Best IT Management Software in the UK - Page 39

Compare the Top IT Management Software in the UK as of November 2025 - Page 39

  • 1
    Quad9

    Quad9

    Quad9

    Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. This blocking action protects your computer, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets, and it can improve performance in addition to guaranteeing privacy. The Quad9 DNS service is operated by the Swiss-based Quad9 Foundation, whose mission is to provide a safer and more robust Internet for everyone. When your devices use Quad9 normally, no data containing your IP address is ever logged in any Quad9 system.
  • 2
    EZ-GO Platform

    EZ-GO Platform

    EZ Factory

    EZ Factory is a SAAS Company with a software solution called “the EZ-GO platform”. This is a mobile solution, with a focus on continuous improvement within production environments. The simple and visual software platform is used in factories to digitize checklists, work instructions, first-line maintenance tasks, and audits to improve safety, quality, training and efficiency on the shop floor. Front-line factory workers finally know what to do, why, where, when, and how to do it. Improve safety, quality and efficiency by digitizing paper forms, lists and other documents on the shop floor. The EZ-GO platform is a mobile solution, with a focus on continuous improvement within production environments. The simple and visual app is used in factories to digitize checklists, first line maintenance tasks and audits. Furthermore, the solution offers the possibility to setup work instructions and motivates operators to propose improvements.
  • 3
    Zorin OS

    Zorin OS

    Zorin OS

    Zorin OS is designed to be easy, so you won't need to learn anything to get started. The Zorin Appearance app lets you change the desktop to resemble the environment you're familiar with, whether it's Windows, macOS, or Linux. Built on an Ubuntu & Linux foundation, Zorin OS runs on the same Open Source software that powers the U.S. Department of Defense, NASA, and more. Thanks to Linux's advanced security features, Zorin OS is resistant to viruses. Security patches and software updates are available for years to come. Zorin OS works lightning fast and doesn't slow down with updates. The Lite edition runs snappy on computers as old as 15 years, so you can breathe new life into old PCs. From a full Microsoft Office-compatible office suite to professional photo editing software, Zorin OS comes with powerful apps out of the box. Countless more apps and games are available from the Software store and Steam.
    Starting Price: Free
  • 4
    Serverspace

    Serverspace

    Serverspace

    Automated, simple, and affordable to everyone. Get started building your cool digital stuff right now. Billing charges by the minute. Only for active services. It is easy to modify configurations even after deployment. In seconds. Infrastructure availability is 99.9%. Guaranteed by the agreement. Xeon Gold CPUs and NVMe SSDs perform better in benchmarks. Store and run any databases, containers, media, and sites. Deploy app runtime, conduct analytics, implement DevOps, blockchain, AI, etc. Discover your personal cloud solution. Lightning fast and stunning simple. Managing a cloud infrastructure has never been easier. To reduce the time it takes to deploy VMs, we keep them in a dedicated, renewable pool. When you create a VM, the control panel makes a request to this pool. This reduces the average deployment time to 40 seconds. A control panel is designed within the Single Page Application architecture. After the first page has been loaded, all pages load instantly, without lag.
    Starting Price: $4.55 per month
  • 5
    iTerm2

    iTerm2

    iTerm2

    iTerm2 is a replacement for Terminal and the successor to iTerm. It works on Macs with macOS 10.14 or newer. iTerm2 brings the terminal into the modern age with features you never knew you always wanted. iTerm2 has a lot of features. Every conceivable desire a terminal user might have has been foreseen and solved. And these are just the main attractions! Divide a tab up into multiple panes, each one showing a different session. You can slice vertically and horizontally and create any number of panes in any imaginable arrangement. Register a hotkey that brings iTerm2 to the foreground when you're in another application. A terminal is always a keypress away. You can choose to have the hotkey open a dedicated window. This gives you an always-available terminal at your fingertips. iTerm2 comes with a robust find-on-page feature. The UI stays out of the way. All matches are immediately highlighted. Even regular expression support is offered!
  • 6
    KDE Plasma
    Use Plasma to surf the web, keep in touch with colleagues, friends and family; manage your files, enjoy music and videos; and get creative and productive at work. Do it all in a beautiful environment that adapts to your needs, and with the safety, privacy-protection and peace of mind that the best Free Open Source Software has to offer. The Plasma Launcher lets you quickly and easily launch applications, but it can do much more – convenient tasks like bookmarking applications, searching for documents as you type, or navigating to common places help you getting straight to the point. With a history of recently started programs and opened files, you can return to where you left off. It even remembers previously entered search terms so you don’t have to. Plasma is made to stay out of the way as it helps you get things done. But under its light and intuitive surface, it's a powerhouse. So you're free to choose ways of usage right as you need them and when you need them.
  • 7
    Veeam Kasten for Kubernetes
    Leading Kubernetes Data Protection and Mobility Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
  • 8
    Aloha VPN

