Alternatives to Ivanti

Compare Ivanti alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Ivanti in 2026. Compare features, ratings, user reviews, pricing, and more from Ivanti competitors and alternatives in order to make an informed decision for your business.

  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience to work faster, smarter, and easier while IT teams modernize and improve efficiency. NinjaOne is a Leader in the Gartner Magic Quadrant for Endpoint Management Tools. The company is obsessed with customer success and has retained a 98% customer satisfaction score for more than 5 years.
    Leader badge
    Compare vs. Ivanti View Software
    Visit Website
  • 2
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps technicians troubleshoot devices, run diagnostics, and generate actionable solutions in real time. IT Autopilot delivers 24/7/365, autonomously resolving Tier-1 issues and reducing IT workload by up to 40%. It acts like a personal AI technician for every employee, freeing your team to focus on what really matters. Trusted by 13K+ customers in over 120 countries, Atera scales with your needs while maintaining the highest security and compliance standards.
    Leader badge
    Compare vs. Ivanti View Software
    Visit Website
  • 3
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security.
    Compare vs. Ivanti View Software
    Visit Website
  • 4
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com.
    Leader badge
    Partner badge
    Compare vs. Ivanti View Software
    Visit Website
  • 5
    EZO AssetSonar
    EZO AssetSonar is a comprehensive IT asset management platform that provides real-time visibility into your entire digital infrastructure. Track and optimize hardware, software, and license management to reduce risks, control IT spend, and improve compliance. With powerful features like software discovery, license tracking, and software normalization, EZO AssetSonar helps businesses overcome challenges such as SaaS sprawl, shadow IT, and redundant software licenses. Seamlessly integrating with leading ITSM tools like Jamf, Zendesk, Intune, and SCCM, AssetSonar simplifies workflows and ensures continuous monitoring of your technology ecosystem. Automating manual tasks and consolidating data from diverse sources enables IT teams to focus on strategic initiatives while maintaining control and compliance. Optimize your IT asset lifecycle, boost efficiency, and make smarter technology purchasing decisions with EZO AssetSonar’s powerful IT asset management capabilities.
    Compare vs. Ivanti View Software
    Visit Website
  • 6
    SuperOps

    SuperOps

    SuperOps

    SuperOps is a future-ready, unified PSA-RMM platform for fast-growing MSPs. Powered with the goodness of AI and intelligent automation, SuperOps is packed with all the features and tools that a modern MSP needs, including project management and IT documentation. MSPs no longer need to toggle between tools to manage different pieces of their work. With SuperOps, MSPs can break free from disjointed, legacy tools and experience a platform that’s built for the cloud and designed to make MSPs’ work and life easier.
    Starting Price: $79/tech/month
  • 7
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and optimizes infrastructure and applications across data centers and cloud, while intelligently grouping workloads by application affinities and other resource formats that provide a clear view of what is connected to the environment at any given time. As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
    Leader badge
    Starting Price: $1499.00/year
  • 8
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Starting Price: $0/month
  • 9
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 10
    Cruz Operations Center (CruzOC)
    CruzOC is a scalable multi-vendor network management and IT operations tool for robust yet easy-to-use netops. Key features of CruzOC’s integrated and automated management include performance monitoring, configuration management, and lifecycle management for 1000s of vendors and converging technologies. With CruzOC, administrators have implicit automation to control their data center operations and critical resources, improve network and service quality, accelerate network and service deployments, and lower operating costs. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.
    Starting Price: $1350
  • 11
    Securden Endpoint Privilege Manager
    Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control. •Eliminate local admin rights on Windows endpoints •Manage applications that require administrative privileges •Define who can access what applications & automate application control through whitelisting & blacklisting •Policy-based access, even for offline endpoints & remote employees •On-demand privilege elevation on online & offline endpoints •Grant temporary full administrator privileged for standard users when required •Track application usage & privilege elevation trends •Continuously monitor local admin accounts & detect if new local admin accounts are created •Ensure compliance with regulations with comprehensive audit trails •Highly scalable and enterprise ready
  • 12
    Securden Unified PAM
    Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization. • Enforce remote password resets on devices. • Manage Windows domain, service, local admin accounts & their dependencies. • Eliminate hardcoded-credentials from scripts and configuration files. • Automate password access for non-human identities with APIs. • Protect SSH keys, track usage & associate with UNIX devices. • Share accounts with granular access controls. • One-click remote access to assets without revealing passwords. • Grant Just-In-Time access to privileged accounts. • Shadow, Monitor & record live sessions. • Endpoint privilege management with application controls. • Integrate with AD, AzureAD for user provisioning. • Integrate with solutions for MFA, SIEM, ITSM & SSO. • Comply with regulations with audit trails & custom reports
  • 13
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 14
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 15
    OX Security

