Company Website

Ratings and Reviews 54 Ratings

Total
ease
features
design
support

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Media

Media

Integrations Supported

Active Directory
Amazon Web Services (AWS)
Autotask PSA
ConnectWise RMM
Google Chrome
Google Drive
Google Workspace
HaloPSA
Microsoft 365
Microsoft Azure
Okta
Ping Identity
User.com

Integrations Supported

Active Directory
Amazon Web Services (AWS)
Autotask PSA
ConnectWise RMM
Google Chrome
Google Drive
Google Workspace
HaloPSA
Microsoft 365
Microsoft Azure
Okta
Ping Identity
User.com

API Availability

Has API

API Availability

Has API

Pricing Information

$0/month
Free Trial Offered?
Free Version

Pricing Information

$12.00/month/user
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Heimdal®

Date Founded

2014

Company Location

Denmark

Company Website

heimdalsecurity.com

Company Facts

Organization Name

Cameyo

Date Founded

2018

Company Location

United States

Company Website

www.cameyo.com

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

RMM

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Application Virtualization

Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances

Desktop as a Service (DaaS)

Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning

Digital Workplace

Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

Remote Work

Collaboration
Credential Management
Electronic Signature
Employee Monitoring
Live Chat
Meeting Management
Project Management
Remote Access
Remote Support
Screen Sharing
Softphone
Task Management
Time Zone Tracking
Video Chat
Web Conferencing

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Virtual Desktop (VDI)

Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration

Virtual Machine

Backup Management
Graphical User Interface
Remote Control
VDI
Virtual Machine Encryption
Virtual Machine Migration
Virtual Machine Monitoring
Virtual Server

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Popular Alternatives

Popular Alternatives

V2 Cloud Reviews & Ratings

V2 Cloud

V2 Cloud Solutions
Thinfinity Workspace Reviews & Ratings

Thinfinity Workspace

Cybele Software, Inc.