AirDroid
airdroid.com
AirDroid Business, an enterprise-grade Mobile Device Management(MDM) solution, is designed to help businesses manage and control fleets of Android and Windows devices from a central dashboard. With AirDroid Business, businesses can easily monitor device usage, deploy apps and updates, and remotely troubleshoot issues. It offers features such as kiosk mode, security policy, alerts & notifications, location tracking, file transfer in bulk, and more. It aims to simplify the device management process, increase productivity and efficiency, and reduce management costs. AirDroid Business MDM Highlights: *Multiple enrollment options - For Android: Zero-Touch, Android Enterprise(AE), Device Owner, and Regular Enrollment. For Windows: Regular Enrollment. *Unattended remote access *Batch operations *Tasks & Action logs *Patch management *Limit incoming & outgoing calls *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS):custom apps, Google Play Store apps and web apps *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications *Supports all Android-based endpoints *Devices fleet management from a centralized dashboard AirDroid Business's acclaimed MDM solution currently empowers organizations across 100+ countries. Our expertise spans various vertical markets such as retail, healthcare, digital signage, transportation & logistics, IT & MSP services, and education. We offer free trial, online demos, and email & call support to all prospects and customers, contact us for more information today!
NordPass
nordpass.com
NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single place — an encrypted password vault. This service comes in both free and premium versions, though the free version lacks much of the paid functionality like multi-device login. NordPass is a cross-platform application available on Windows, macOS, Linux, Android, and iOS. It also offers browser extensions on Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, Opera, and Safari.
Rippling
rippling.com
Rippling gives businesses one place to run HR, IT, and Finance—globally. It brings together all of the workforce systems that are normally scattered across a company, like payroll, expenses, benefits, and computers. For the first time ever, you can manage and automate every part of the employee lifecycle in a single system. Take onboarding, for example. With Rippling, you can hire a new employee anywhere in the world and set up their payroll, corporate card, computer, benefits, and even third-party apps like Slack and Microsoft 365—all within 90 seconds.
OneLogin
onelogin.com
OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that designs, develops, and sells a unified access management system (UAM) platform to enterprise-level businesses and organizations. Founded in 2009 by brothers Thomas Pedersen and Christian Pedersen, OneLogin is a late stage venture, privately held company.OneLogin was named a visionary in the Gartner Magic Quadrant for Access Management. The OneLogin UAM platform is an access management system that uses single sign-on (SSO) and a cloud directory to enable organizations to manage user access to on-premises and cloud applications. The platform also includes user provisioning, lifecycle management, and multi-factor authentication (MFA). OneLogin is based in San Francisco with a developer office in Redmond, Washington, as well as London and Guadalajara. The company hosts an annual Connect user conference.
Kandji
kandji.io
We’re Kandji: the Apple device management and security platform that empowers secure and productive global work. Through advanced automation and thoughtful experiences, we’re bringing much-needed harmony to the way admins, end-users, and global teams work today and tomorrow.
JumpCloud
jumpcloud.com
JumpCloud is a U.S.-based enterprise software company headquartered in Denver, Colorado. The company was formally launched in 2013 at TechCrunch Disrupt Battlefield as an automated server management tool. JumpCloud’s cloud based directory platform is used to securely manage users identity, devices, and access.
WorkOS
workos.com
Your app, Enterprise Ready. Start selling to enterprise customers with just a few lines of code. Add Single Sign-On (and more) in minutes instead of months. WorkOS Dashboard - WorkOS provides an API for Single Sign-On (SSO), Directory Sync (SCIM), Audit Trail (SIEM), and more. Easily integrate Okta SAML, Google OAuth, and more.
Prey
preyproject.com
DEVICE TRACKING & PROTECTION ON AUTO-PILOT. Knowing where your assets are at any given time is now crucial. Avoid information loss within your remote workforce using Prey's persistent device tracking & security solution.
CoreView
coreview.com
CoreView is the Global Leader in Effortless M365 Security, Governance, and Administration. Offering an end-to-end solution that stretches across the whole M365 ecosystem; from your tenant level configurations, right up to your most critical workloads. M365 is your most critical cloud environment. Despite this, delivering best practice security, governance, and administration is complex work. CoreView makes it effortless. We give you a unified and simplified view of M365 with powerful security, governance, and administration tools and automations that make best practice effortless. Our offerings: - Policy Enforcement: 50+ OOTB security and governance policies to auto-detect and remediate issues in M365 - Configuration Management: Template and back up your M365 configurations, detect configuration drift, and effortlessly roll back to your ideal state - Delegation Management: Enable virtual tenant segmentation, configure least privilege roles in a few clicks, and delegate administration for M365 - No Code Task Automation: Create no code automated workflows for user onboarding, offboarding, and repetitive tasks - Unified Visibility & Control: Unify & simplify the admin user experience of M365 including multi-tenant and hybrid environments For more information, please visit www.coreview.com.