    OX Security

    OX Security

    Automatically block risks introduced into the pipeline and ensure the integrity of each workload, all from a single location. Full visibility and end to end traceability over your software pipeline security from cloud to code. Manage your findings, orchestrate DevSecOps activities, prevent risks and maintain software pipeline integrity from a single location. Remediate risks based on prioritization and business context. Automatically block vulnerabilities introduced into your pipeline. Immediately identify the “right person” to take action on any security exposure. Avoid known security risks like Log4j and Codecov. Prevent new attack types based on proprietary research and threat intel. Detect anomalies like GitBleed. Ensure the security and integrity of all cloud artifacts. Undertake security gap analysis and identify any blind spots. Auto-discovery and mapping of all applications.
    Starting Price: $25 per month
  • 16
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 17
    Applivery

    Applivery

    Applivery

    Applivery is a modern, cloud-based Unified Endpoint Management UEM / MDM platform that provides comprehensive control over Android, Apple, and Windows devices. It offers seamless integration with identity providers, enabling single sign-on (SSO) for enhanced security. The platform supports zero-touch deployment, allowing for efficient device provisioning without manual intervention. Applivery’s advanced analytics deliver insights into device performance and user experience, facilitating proactive management. Its user-friendly interface ensures quick setup and smooth integration across organizations of all sizes, aligning with the latest industry standards. Additionally, Applivery provides features designed to help organizations achieve and maintain compliance with security certifications and standards, such as ISO 27001, SOC2, CIS and more. 
    Starting Price: €2/device
  • 18
    Ivanti Neurons
    Power and protect your teams from cloud to edge with Ivanti Neurons, the hyperautomation platform for the Everywhere Workplace. Delivering the power of self-healing has never been so simple. What if you could discover and fix issues automatically before your users even know about them? Ivanti Neurons does just that. Powered by machine-learning and deep intelligence, it lets you remediate issues preemptively before they slow your productivity. Take troubleshooting off your agenda and deliver better experiences, everywhere your business works. Ivanti Neurons fuels your IT with real-time intelligence you can act on, enables devices to self-heal and self-secure, and provides users with a personalized self-service experience. Empower your users, your team and your business to do more, everywhere, with Ivanti Neurons. Ivanti Neurons delivers value from day one by providing real-time insights that let you thwart risks and prevent breaches in seconds, not minutes.
  • 19
    Ivanti vADC
    Delight your users with faster, more reliable applications, with no compromise on performance or security. More than just a software load balancer, Ivanti vADC drives more transactions, even at peak load conditions, ensuring continuous uptime and real-time security monitoring of application traffic. Enhance your customer experience and grow your business with more attractive and responsive services. Increase systems efficiency and boost the throughput of application servers and security by up to 50%. Reduce costs with flexible capacity-based licensing. Ivanti vADC is natively designed for virtualization and cloud portability. Ivanti vADC provides unprecedented scale and flexibility to enhance the performance and security of applications across the widest range of environments, from physical and virtual data centers to public and hybrid clouds.
  • 20
    Ivanti Neurons for Patch Management
    Most exploits target known vulnerabilities—those for which a patch has been available for at least a year. You can’t rely on manual processes, or on users themselves, to ensure systems are fully patched. Ivanti DSM integrates Patch Management to identify and patch vulnerabilities across heterogeneous OSes, configurations, and all major third party applications. Your servers, desktops, and laptops are equally protected across your entire organization.
  • 21
    Ivanti Neurons for Discovery
    Detect new or unknown devices joining your network instantly. Ivanti Neurons for Discovery delivers accurate and actionable asset information in minutes. Determine what users and endpoints connect to the network, when they connect, and what software is installed on them. Now enjoy visibility in real-time using active and passive scanning and third-party connectors. Take advantage of actionable insight with normalized hardware and software inventory data, software usage information automatically feeding configuration management and asset management databases, along comprehensive service maps. Ivanti Neurons for Discovery is an approved inventory management partner of Google, enabling the import and reconciliation of Google OS devices from Google Workspace into the Ivanti Neurons platform through the Google Chrome Enterprise connector. This helps customers get a complete picture of their assets, regardless of what unified endpoint management tool they use.
  • 22
    Ivanti Neurons for RBVM
    Ivanti Neurons for RBVM is a risk-based vulnerability management platform designed to help organizations prioritize and remediate cybersecurity risks efficiently. It continuously correlates vulnerability data, threat intelligence, and business asset criticality to provide a contextualized view of risk. The platform automates remediation workflows, including SLA management and real-time alerts, to accelerate vulnerability closure. Role-based access controls and customizable dashboards foster collaboration across security teams from SOC to C-suite. Ivanti’s proprietary Vulnerability Risk Rating (VRR) prioritizes vulnerabilities based on real-world threat context rather than severity alone. This enables security teams to focus on the most critical risks and reduce exposure to ransomware and other cyber threats.
  • 23
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 24
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 25
    Faraday