    Aloha VPN

    Aloha Mobile

    Aloha VPN is a secure VPN client that works on turbo speeds. We have a plenty of locations to choose from, or you can always stay on the fastest server if you just want to be protected. The first privacy commited secure VPN client. Our servers have strict no logs policy. We don't record your IP, we don't record what you are doing, we don't share or sell your data and we have nothing to share or sell. Every connection is encrypted with military-grade AES256 algorithm. We use secure DNS, and we regularly test our network with privacy audits. Our Smart Speed Alert technology adds new servers automatically to maintain ultra fast connection for each every one of our users. Aloha VPN subscription price starts at $3.99 USD/month or $24.99 USD/year. Prices are in US dollars, may vary in countries other than the US and are subject to change without notice. If you choose to purchase Aloha VPN, payment will be charged to iTunes Account at confirmation of purchase.
    Starting Price: $3.99 per month
  • 9
    IBM Rhapsody
    IBM® Engineering Systems Design Rhapsody® (Rational Rhapsody) and its family of products offers a proven solution for modeling and systems design activities that allows you to manage the complexity many organizations face with product and systems development. Rhapsody is part of the IBM Engineering portfolio that provides a collaborative design development, and test environment for systems engineers that supports UML, SysML, UAF and AUTOSAR. The solution also allows for control of defense frameworks (DoDAF, MODAF and UPDM) and helps accelerate industry standards such as DO-178, DO-178B/C and ISO 26262. Get continuous validation through rapid simulation, prototyping and execution to address errors earlier when they are less costly to fix. Use automatic consistency checking to enhance agility and improve reuse with collaboration to reduce both recurring and non-recurring costs.
  • 10
    F5 BIG-IQ Centralized Management
    Effective management, orchestration, visibility, and compliance, relies on consistent app services and security policies across on-premises and cloud deployments. Easily control all your BIG-IP devices and services with a single, unified management platform. With 87 percent of organizations deploying apps in multiple clouds and architectures, effective management of applications, and the services and devices that power them is no small feat. Moreover, none of the customers surveyed in the 2020 State of Application Services Report could state with confidence the number of applications running in their deployment environments. This management challenge grows with ever-expanding application portfolios and the additional appliances and services needed to support them. Analyze, troubleshoot, auto-scale and control every app, service and F5 device (virtual and physical) in any environment, all from a centralized, role-specific single pane of glass.
  • 11
    ThreatDefence

    ThreatDefence

    ThreatDefence

    Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.
    Starting Price: $5 per user per month
  • 12
    Haiku OS
    Haiku is an open source operating system under constant development. Specifically targeting personal computing, Haiku is a fast, efficient, simple to use, easy to learn, and yet very powerful system for computer users of all levels. Additionally, Haiku offers something over other open source platforms which is quite unique: The project consists of a single team writing everything from the kernel, drivers, userland services, tool kit, and graphics stack to the included desktop applications and preflets. While numerous open source projects are utilized in Haiku, they are integrated seamlessly. This allows Haiku to achieve a unique level of consistency that provides many conveniences, and is truly enjoyable to use by both end-users and developers alike. The Be Operating System introduced progressive concepts and technologies that we believe represent the ideal means to simple and efficient personal computing.
    Starting Price: Free
  • 13
    AdBlock VPN
    Protect your privacy and browse the web securely with AdBlock VPN. Hide your online identity and enjoy all of the benefits of safe, simple, affordable VPN service. We believe that your browsing activity should not be shared with third parties without your consent or understanding. AdBlock VPN helps you keep your online activity private. AdBlock VPN secures the internet connection between your computer or mobile phone and the web, making public Wi-Fi more secure and giving you peace of mind. AdBlock VPN has a strict “no-log” policy and we maintain the highest privacy standards. We don't track your online behavior and we'll never share your data. A VPN, or virtual private network, allows you to connect to the internet privately. It creates an encrypted connection, often referred to as a ‘tunnel,' between your devices and the VPN servers. All of your internet traffic is routed through that secure tunnel, keeping your data encrypted and your personal information secure.
    Starting Price: $3.99 per month
  • 14
    OfficeRecovery

