Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Asset Management Software
IT asset management software is software designed to help organizations track, manage, and optimize their IT assets throughout their lifecycle. It provides functionalities for inventory management, software licensing, and hardware tracking, ensuring that all IT resources are accounted for and properly maintained. The software often includes features for compliance management, helping organizations adhere to regulatory requirements and avoid penalties related to software usage. By offering real-time visibility into asset status and utilization, IT asset management software helps businesses reduce costs, prevent asset loss, and improve operational efficiency. This tool is essential for managing complex IT infrastructures and ensuring that technology investments are aligned with business goals.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Patch Management Software
Patch management software is designed to automate the process of identifying, acquiring, testing, and deploying updates (patches) to software applications, operating systems, and firmware. These patches typically fix security vulnerabilities, resolve bugs, or improve performance. Patch management tools centralize this process across an organization’s IT infrastructure, ensuring systems remain compliant and protected against threats. Many platforms integrate with vulnerability scanners, compliance frameworks, and reporting dashboards to provide visibility and control. By streamlining updates, patch management software reduces risk, improves system stability, and minimizes downtime for IT teams.
Endpoint Protection Software
Endpoint protection software is a software platform that provides the solution to secure endpoints—such as laptops, desktops, smartphones, and tablets—against cyber threats and attacks. These platforms provide real-time monitoring and defense mechanisms to protect devices from malware, ransomware, phishing, and other types of threats. Endpoint protection software typically includes antivirus, anti-malware, firewall, encryption, and intrusion prevention features to prevent unauthorized access and ensure data security. It also allows for centralized management, enabling IT teams to enforce security policies, update software, and monitor the health of all devices in the network. By using endpoint protection software, organizations can safeguard their devices and networks from cyber risks while maintaining compliance with security standards.
  • 1
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can...
    Starting Price: $795.00/one-time
    View Software
    Visit Website
  • 2
    EZO AssetSonar
    EZO AssetSonar is a comprehensive IT asset management platform that provides real-time visibility into your entire digital infrastructure. Track and optimize hardware, software, and license management to reduce risks, control IT spend, and improve compliance. With powerful features like software discovery, license tracking, and software normalization, EZO AssetSonar helps businesses overcome challenges such as SaaS sprawl, shadow IT, and redundant software licenses. Seamlessly...
    View Software
    Visit Website
  • 3
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps...
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
    View Software
    Visit Website
  • 4
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training,...
    Leader badge
    View Software
    Visit Website
  • 5
    Pulseway

    Pulseway

    MMSOFT Design

    Pulseway is a real-time remote monitoring and management (RMM) software for MSPs and IT departments that allows you to take full control over your entire IT environment. Easy to use and quick to deploy, Pulseway ensures that any IT issues are detected, monitored, and addressed at the earliest time possible. The platform offers complete visibility through the Pulseway Dashboard, advanced automation, remote control, OS & 3rd party patch management, network monitoring, IT automation, custom...
    Starting Price: $27/month
    Partner badge
  • 6
    KernelCare Enterprise
    Global organizations trust TuxCare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the TuxCare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates. TuxCare automates the patching process and eliminates the need...
    Starting Price: $3.95 per month
  • 7
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features...
  • 8
    Polymorphing

    Polymorphing

    Polyverse

    Polyverse is a leading provider of zero-trust software cybersecurity solutions. Its Polymorphing technology protects against the most sophisticated attacks, even on unpatched and legacy systems. Used by governments and security-conscious organizations worldwide, Polyverse protects against memory exploits, script injections, supply-chain attacks and the like anywhere Linux runs, from devices to the cloud. CNBC has named Polyverse as one of the world’s top 100 startups. For more information...
  • 9
    Patchdeck

    Patchdeck

    Patchdeck

    Patchdeck is a cloud-based patch management solution for Windows, Linux and Mac. With Patchdeck IT professionals can quickly see which systems are missing patches and remediate vulnerabilities with one click. Patch policies allow to configure a fully automated patch process and reports show the patching health of an environment developing over time. Patchdeck provides advanced access control features so that IT teams can work together to keep their environment fully patched. Alerting via email...
    Starting Price: $1 per month per endpoint
  • 10
    SysAid

    SysAid

    SysAid Technologies

    SysAid is an AI-first Help Desk & ITSM platform powered by Agentic AI. It makes your IT team 100x more impactful, resolves issues faster, eliminates repetitive tasks, and shifts from firefighting to delivering strategic impact. With no-code workflows, AI-powered ticket handling, and an intuitive self-service portal, SysAid empowers IT to focus on what really matters: business value. At its core is Agentic AI: a powerful operational layer where AI Agents take the first action, accelerating...
  • 11
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules ...
    Leader badge
    Starting Price: $0/month
  • 12
    Automox