    Faraday

    Faraday

    In today’s dynamic world, security is no longer about fortifying rigid structures. It’s about keeping watch and securing change. Carry out a continuous evaluation of your attack surface with techniques and methodologies used by real attackers. Always keep track of your dynamic attack surface to guarantee constant coverage. Full coverage requires using several scanners. Let us pinpoint crucial data from an overwhelming amount of results. Our Technology allows you to define and execute your own actions from different sources with your own schedule and automatically import outputs into your repository. With +85 plugins, an easy-to-use Faraday-Cli, a RESTful API, and a flexible scheme to develop your own agents, our platform brings a unique alternative to creating your own automated and collaborative ecosystem.
    Starting Price: $640 per month
  • 26
    Tromzo

    Tromzo

    Tromzo

    Tromzo builds deep environmental and organizational context from code to cloud so you can accelerate the remediation of critical risks across the software supply chain. Tromzo accelerates the remediation of risks at every layer from code to cloud. We do this by building a prioritized risk view of the entire software supply chain with context from code to cloud. This context helps our users understand which few assets are critical to the business, prevent risks from being introduced to those critical assets, and automate the remediation lifecycle of the few issues that truly matter. Contextual software asset inventory (code repos, software dependencies, SBOMs, containers, microservices, etc.), so you know what you have, who owns them, and which ones are important to the business. Understand the security posture for every team with SLA compliance, MTTR, and other custom KPIs, so you can drive risk remediation and accountability across the organization.
  • 27
    baramundi Management Suite