    OfficeRecovery

    OfficeRecovery

    OfficeRecovery offers industry-leading and unique cloud-based online data recovery/repair, as well as offline data recovery software made to repair a wide range of corrupted files but the box software approach is not the last resort in successfully repairing your data. We recommend and are partnered with SecureData Recovery Services to provide our customers with custom data recovery solutions for repairs outside of the scope of our data recovery software. SecureData Recovery Services specialized in remote, complex, and custom file repairs as well as in-lab data recovery services for hard drives, servers, SSD, and removable media. If you are experiencing file corruption or data loss on a database or a file stored on any server, hard drive, SAN, NAS, or removable drive contact us to go over your options. SecureData recovery engineers and software developers will create a custom recovery or repair solution to get your data back fast. Same-day services are available.
    Starting Price: $59 per two days
  • 15
    Avast Ultimate
    As one of today’s most pressing cyberthreats, ransomware kidnaps your sensitive files and holds them hostage unless you pay up. To keep your files and data safe, learn what ransomware is, how it works, and how you can prevent it from infecting your devices with a world-class anti-malware tool like Avast One. Our most advanced protection is your lightest, toughest defense against viruses, ransomware, spyware, zero-second threats, home Wi-Fi network vulnerabilities, and more. Protect all of your phones, computers, and tablets with Avast Premium Security. Keep everything you do online completely private with our VPN’s bank-grade encryption — browse, bank, message, and shop without having to worry about hackers or anyone else seeing what you do online or stealing your data. Easily eliminate junk for a cleaner, faster, more efficient computer or phone. You’ll also get quick-glance overviews of your device’s health, one-click maintenance care, bloatware removal, and much more.
    Starting Price: $69 .99 per device per year
  • 16
    Goliath Performance Monitor

    Goliath Performance Monitor

    Goliath Technologies

    Goliath Performance Monitor with embedded intelligence and automation enables IT professionals to anticipate, troubleshoot, and document end-user experience issues regardless of where IT workloads or users are located. It focuses on the 3 main areas most likely to cause support tickets to be opened, initiating a logon, the logon process, and in-session performance. Our technology is designed to proactively alert you to end-user experience issues before they happen and if they do give you the data to troubleshoot them quickly. Then, provide you the objective evidence in the form of reports and historical metrics so that proof exists to justify fixed actions to prevent future issues. Goliath Performance Monitor provides broad and deep visibility that allows you to troubleshoot VDI environments with the most comprehensive performance data available. Now, support teams and administrators can quickly identify where in the delivery infrastructure a problem is occurring.
  • 17
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 18
    SoftPerfect Network Scanner
    This fast, highly configurable IPv4/IPv6 scanner can streamline many of your network support procedures. Its well-designed interface, lightweight and portability coupled with an extensive range of options and advanced features make SoftPerfect Network Scanner an invaluable tool, whether you are a professional system administrator, someone providing occasional network maintenance, or a general user interested in computer security. SoftPerfect Network Scanner can ping computers, scan ports, discover shared folders and retrieve practically any information about network devices via WMI, SNMP, HTTP, SSH and PowerShell. It also scans for remote services, registry, files and performance counters; offers flexible filtering and display options and exports NetScan results to a variety of formats from XML to JSON.
    Starting Price: $29.11 one-time payment
  • 19
    MailRoute