Applivery
applivery.com
Applivery is the most powerful Unified Endpoint Management (UEM) platform that enables full control over Mobile App Distribution and Device Management (MDM & MAM), helping companies better manage their endpoints and mobile applications for Apple and Android devices.
Auth0
auth0.com
Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while also enabling SSO.
Teleport
goteleport.com
Teleport is the easiest, most secure way to access all your infrastructure. Faster. More Secure. Identity-Native Infrastructure Access. Teleport replaces the #1 source of data breaches — secrets — with true identity to deliver phishing-proof zero trust access for every engineer and service connected to your global infrastructure.
Indent
indent.com
With Indent, your team can quickly get the access they need to cloud apps and infrastructure when they need it. User-friendly access control - Indent provides team members with on-demand access to cloud apps and infrastructure in seconds, not days.
CyberArk
cyberark.com
CyberArk is a leader in identity security and access management, dedicated to protecting organizations against cyber threats by securing identities, both human and machine. Key Features: * Identity Security Platform: Offers a comprehensive suite of tools to manage and secure user identities, including single sign-on (SSO), multi-factor authentication (MFA), and identity governance. * Privileged Access Management (PAM): Safeguards privileged accounts and sensitive credentials across various environments, ensuring secure access to critical systems. * CyberArk CORA AI: An advanced AI hub designed to enhance identity security by providing intelligent insights and automation capabilities. * Endpoint Privilege Security: Reduces attack surfaces by managing and controlling privileges on endpoints.
Kinde
kinde.com
Powerful authentication and user management for modern applications. Created by founders and engineers to help your business generate more revenue, reduce costs, and make lifelong loyal customers – in one place. Every aspect of Kinde is designed to help your business grow and scale. We went to great lengths to make sure that you don’t have to worry about anything. From startup to IPO in a single platform. Authentication Authentication happens at some of the most important, and highly impactful, places in your customers' journey. Our powerful builder allows you to make sure that your pages are on brand and as beautiful as the rest of your website and product experience. Up-level your security with multi-factor authentication (MFA). Give your users access to advanced authentication options, protecting them from reused or breached passwords. Take control of user authorization and access with enterprise SSO and custom SAML so that you can support your biggest customers as quickly as possible. Manage users from one beautiful dashboard. Add and invite users, manage roles and permissions, and get a complete picture of your user activity. We’ll keep you and your users safe. Kinde is built from the ground up using best-in-class security protocols. Access Control and Multi-tenancy Complex businesses need software that reflects their structure and restricts data access to only the people who should see it. That’s why we’ve included outrageously powerful controls to help you manage your businesses, teams, and users in the most frictionless way possible. Controlling who can access which individual pieces of data and interface is critical to protecting your business and your customers. Hierarchical role-based access control (RBAC) is the best way to manage this. Allowing strict control and flexible assignment – aligning everything from your business view of the world right down to the code you ship to customers. Feature flags Deliver new experiences and increase the speed that your team deploys, learns and releases with feature-based continuous deployment. Shipping to production introduces a degree of risk. Continuous deployment helps to reduce risk and accelerate learning by empowering the team to deploy when ready and separating releasing from shipping. Feature flags are the heart of what makes this work. Mistakes happen. Rollouts are no exception. The important thing is how your team deals with problems, and what tools they have at their disposal to manage problems. Feature flags are a powerful tool for preventing and managing failed change. Billing Coming in Q3, 2024.
Esper
esper.io
Esper enables next-gen device management for company-owned and managed iOS and Android tablets, kiosks, smart phones, IoT edge devices, and more. With Esper’s modern device platform, you can manage your entire multi-OS device fleet, increasing efficiency and managing all of your devices the way you want to. No more juggling, no more frustration—just a single pane of glass. Esper is on a relentless quest to redefine the landscape of device fleet management, and our vision is powered by innovation. We're not just another MDM platform; we're the catalyst for exceptional device experiences. In a world where company-owned and managed devices are revenue generators, lifesavers, and the face of customer interaction, "just working" isn't an option; it's a necessity.