    baramundi Management Suite

    baramundi Software USA

    Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.
    Starting Price: $5000.00/one-time
  • 28
    Ivanti Neurons for UEM
    Ivanti Neurons for UEM is a cloud-based unified endpoint management platform that delivers complete visibility, control, and security for all devices through a single pane of glass. It discovers and inventories endpoints in real time to establish a single source of truth, streamlines onboarding and provisioning over the air with apps, settings, and security profiles, and manages devices and applications across their full lifecycle from enrollment to retirement. Built on the AI-powered Neurons platform, it automates routine troubleshooting, diagnostics, and remediation to create a self-healing environment that resolves issues without user interruption, while sensor-based architecture and natural-language querying provide instant operational awareness.
  • 29
    CrowdStrike Falcon Exposure Management
    CrowdStrike Falcon Exposure Management is an attack surface management platform delivering autonomous, 24/7 discovery of exposed assets across all environments and the supply chain. Leading enterprises worldwide use CrowdStrike Falcon Exposure Management to gain unparalleled visibility of their internet-facing assets and actionable security insights for eliminating shadow IT risks. CrowdStrike Falcon Exposure Management's proprietary technology maps the world's internet exposed assets in real-time. Cutting edge ML classification and association engines analyze all the assets and automatically create your complete inventory. CrowdStrike EASM stands out with its deep adversary intelligence, allowing for precise risk prioritization. Understand threats from an attacker’s perspective and act quickly to secure your assets.
  • 30
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 31
    Ivanti Neurons for ASPM
    Ivanti Neurons for ASPM (Application Security Posture Management) takes a risk-based approach to vulnerability management by consolidating and normalizing findings from SAST, DAST, OSS, container, and other scanners into a single view, continuously correlating them with live threat intelligence to highlight the greatest risks and pinpoint exact code locations. It delivers full-stack visibility across the software development lifecycle, employs a proprietary Vulnerability Risk Rating (VRR) that adapts based on real-world threat context rather than static severity scores, and prioritizes remediation tasks automatically according to asset criticality and active threats. Powerful playbook automations, such as SLA-based due-date setting, common-task orchestration, and customizable alerts, reduce manual work and accelerate fixes. Role-based access control and bidirectional integration with ticketing systems ensure all DevSecOps stakeholders can access relevant data.
  • 32
    Ivanti Neurons for Secure Access
    Ivanti Neurons for Secure Access is a unified, cloud-based platform that integrates traditional VPN (Ivanti Connect Secure) and Zero Trust access (Ivanti Neurons for Zero Trust Access) gateways under a single pane of glass, delivering real-time insights and centralized control for hybrid work environments. It automatically discovers, classifies, and catalogs private applications, gathers usage metrics for chargebacks, and enforces granular access policies with continual verification of users, devices, and apps. A comprehensive visibility dashboard spans all gateways, users, devices, and activities, while adaptive security leverages user behavior analytics to detect anomalies and dynamically respond to emerging threats. Gateway lifecycle management simplifies deployment, configuration, upgrades, and retirement, and clean REST APIs enable extensibility with third-party identity providers, SIEM, UEM, vulnerability assessment, and endpoint protection tools.
  • 33
    Ivanti Neurons for IIoT
    Ivanti Neurons for Security Operations Management provides a centralized platform for tracking and automating the remediation of security events and vulnerabilities across service management, operations, and development. All security events are created as incidents, prioritized, and linked to configuration items in the CMDB, enabling teams to manage the full incident lifecycle, from investigation and change-management workflows to resolution, while logging, classifying, and tracking vulnerability remediation based on Ivanti’s Risk-Based Vulnerability Management. Out-of-the-box integrations with Azure DevOps and Jira (or any external solution via REST APIs) ensure that security findings flow directly into DevOps pipelines, keeping remediation activities aligned with development efforts. Configurable dashboards and analytics deliver real-time visibility into risks, affected assets, and remediation status, and automated workflows assign tasks to the right teams to boost efficiency.
  • 34
    Red Hat Ansible Automation Platform