    MailRoute

    MailRoute

    Stop Ransomware, spam and phishing, other viruses and threats for SMB, Enterprise, Healthcare, and Government agencies and contractors. API-level integration for Microsoft Office 365 & GCC High, Google Workplace, other email hosts and all servers. MailRoute stops email-instigated attacks on your information and hardware, with cost-effective, multi-layered protection. We offer CMMC, NIST 800-171, HIPAA, DFARS compliant and DISA accepted email security services. No single point of failure. Wholly owned solution includes geo-distributed datacenters with redundant network feeds, power sources and cooling, for 99.999% uptime. MailRoute prevents forgeries and email spoofing by identifying malicious messages with email authentication tools through assisted and managed DNS changes. Continually managed and updated email-network security stops cybercrime and threats like downtime, ensuring cost-predictability and reliability.
    Starting Price: $2 per user per month
  • 20
    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb is an authorized partner of Sectigo (formerly known as Comodo) and offers the cheapest SSL certificates from globally reputed Certificate Authorities like COMODO, SECTIGO, and CERTERA. We provide all types of SSL & Code Signing certificates like DV certificates, OV, and EV certificates.
    Starting Price: $2.99
  • 21
    Slitheris Network Discovery

    Slitheris Network Discovery

    Komodo Laboratories

    The vast majority of network scanning software packages require some type of credentialed access to remote devices to detect operating systems. However, using TCP/IP stack fingerprinting and other technologies, Slitheris Network Discovery can identify a wide array of operating systems without credentials or authentication, including Windows (and its Edition), Linux, iOS, and Android. Slitheris can even scan for other details related to the operating system such as Windows Uptime, Cold Boot Time, Time of Day and Domain/Workgroup names, and distinguishes between Domain and Workgroup types, all without needing authentication or credentialed access. This saves the time and frustration trying various usernames and passwords or having to visit PCs and servers in person. Managed Service Providers and other IT Providers will particularly appreciate this unique feature.
    Starting Price: $195 per 256 devices
  • 22
    ERD Lab

    ERD Lab

    ERD Lab

    ERD Lab is an online ER Diagram Tool that allows you to design your database visually. Import existing SQL or develop new database without writing a single line of code. Visualize your schemas to share & collaborate with your team. Export SQL or PDF/Image when done. All for FREE!
    Starting Price: $0
  • 23
    Taqtics

    Taqtics

    Peachy Technologies Private Limited

    Built for Multi-store RETAIL & RESTAURANT brands - Taqtics is a comprehensive store-operations management platform that helps brands ensure consistent and compliant store operations. Key Benefits - • Digitize, Streamline, and Automate: Improve productivity and communication. • Consistent Customer Experiences: Ensure a consistent look, feel and service. • Effective Operations Management: Manage day-to-day operations across multiple stores. All-in-One Software Solution - • Task & Checklist Management • Digital Audits & Reports • Issue Ticketing • Visual Merchandising Execution • Training & Assessments • Asset Management • Attendance Tracking • Live Chat • Noticeboard By partnering with Taqtics, retail & restaurant brands gain visibility & control over their daily store operations, enabling them to make better decisions, streamline processes, improve productivity, and ensure consistent store operations.
  • 24
    PimEyes

    PimEyes

    PimEyes

    PimEyes is an online face search engine that goes through the Internet to find pictures containing given faces. PimEyes uses face recognition search technologies to perform a reverse image search. Find a face and check where the image appears online. Our face finder helps you find a face and protect your privacy. Facial recognition online system allows you to search by image. PimEyes is a face picture search and photo search engine available for everyone. It is a great tool to audit copyright infringement. We believe that you have the right to find yourself on the Internet and protect your privacy and image. Using the latest technologies, artificial intelligence and machine learning, we help you find your pictures on the Internet and defend yourself from scammers, identity thieves, or people who use your image illegally. That is why we have created PimEyes - a multi-purpose tool allowing you to track down your face on the Internet, reclaim image rights, and monitor your likeness.
    Starting Price: $29.99 per month
  • 25
    Lurel

