Dorado Software

    Single Pane-of-glass to automate your customers' IT operations. Cruz Remote Monitoring and Management (RMM) is designed for Managed IT Service Providers (MSPs) to proactively and remotely monitor and manage the IT infrastructure, networks, client endpoints, and computers, from anywhere! Whether you are an MSP looking for ways to enhance your business, or a reseller/VAR breaking into the MSP business, Dorado can help you monitor and manage your environment securely and remotely from a single...
    Starting Price: $1350
  • 28
    Cruz Wireless Controller
    Cruz Wireless Controller lets IT departments view, monitor, and configure multi-vendor wireless IT infrastructures. It provides end-to-end visibility and control over the wireless devices on your network. With Cruz Wireless Controller, automate discovery, performance monitoring, configuration backup and restore, firmware management, scheduling, traffic flow analysis, configuration audit capabilities, scripting, reporting, and more, all from a single-pane-of-glass and an affordable price....
    Starting Price: $1350
  • 29
    Level

    Level

    Level

    Level is a remote monitoring and management (RMM) solution that gives you fast, intuitive, and secure access to your devices located anywhere in the world, right through your browser. With a simple one-line command, you can access up-to-date information on your endpoints, or control them with Level's low-latency remote access. Designed with security in mind, Level uses fully encrypted peer-to-peer (P2P) connections with your devices, meaning no third-party exists between you and your...
    Starting Price: $20/month
  • 30
    WinMagic MagicEndpoint
    As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless...
  • Previous
  • You're on page 1
  • 2
  • Next