    Red Hat® Ansible® Automation Platform is a unified solution for strategic automation. It combines the security, features, integrations, and flexibility needed to scale automation across domains, orchestrate essential workflows, and optimize IT operations to successfully adopt enterprise AI. The path to fully optimized automation is a journey. Moving from manual Day 2 operations and ad hoc solutions to a comprehensive, integrated automation platform requires a strategic commitment. And it determines your current—and future—business success. With Red Hat Ansible Automation Platform, you can maximize efficiency, improve security, and overcome increasing IT challenges like skill gaps and tech sprawl. It helps you: Deliver consistent, reliable automation across domains and use cases. Maximize the value of the technology and resources you already have. Build a strong foundation for AI adoption.
    Starting Price: $5,000 per year
  • 35
    Ivanti Endpoint Manager
    From Windows to macOS, from iOS to Android and beyond to IoT—one place to manage all devices—plus user profiles. Do more than keep your business up and running. Consolidate your endpoint and workspace management, satisfy growing user expectations, and simplify your management processes through a single, unified endpoint management suite. Ivanti Endpoint Manager is proven, reliable endpoint and user-profile management software that is core to: 1) discovering everything that touches your network; 2) automating software delivery; 3) reducing headaches with login performance; and 4) integrating actions with multiple IT solutions. Experience UEM today. Discover, inventory, and configure all devices—PCs, laptops, servers, tablets, and smartphones. Also remote control Windows and Mac devices.
  • 36
    Ivanti Security Controls
    Ivanti Security Controls is an automated patch management solution that simplifies security through unified prevention, detection, and response across physical and virtual environments. It automatically discovers vulnerabilities and missing OS or third-party application patches, then deploys updates to servers, workstations, VMs, and templates, online or offline, via agentless patching and remote task scheduling to minimize disruption. Granular privilege management implements just enough and just-in-time administration to remove full admin rights while elevating access temporarily for approved tasks. Dynamic allowlisting enforces preventive policies so only known, trusted applications can execute, supported by a data-gathering mode that monitors application usage to refine controls and eliminate false positives. CVE-to-patch list creation automates grouping of relevant updates from any vulnerability assessment, and REST APIs enable integration and orchestration.
  • 37
    Ivanti File Director
    Ivanti File Director syncs user desktop files—even PST files—to on-premises or cloud storage with total IT control, audit, and security. Users get an unchanged Windows desktop experience, with zero disruption during an OS migration and total file access from any device. In addition to Windows 10 and Windows 11 migration, this approach makes any migration, break-fix, or desktop transformation project effortless. Users get a familiar Windows experience—IT gets effortless desktop migration, reduced data center storage costs, support of multi-platform clients, and desktop file audit and control capabilities. Provide users with an alternative to consumer cloud services. File Director lets you fully leverage existing resources and workflows to give users a simple, unified method to access and share files.
  • 38
    Ivanti Secure Unified Client
    Ivanti Secure Unified Client is a dynamic, integrated, and easy-to-use network client that delivers anytime/anywhere secure connectivity. It provides secure connectivity, an intuitive end-user interface, and simplified deployment options. It runs on platforms that support application distribution through an online application store. Secure access to corporate networks for employees, anywhere, anytime, and from any device. Increased productivity, reduced management overhead, and better security profiles. Data channels use FIPS-certified cryptographic modules. Automated tunnel tear-down or re-establishment. VPN connected automatically via a predefined host. Change the appearance of UI and input elements. With Ivanti Secure Unified Client, you can improve your security for employee access to corporate networks.
  • 39
    ManageEngine Application Control Plus
    Application Control Plus is an enterprise solution that leverages application control and privilege management features to fortify endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses. Ensure complete endpoint security by creating whitelists of applications that you trust, and keep all untrusted applications out of your network. Protect your risky legacy OS machines by deploying application control policies that prevent vulnerable applications without a patch from running. Augment the security of customer-facing systems such as point-of-sale or fixed-function machines by simulating an environment under lockdown using policies run in Strict Mode.
  • 40
    BeyondTrust Endpoint Privilege Management
    Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance.
  • 41
    Enso