    Lurel

    Lurel

    Lurel is a data governance and access management platform designed to help organizations gain control over their internal data. It offers features such as centralized access control, real-time monitoring, automated compliance, and risk assessment tools. By integrating all identity providers into a unified platform, Lurel enhances security through precise access controls. The platform enables companies to detect and prevent employee risks, ensuring data security and compliance with industry standards and regulations.
    Starting Price: $15 per month
  • 26
    ManageEngine OpManager MSP
    OpManager MSP from ManageEngine is a comprehensive network monitoring and management tool tailored for service providers to monitor client network devices. It features an easy-to-use interface, streamlines management tasks, reduces workload, and helps optimize client network device performance. OpManager MSP offers network visualization capabilities for a consolidated view of multiple client networks. By automating basic troubleshooting, maintenance tasks, and analyzing network performance and trends, resources can be saved. The new NCM add-on in OpManager MSP allows managed service providers to efficiently manage network configurations, compliance, and identify firmware vulnerabilities for improved security. This tool simplifies the management of multi-client networks and various network components, eliminating the need for multiple tools.
    Starting Price: $795
  • 27
    Kevlarr

    Kevlarr

    Kevlarr

    Kevlarr is the ultimate DMARC monitoring and management solution tailored exclusively for MSPs. Purpose-built from the ground up, our platform empower Our dashboard takes the complexity out of setting up and maintaining a strict DMARC policy. All irrelevant data is omitted through our AI-driven filters. Monitoring data related to spoof attacks or forwarded emails can be filtered out by our AI filters. As a result, you only have to pay attention to data that you or your customer actually have control over. This can save your specialists a lot of time. Our wizard guides you through the process of DMARC management. We have put our knowledge and years of experience in the field of DMARC management into this solution. For each customer, we zoom in on all domains that require your attention. Starting with the most urgent issues. This way you can be sure that you don't miss anything.
    Starting Price: $/domain/month
  • 28
    S3 Drive

    S3 Drive

    Callback Technologies

    3 Drive connects to any standard S3 cloud data store, enabling you to work virtually with cloud files as if they are right on your local file system. Access, update, edit, and save files stored in any storage service compatible with the S3 API, such as: Amazon S3, Google Cloud Storage, Microsoft Azure Blob Storage, IBM Cloud Object Storage, MinIO, Backblaze B2, Wasabi, DigitalOcean, and more. S3 Drive adds a local cache layer on top of the S3 API, saving files locally and uploading them automatically - so you don’t have to upload and download files each time. Powerful Capabilities: - Store multiple connection profiles for a quick, convenient connection. - S3 Drive offers FIPS mode. - Run S3 Drive as a Windows service or desktop application. - Use S3 Drive as a Desktop application or from the command line. - S3 Drive supports Windows Arm64. - Available for Windows, Linux, and macOS. S3 Drive is trusted by the biggest technology companies in the world.
    Starting Price: $79
  • 29
    Retrospective

    Retrospective

    centeractive AG

    Retrospective is a desktop application for convenient and effective searching in local and distributed log files as well as log data from container platforms such as Docker and Kubernetes. Such data sources are accessed on local and/or remote computers and the log data of different format is extracted, combined and displayed in one place (the result table). Advanced features such as profile definition, data source monitoring, sorting/filtering result entries, highlighting, bookmarking, exporting etc. enable fast and robust log data exploration. Retrospective assists you in early error detection by monitoring application servers’ logs, searching for exceptions, etc. The highly optimized search engine together with the aforementioned features ensures that much precious time is saved. Being able to access all log data in one place makes log data processing incredibly efficient, thus ensuring quick and effective reactions to problems, and therefore gain customers’ trust and loyalty.
    Starting Price: $92 per year
  • 30
    PawSQL

    PawSQL

    PawSQL

    PawSQL integrates the best practices of query optimization in database industry, provides advanced SQL rewrite optimization, and sophisticate index recommendation capabilities for slow queries. Based on the professional PawSQL optimization engine (used by more than 10,000 database practitioners around the world), it provides rich SQL optimization suggestions and intelligent index recommendations. PawSQL provides a comprehensive and balanced audit rule set for multiple databases such as MySQL, PostgreSQL, openGauss, Oracle, etc., providing enterprises with a consistent audit experience no matter how diverse their database environment is. Rule-based SQL review, covering potential correctness and performance optimization issues. Rich rewrite optimization, recommending semantically equivalent but more efficient SQL queries. Cost-based verification ensures that new solutions based on SQL rewrite and index recommendation have better performance. Intelligent index recommendation.