Centralized Management
Browse 210 centralized management tools
FEATURED
Workspace security platform for detecting phishing and impersonation attacks
Workspace security platform for detecting phishing and impersonation attacks
System Operations Center for monitoring IT infrastructure and security
System Operations Center for monitoring IT infrastructure and security
Centralized endpoint mgmt system for servers & computers across multiple OS
Centralized endpoint mgmt system for servers & computers across multiple OS
Centralized platform for managing and securing mobile devices in enterprises
Centralized platform for managing and securing mobile devices in enterprises
Authentication software for Windows and Linux with alternative login methods
Authentication software for Windows and Linux with alternative login methods
Unified exposure mgmt platform integrating security tools for risk analysis
Unified exposure mgmt platform integrating security tools for risk analysis
AI-powered unified security platform for risk mgmt & asset visibility
AI-powered unified security platform for risk mgmt & asset visibility
Secure internet access solution for VIPs and orgs using private & public nets
Secure internet access solution for VIPs and orgs using private & public nets
Data security fabric integrating risk assessment & vuln mgmt data
Data security fabric integrating risk assessment & vuln mgmt data
Centralized mgmt platform for deploying & monitoring up to 100 ETO appliances
Centralized mgmt platform for deploying & monitoring up to 100 ETO appliances
AI governance platform for managing AI system lifecycle and compliance
AI governance platform for managing AI system lifecycle and compliance
Connects Olfeo web security gateway logs to SIEM and XDR platforms
Connects Olfeo web security gateway logs to SIEM and XDR platforms
Enterprise encryption solution for data protection across endpoints and cloud
Enterprise encryption solution for data protection across endpoints and cloud
Log management software for collecting, analyzing, and correlating log data
Log management software for collecting, analyzing, and correlating log data
SSO solution providing centralized access control with MFA capabilities
SSO solution providing centralized access control with MFA capabilities
Firewall management platform with real-time monitoring and policy automation
Firewall management platform with real-time monitoring and policy automation
Stateless endpoint architecture for kiosks and self-service devices
Stateless endpoint architecture for kiosks and self-service devices
Ephemeral endpoint substrate replacing traditional OS with stateless runtime
Ephemeral endpoint substrate replacing traditional OS with stateless runtime
Stateless endpoint substrate that resets endpoints to clean state after each session
Stateless endpoint substrate that resets endpoints to clean state after each session
Stateless endpoint execution platform for manufacturing & industrial OT environments
Stateless endpoint execution platform for manufacturing & industrial OT environments
Outlook 365 add-in for encrypting emails and attachments with access controls
Outlook 365 add-in for encrypting emails and attachments with access controls
End-to-end email encryption solution with centralized policy management
End-to-end email encryption solution with centralized policy management
Managed perimeter security service for network traffic control and protection
Managed perimeter security service for network traffic control and protection
Secure Linux endpoint OS for VDI/DaaS with centralized management
Secure Linux endpoint OS for VDI/DaaS with centralized management