Scalefusion
scalefusion.com
Scalefusion is a leading Mobile Device Management and Unified Endpoint Management vendor enabling ambitious companies around the world to secure and manage endpoints including smartphones, tablets, laptops, rugged devices, POS, and digital signages.
BetterCloud
bettercloud.com
BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies in a multi-SaaS environment. By streamlining and automating critical work like user lifecycle processes and day-to-day operations, BetterCloud's thousands of customers enjoy greater operational efficiency and employee productivity. With 10+ years experience pioneering the SaaS Operations movement, BetterCloud now serves the world’s largest community of SaaSOps experts. As host of Altitude, the industry’s leading SaaSOps event, and publisher of the annual State of SaaSOps Report, the category’s definitive market research, BetterCloud is recognized by customers (G2) and leading analyst firms (Gartner and Forrester) as the market leader in SaaS Operations Management. For IT teams that manage multi-SaaS environments, BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies. Unlike Identity & Access Management solutions that require manual intervention and custom scripting, or IT Service Desk solutions that generate tickets to be manually worked, BetterCloud’s granular, powerful automation and unlimited customizable workflows complement your IAM and help desk automation to improve IT efficiency by reducing up to 78% of SaaS management work. If your IT team is scripting or manually managing access to applications, files, folders, and groups for anyone joining, leaving, or moving inside your organization, you’re throwing talent and resources you can't spare at problems BetterCloud can automate. Headquartered in New York City, with a product and engineering office in Atlanta, GA as well as innovation hubs & remote talent across the U.S., BetterCloud is backed, among others, by some of the best technology investors including Vista Equity Partners, Warburg Pincus, Bain Capital, and Accel.
Palo Alto Networks
paloaltonetworks.com
Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO’s, Head of Infrastructure, Network Security Engineers, Cloud Architects & SOC Managers
GroWrk
growrk.com
Established in 2019, GroWrk specializes in providing comprehensive end-to-end IT equipment solutions tailored for distributed teams across more than 150 countries. Our innovative platform streamlines the entire process of device procurement, deployment, retrieval, and support, enabling companies to manage their global IT inventory from a single, user-friendly dashboard. This efficient approach ensures prompt and effective employee onboarding and equipment management, regardless of location.
HiddenApp
hiddenapp.com
HiddenApp protects Apple, Windows & Chromebook device fleets against theft & loss: enabling real-time location tracking, device monitoring, and advanced recovery tools, all actionable through a user-friendly dashboard. Key Features When a device goes missing, the consequences go beyond the cost of a replacement. HiddenApp's multi-layered approach offers preventive and proactive measures and tools to deal with device-related incidents, such as theft, loss or breach of policy. Prevent device loss HiddenApp’s proactive prevention and detection functionality is an early warning system that improves the chances of detecting and recovering missing devices. This early warning system includes a geofencing capability, which detects and reports when a device physically leaves an authorized location, and IP whitelisting, which detects and reports when a device is connected to an unauthorized network. Identify unauthorized users If you believe the device has been misplaced permanently, or possibly stolen, simply set the device to “missing’ on your HiddenApp dashboard. HiddenApp will get to work beaming in tracking data, as well as taking secret screenshots of what’s happening on-screen and iSight photos to capture the unauthorized user on camera, creating an audit trail that’s perfect for creating a strong evidence base. Of course, HiddenApp takes privacy seriously and has flexible privacy settings fitted as standard. This means that the tracking and investigative settings – location, network, photos, screenshots and keylogging – can each be enabled or disabled individually. Data gathered as a result of tracking can be permanently deleted, too. Track down missing devices with pinpoint accuracy HiddenApp’s ultra-accurate location tracking shows you the device’s exact real-time location on Google Maps. You can even track it to a physical address, as HiddenApp will discover and report the name of the network your device is connected to, and its proximity to the router. Send audio and written messages to devices HiddenApp’s messaging feature has a variety of applications, especially those that can lead to faster recovery of a device. Messages are totally customizable and have been used to give the finder of the device the owner’s contact details and, if appropriate, the tempting information that there’s a reward for its recovery. HiddenApp’s messaging function is a useful communications tool for sending out important notifications or emergency messages and has been especially useful to schools and colleges, which have used it to flag up reminders to students to return their devices at the end of a school year or lease period, or when they have changed school district. There’s also an option to send out bulk messages to the whole fleet, or just to particular groups. Supporting Compliance HiddenApp’s functionality can be an integral part of a robust information security management system, which you’ll need in order to demonstrate compliance with a range of regulatory or voluntary requirements. As well as keeping devices secure from theft and loss, HiddenApp helps to enforce corporate device-use policies, such as: > Location-based security policies, allowing operation in authorized zones only. > IP-based security policies, allowing connection to authorized networks only. > Its automated activity logging, reporting and device visibility provides a perfect audit trail to keep auditors happy.
Ivanti
ivanti.com
Ivanti breaks down barriers between IT and security so that #EverywhereWork can thrive. Ivanti has created the first purpose-built technology platform for CIOs and CISOs – giving IT and security teams comprehensive software solutions that scale with their organizations’ needs to enable, secure and elevate employees' experiences. The Ivanti platform is powered by Ivanti Neurons - a cloud-scale, intelligent hyper automation layer that enables proactive healing, user-friendly security across the organization, and provides an employee experience that delights users.
Appdome
appdome.com
Appdome is the mobile app economy’s one-stop shop for mobile app defense. Appdome provides the mobile industry’s only fully automated, Unified Mobile App Defense Platform, powered by a patented ML-coding engine, used by mobile brands to eliminate complexity, save money and deliver 300+ Certified Secure™ mobile app security, anti-malware, anti-fraud, MOBILEBot™ Defense, Geo Compliance, anti-cheat, MiTM attack prevention, code obfuscation and other protections in Android and iOS apps with ease, all inside the mobile DevOps and CI/CD pipeline. Appdome’s Unified Defense Platform also includes Threat-Events™ for UX/UI Control and ThreatScope™ Mobile XDR. Leading financial, healthcare, mobile games, retail, government and m-commerce brands use Appdome to protect Android and iOS apps, mobile customers and mobile businesses globally.
FusionAuth
fusionauth.io
FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world.
Heimdal
heimdalsecurity.com
Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layered security suite that combines threat prevention, patch and asset management, endpoint rights management, and antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses Threat Prevention Endpoint, Threat Prevention Network, Patch & Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection & Response, as well as eXtended Detection & Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.
DoControl
docontrol.io
DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution uncovers all SaaS users, 3rd party collaborators, assets/metadata, OAuth apps, groups, and activity events. From there, security teams can create granular data access control policies to reduce the risk of data overexposure and exfiltration. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data loss prevention (DLP) in SaaS. DoControl has no agents, no inline redirections, and no slow response times as commonly found in Cloud Access Security Broker (CASB) solutions.
StackBob
stackbob.ai
StackBob is a modern Employee Access and License Management Platform that integrates with over 300,000 apps, even without SSO. Organizations that use StackBob are securing access to all their tools, boost team productivity and also cut software and license costs. StackBob is the only IAM platform that can connect with any web app your team is using (including even your internal tools) and doesn't require upgrades to expensive enterprise plans in all your apps, nor going through a complex SAML SSO setup.
Cryptr
cryptr.co
Cryptr is a plug-and-play B2B authentication platform that allows SaaS to manage and deploy all their authentication strategies like Single Sign On, automated user provisioning with Directory Sync, TOTP, magic link and much more with just a few lines of code. - Universal SSO Connector: to connect in 5 minutes SaaS to the SSO systems (SAML, Azure AD, Okta, Ping Identity ...) of their enterprise customers, - Directory Sync: to enable synchronization of user directories between SaaS and their customers with automated provisioning and de-provisioning - Universal Login which includes login/password with stolen password detection, passwordless login with magic-link, social login, TOTP.
AvePoint
avepoint.com
Collaborate with Confidence. AvePoint provides the most advanced platform to optimize SaaS operations and secure collaboration. Over 17,000 customers worldwide rely on our solutions to modernize the digital workplace across Microsoft, Google, Salesforce and other collaboration environments. AvePoint's global channel partner program includes over 3,500 managed service providers, value added resellers and systems integrators, with our solutions available in more than 100 cloud marketplaces. Founded in 2001, AvePoint is a five-time Global Microsoft Partner of the Year and headquartered in Jersey City, New Jersey.
Zilla Security
zillasecurity.com
Zilla Security is the leading provider of modern identity governance and administration (IGA), providing a SaaS platform that automates the processes of identity compliance, provisioning, and security. Zilla stands out for its speed to value, offering the most complete set of application integrations capabilities for both commonly used and custom applications. Zilla AI Profiles™ eliminates the tedious, nearly impossible process of creating and maintaining rules that define roles or groups. Through its automations, Zilla clients are able to deploy 5X faster, complete access reviews with 80% less effort, and enable faster provisioning with 60% fewer ITSM tickets.
© 2025 WebCatalog, Inc.