    Enso

    Enso Security

    Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.
  • 42
    Maverix

    Maverix

    Maverix

    Maverix blends itself into the existing DevOps process, brings all required integrations with software engineering and application security tools, and manages the application security testing process end to end. AI-based automation for security issues management including detection, grouping, prioritization, filtration, synchronization, control of fixes, and support of mitigation rules. Best-in-class DevSecOps data warehouse for full visibility into application security improvements over time and team efficiency. Security issues can be easily tracked, triaged, and prioritized – all from a single user interface for the security team, with integrations to third-party products. Gain full visibility into application production readiness and application security improvements over time.
  • 43
    Ivanti Docs@Work
    The Ivanti Docs@Work app gives end users an intuitive way to access, annotate, handle multiple shared files, and view documents from email, SharePoint, Office 365, Dropbox, and a variety of other on-premises and cloud repositories. Enterprise productivity depends almost entirely on having reliable access to content of all types, from customer accounts to healthcare records to financial transactions. With Ivanti Docs@Work, your IT admins can enforce data loss prevention (DLP) controls to prevent unauthorized distribution while allowing users to effortlessly download, edit, and share multiple documents from their mobile devices—without compromising corporate data.
  • 44
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.
    Starting Price: Free
  • 45
    Boman.ai

    Boman.ai

    Boman.ai

    Boman.ai can be integrated in your CI/CD pipeline with few commands and minimum configuration. No planning or expertise is needed. Boman.ai brings SAST, DAST, SCA, and secret scans all packaged in one integration. It can support multiple development languages. Boman.ai minimizes your application security expenses by utilizing open-source scanners. You don’t need to buy expensive application security tools. Boman.ai is powered by AI/ML that removes false positives and correlates results to help you in prioritization and fixes. The SaaS platform presents a dashboard for all your scan results in one place. Correlate the results and get insights for better application security. Manage vulnerabilities reported by the scanner. The platform helps to prioritize, triage, and remediate vulnerabilities.
  • 46
    Rezilion

    Rezilion

    Rezilion

    Automatically detect, prioritize and remediate software vulnerabilities with Rezilion’s Dynamic SBOM. Focus on what matters, eliminate risk quickly, and free up time to build. In a world where time is of the essence, why sacrifice security for speed when you can have both? Rezilion is a software attack surface management platform that automatically secures the software you deliver to customers, giving teams time back to build. Rezilion is different from other security tools that create more remediation work. Rezilion reduces your vulnerability backlogs. It works across your stack, helping you to know what software is in your environment, what is vulnerable, and what is actually exploitable, so you can focus on what matters and remediate automatically. Create an instant inventory of all of the software components in your environment. Know which of your software vulnerabilities are exploitable, and which are not, through runtime analysis.
  • 47
    Phoenix Security

    Phoenix Security

    Phoenix Security

    Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.
    Starting Price: $3,782.98 per month
  • 48
    Delinea Privilege Manager
    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. You can prevent malware from exploiting applications by removing local administrative rights from endpoints and implementing policy-based application controls. Privilege Manager prevents malware attacks without causing any end user friction that slows productivity. Available both on-premises and in the cloud, enterprises and fast-growing teams can manage hundreds of thousands of machines through Privilege Manager. With built-in application control, real-time threat intelligence, and actionable reporting, it is easier than ever to manage endpoints and demonstrate compliance with least privilege policies to executives and auditors.
  • 49
    Ivanti Endpoint Security for Endpoint Manager
    Endpoint Security for Endpoint Manager delivers powerful, integrated endpoint protection and unified management from within the familiar Ivanti console. It combines passive visibility, discovering and inventorying every IP-enabled device and installed software in real time, including rogue devices, with active control features such as application whitelisting, device control (USB/media lockdown and detailed copy logs) and antivirus orchestration (Ivanti AV or third-party engines) to detect and prevent threats before they spread. Automated patch management covers Windows, macOS, Linux, and third-party applications across on-site, remote, and offline devices, ensuring systems stay up to date without impacting users. When malware or ransomware does get through, the solution’s auto-isolation and remote-control capabilities contain infections instantly, kill malicious processes, notify connected machines, and remediate or reimage compromised endpoints.
  • 50
    ArmorCode

    ArmorCode

    ArmorCode

    Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools ‍‍ An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps.