Page 2 - Top Ivanti Alternatives
SocialSign.in
socialsignin.com
SocialSign.in helps businesses use guest WiFi to build valuable marketing relationships on-site. Business owners and commercial space operators use SocialSign.in to add a marketing layer to their guest WiFi. SocialSign.in's network allows end users (your customers) to access your guest WiFi, easily...
iboss
iboss.com
The iboss Zero Trust Security Service Edge is a platform that combines connectivity, such as ZTNA, and security capabilities such as CASB, malware defense, DLP and logging, into a single, unified platform that automatically connects users and devices to all enterprise owned resources and the public ...
Axis Security
axissecurity.com
Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or location. The platform artfully integrates ZTNA, SWG, CASB and Digital Experience monitoring into a ...
Scalefusion
scalefusion.com
Scalefusion is a leading Mobile Device Management and Unified Endpoint Management vendor enabling ambitious companies around the world to secure and manage endpoints including smartphones, tablets, laptops, rugged devices, POS, and digital signages.
BetterCloud
bettercloud.com
BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies in a multi-SaaS environment. By streamlin...
Palo Alto Networks
paloaltonetworks.com
Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud Architects & SOC Managers
Timus Networks
timusnetworks.com
Timus is an award-winning SASE and Zero Trust Network Security Solution replacing VPNs with a lightweight, always-on agent, keeping users connected and protected. 100% cloud based, and built by firewall experts with decades of cybersecurity experience, Timus is easy to deploy, easy to manage, and s...
Pomerium
pomerium.com
Pomerium is a zero-trust reverse proxy that helps enterprises manage secure application access. --- Authenticate, authorize, monitor, and secure user access to any application without a VPN. Access driven by identity and context. ---- Use your existing identity provider, such as Okta, Active Direc...
GroWrk
growrk.com
Established in 2019, GroWrk specializes in providing comprehensive end-to-end IT equipment solutions tailored for distributed teams across more than 150 countries. Our innovative platform streamlines the entire process of device procurement, deployment, retrieval, and support, enabling companies to ...
CyberArk
cyberark.com
CyberArk is a leader in identity security and access management, dedicated to protecting organizations against cyber threats by securing identities, both human and machine. Key Features: * Identity Security Platform: Offers a comprehensive suite of tools to manage and secure user identities, includ...
Cyolo
cyolo.io
Cyolo is redefining SRA for OT with a hybrid Remote Privileged Access Solution (RPAM) solution that provides safe and secure remote access and operations, even in the most sensitive environments. The Cyolo PRO (Privileged Remote Operations) solution seamlessly integrates secure access, connectivity...
Veritas
veritas.com
Veritas Technologies is a leader in multi-cloud data management. Over 80,000 customers—including 87% of the Fortune Global 500—rely on us to help ensure the protection, recoverability and compliance of their data. Veritas has a reputation for reliability at scale, which delivers the resilience its c...
GoodAccess
goodaccess.com
GoodAccess is your go-to ZTNA-as-a-service solution. Secure all your digital resources with the most user-friendly solution on the market. Provide least-privilege access from anywhere on the globe with any device platform, to all your business applications, clouds, servers, or routers, and shield y...
DevRev
devrev.ai
DevRev is a platform purpose-built for SaaS and technology companies, helping back-office development match the rapid pace of front-office customer relationships. Our mission is to bring end users, support engineers, product managers, and developers together, making it effortless to do what matters ...
Barracuda
barracuda.com
Barracuda is a global leader in cybersecurity solutions, focusing on protecting organizations from a wide range of cyber threats. Key Features: * Comprehensive Cybersecurity Platform: Barracuda provides integrated protection for email, applications, networks, and data, ensuring a robust defense aga...
Check Point
checkpoint.com
Check Point Software is a leading provider of cybersecurity solutions, offering a comprehensive platform designed to protect organizations from a wide range of cyber threats. Their products include advanced network security, cloud security, endpoint security, and security management solutions, all p...
Cortex
cortex.io
Cortex is the internal developer portal that cuts noise for developers with paved paths to production. Catalog, score, and drive action to improve software.
Scrut Automation
scrut.io
Scrut is a one-stop shop for compliance. Scrut is an automation platform that 24/7 monitors and collects evidence of an organisation’s security controls while streamlining compliance to assure audit readiness. Our software provides the fastest solution for achieving and maintaining SOC 2, ISO 27001,...
Deepser
deepser.com
Deepser S.r.l. is a software house that develops, produces and sells innovative products and services with high technological value. Its main product is Deepser, an ITSM platform. Deepser is an innovative and intuitive IT Service Management solution, with an interactive web interface. It allows you ...
OPSWAT
opswat.com
OPSWAT protects critical infrastructure. OPSWAT's goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. OPSWAT's products focus on threat prevention and ...
Menlo Security
menlosecurity.com
Browsers are the application enterprises can’t live without, how we work with SaaS and private web applications. But browsers are a security blind spot. They operate without the necessary protection and security controls, exposing enterprises to attack. Browsers are the entry point for internet born...
Circle Security
circlesecurity.ai
Circle is a cybersecurity platform powered by a patented decentralized cryptographic architecture purpose-built to deliver true prevention. Using Circle, enterprises can seamlessly enforce effective data security posture management starting with user data access, data flow tracking, and protection a...
Banyan Security
banyansecurity.io
Banyan Security provides secure, zero trust “work from anywhere” access to applications and resources for employees and third parties while protecting them from being phished, straying onto malicious web sites, or being exposed to ransomware. A Flexible Edge architecture enables rapid, incremental d...
Forescout
forescout.com
Forescout is a leading cybersecurity platform focused on managing cyber risk and mitigating threats across various environments. Key Features: * Risk and Exposure Management: Identify and prioritize cybersecurity risks, ensuring organizations can effectively mitigate potential threats. * Network Se...
Lookout
lookout.com
Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threa...
NetScaler
netscaler.com
Your employees and customers expect a flawless application experience. As you transition to hybrid and multi-cloud, ensuring peak application performance and comprehensive security can be challenging. But it doesn’t have to. NetScaler simplifies and automates application delivery and security across...
Trend Vision One
trendmicro.com
Powered by XGen security, Trend Micro Network Defense goes beyond next-gen IPS to provide a blend of cross-generational techniques that apply the right technology at the right time to deliver integrated detection and prevention of known, unknown and undisclosed threats. * Proactive Cyber Risk Manag...
ZenAdmin
zenadmin.ai
Manual administrative work slows business growth, and we’re here to change that. Our mission is to equip smart people with technology that helps them eliminate the administrative hassles of running a company. We believe that people should focus on strategic initiatives and software should manage the...
ABSOLUTE SECURITY
absolute.com
Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides resilient network connectivity for users to securely access critical resources in the public cloud, pr...
Zapoj
zapoj.com
Zapoj at its core improves operational resiliency of business with its critical event management and team collaboration hub platform offered as a SaaS based solution. Zapoj enables organizations to predict, act, orchestrate and collaborate during any form of critical disruptions to business operatio...