    Automox

    Automox

    Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
    Starting Price: $3.00
  • 13
    Naverisk RMM & PSA
    ... easy to use, automation. Full support for Windows, Linux, Mac & SNMP devices. It takes a team to deliver great customer service. Naverisk’s service desk is designed specifically for MSPs and IT Pros with powerful automation and collaboration capabilities. Power up your service delivery with modern collaboration features supporting teams working together with integrated device management to quickly resolve IT issues.
    Starting Price: $110 per month
  • 14
    ManageEngine Patch Manager Plus
    Keep all your production businesses up to date by automating the entire patching process using Patch Manager Plus. Available as both cloud-based and on-premise software, Patch Manager Plus offers features that include scanning for and detecting missing patches, automated scheduled patch deployments, test and approve patches, patch tracking, patch compliance and reporting. Patch Manager Plus also enables users to provide detailed audit and compliance reports.
    Starting Price: $245 per year
  • 15
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 16
    Autonomic Software

    Autonomic Software

    Autonomic Software

    Autonomic Software was established with the primary objective of creating solutions that can protect organizations against cybersecurity issues. Turn to our expert software solutions to assist your company in mitigating potential breaches. We have never encountered a successful cyberattack from any of our critical infrastructure locations. Patch and Application Manager is a fully integrated component that provides McAfee ePO users with a comprehensive solution to manage Windows and Mac...
  • 17
    SanerNow

    SanerNow

    SecPod Technologies

    ... major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
    Starting Price: $50/year/device
  • 18
    KACE by Quest

    KACE by Quest

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management...
    Starting Price: As low as $3/mo/device
  • 19
    N‑able N-sight RMM
    N‑able N-sight RMM® is a cloud-based IT solution that makes it easy for MSPs to deliver valuable technology services within hours, not weeks or months. Clear graphical dashboards place alerts front and center so you can focus on what needs you most. Built-in remote access and security features help you support and protect from day one. And when you’re ready, grow your business with additional security layers and add-ons services to expand your offering. N‑able N-sight RMM features...
  • 20
    Motadata

    Motadata

    Motadata

    Effectively addressing the intricate challenges posed by modern networks requires the implementation of advanced solutions in the realm of Network Observability. In this pursuit, consider embracing the cutting-edge offerings of Motadata AIOps, a leading provider in the industry. By integrating Motadata AIOps into your network infrastructure, you not only eliminate data silos but also gain unparalleled visibility into various facets such as network performance, SNMP data, Network Flow, and...
  • 21
    Acronis Cyber Protect
    Managing cyber protection in a constantly evolving threat landscape is a challenge. Safeguard your data from any threat with Acronis Cyber Protect (includes all features of Acronis Cyber Backup) – the only cyber protection solution that natively integrates data protection and cybersecurity. - Eliminate gaps in your defenses with integrated backup and anti-ransomware technologies. - Safeguard every bit of data against new and evolving cyberthreats with advanced MI-based protection...
    Starting Price: $85
  • 22
    XEOX

    XEOX

    XEOX

    XEOX is a comprehensive, cloud-based remote management and monitoring solution that includes optimized patch management, integrated remote access, seamless software deployment, IT asset management and more. It allows you to centrally manage the IT landscape of all computers and servers within your organization, and keeps track of inventory and software. XEOX was developed to take IT management to a new level. It is fast, accessible from anywhere and easy to use thanks to our modern user...
    Starting Price: $1,5 per month
  • 23
    ESET PROTECT Complete
    ESET PROTECT Complete is a comprehensive cybersecurity solution designed to safeguard business endpoints, cloud applications, and email systems. It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email...
    Starting Price: $287.72 one-time payment
  • 24
    Ivanti Security Controls
    Ivanti Security Controls is an automated patch management solution that simplifies security through unified prevention, detection, and response across physical and virtual environments. It automatically discovers vulnerabilities and missing OS or third-party application patches, then deploys updates to servers, workstations, VMs, and templates, online or offline, via agentless patching and remote task scheduling to minimize disruption. Granular privilege management implements just enough and...
  • 25
    N-able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting...
  • 26
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured...
  • 27
    ESET PROTECT Elite
    ESET PROTECT Elite is an enterprise-grade cybersecurity solution that integrates extended detection and response with comprehensive multilayered protection. It offers advanced threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent zero-day threats and ransomware. The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full...
    Starting Price: $275 one-time payment
  • 28
    eAuditor Cloud

    eAuditor Cloud

    BTC Sp. z o.o.

    eAuditor Cloud is a comprehensive SaaS platform for IT asset management, monitoring, security, and data protection. With more than 20 years of experience in corporate and public sector environments, it combines proven functionality with the accessibility and scalability of the cloud. The system provides full visibility and control over the infrastructure - from automatic inventory of computers, servers, operating systems, and software to continuous monitoring of users, devices, and network...
    Starting Price: 0,4 € / mo./ per 1 PC
  • 29
    Cruz Operations Center (CruzOC)
    CruzOC is a scalable multi-vendor network management and IT operations tool for robust yet easy-to-use netops. Key features of CruzOC’s integrated and automated management include performance monitoring, configuration management, and lifecycle management for 1000s of vendors and converging technologies. With CruzOC, administrators have implicit automation to control their data center operations and critical resources, improve network and service quality, accelerate network and service...
    Starting Price: $1350
  • 30
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize...
  • Previous
  • You're on page 1
  • Next